Restricted data types used in secure computing environments. Kouper, I. & Mitchell, E. In HathiTrust Research Center UnCamp 2018, 2018. bibtex @inproceedings{
title = {Restricted data types used in secure computing environments},
type = {inproceedings},
year = {2018},
id = {253bf04b-6c9c-34d4-8349-b362f2b472cf},
created = {2019-10-01T17:20:52.807Z},
file_attached = {false},
profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d},
last_modified = {2019-10-01T17:20:52.807Z},
read = {true},
starred = {false},
authored = {true},
confirmed = {true},
hidden = {false},
citation_key = {Kouper2018a},
private_publication = {false},
bibtype = {inproceedings},
author = {Kouper, Inna and Mitchell, Erik},
booktitle = {HathiTrust Research Center UnCamp 2018}
}
Downloads: 0
{"_id":"JN4zAs2kkM7Cqhter","bibbaseid":"kouper-mitchell-restricteddatatypesusedinsecurecomputingenvironments-2018","authorIDs":[],"author_short":["Kouper, I.","Mitchell, E."],"bibdata":{"title":"Restricted data types used in secure computing environments","type":"inproceedings","year":"2018","id":"253bf04b-6c9c-34d4-8349-b362f2b472cf","created":"2019-10-01T17:20:52.807Z","file_attached":false,"profile_id":"42d295c0-0737-38d6-8b43-508cab6ea85d","last_modified":"2019-10-01T17:20:52.807Z","read":"true","starred":false,"authored":"true","confirmed":"true","hidden":false,"citation_key":"Kouper2018a","private_publication":false,"bibtype":"inproceedings","author":"Kouper, Inna and Mitchell, Erik","booktitle":"HathiTrust Research Center UnCamp 2018","bibtex":"@inproceedings{\n title = {Restricted data types used in secure computing environments},\n type = {inproceedings},\n year = {2018},\n id = {253bf04b-6c9c-34d4-8349-b362f2b472cf},\n created = {2019-10-01T17:20:52.807Z},\n file_attached = {false},\n profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d},\n last_modified = {2019-10-01T17:20:52.807Z},\n read = {true},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Kouper2018a},\n private_publication = {false},\n bibtype = {inproceedings},\n author = {Kouper, Inna and Mitchell, Erik},\n booktitle = {HathiTrust Research Center UnCamp 2018}\n}","author_short":["Kouper, I.","Mitchell, E."],"biburl":"https://bibbase.org/service/mendeley/42d295c0-0737-38d6-8b43-508cab6ea85d","bibbaseid":"kouper-mitchell-restricteddatatypesusedinsecurecomputingenvironments-2018","role":"author","urls":{},"metadata":{"authorlinks":{}},"downloads":0},"bibtype":"inproceedings","creationDate":"2019-07-01T19:03:06.382Z","downloads":0,"keywords":[],"search_terms":["restricted","data","types","used","secure","computing","environments","kouper","mitchell"],"title":"Restricted data types used in secure computing environments","year":2018,"biburl":"https://bibbase.org/service/mendeley/42d295c0-0737-38d6-8b43-508cab6ea85d","dataSources":["zgahneP4uAjKbudrQ","ya2CyA73rpZseyrZ8","2252seNhipfTmjEBQ"]}