Attacking the Network Time Protocol. Malhotra, A., Cohen, I. E., Brakke, E., & Goldberg, S. IACR Cryptology ePrint Archive, 2015:1020, 2015. Link Paper bibtex @article{journals/iacr/MalhotraCBG15,
added-at = {2015-11-09T00:00:00.000+0100},
author = {Malhotra, Aanchal and Cohen, Isaac E. and Brakke, Erik and Goldberg, Sharon},
biburl = {http://www.bibsonomy.org/bibtex/2dc84f0628c324e8d7126907b44627054/dblp},
ee = {http://eprint.iacr.org/2015/1020},
interhash = {4c9e79aadcdcdcf035ff8f2a52145d3a},
intrahash = {dc84f0628c324e8d7126907b44627054},
journal = {IACR Cryptology ePrint Archive},
keywords = {dblp},
pages = 1020,
timestamp = {2015-11-10T11:33:37.000+0100},
title = {Attacking the Network Time Protocol.},
url = {http://dblp.uni-trier.de/db/journals/iacr/iacr2015.html#MalhotraCBG15},
volume = 2015,
year = 2015
}
Downloads: 0
{"_id":"yue7ER4iCKQFB7Sfh","bibbaseid":"malhotra-cohen-brakke-goldberg-attackingthenetworktimeprotocol-2015","downloads":0,"creationDate":"2015-12-18T06:38:06.146Z","title":"Attacking the Network Time Protocol.","author_short":["Malhotra, A.","Cohen, I. E.","Brakke, E.","Goldberg, S."],"year":2015,"bibtype":"article","biburl":"http://www.bibsonomy.org/bib/author/cohen?items=1000","bibdata":{"bibtype":"article","type":"article","added-at":"2015-11-09T00:00:00.000+0100","author":[{"propositions":[],"lastnames":["Malhotra"],"firstnames":["Aanchal"],"suffixes":[]},{"propositions":[],"lastnames":["Cohen"],"firstnames":["Isaac","E."],"suffixes":[]},{"propositions":[],"lastnames":["Brakke"],"firstnames":["Erik"],"suffixes":[]},{"propositions":[],"lastnames":["Goldberg"],"firstnames":["Sharon"],"suffixes":[]}],"biburl":"http://www.bibsonomy.org/bibtex/2dc84f0628c324e8d7126907b44627054/dblp","ee":"http://eprint.iacr.org/2015/1020","interhash":"4c9e79aadcdcdcf035ff8f2a52145d3a","intrahash":"dc84f0628c324e8d7126907b44627054","journal":"IACR Cryptology ePrint Archive","keywords":"dblp","pages":"1020","timestamp":"2015-11-10T11:33:37.000+0100","title":"Attacking the Network Time Protocol.","url":"http://dblp.uni-trier.de/db/journals/iacr/iacr2015.html#MalhotraCBG15","volume":"2015","year":"2015","bibtex":"@article{journals/iacr/MalhotraCBG15,\n added-at = {2015-11-09T00:00:00.000+0100},\n author = {Malhotra, Aanchal and Cohen, Isaac E. and Brakke, Erik and Goldberg, Sharon},\n biburl = {http://www.bibsonomy.org/bibtex/2dc84f0628c324e8d7126907b44627054/dblp},\n ee = {http://eprint.iacr.org/2015/1020},\n interhash = {4c9e79aadcdcdcf035ff8f2a52145d3a},\n intrahash = {dc84f0628c324e8d7126907b44627054},\n journal = {IACR Cryptology ePrint Archive},\n keywords = {dblp},\n pages = 1020,\n timestamp = {2015-11-10T11:33:37.000+0100},\n title = {Attacking the Network Time Protocol.},\n url = {http://dblp.uni-trier.de/db/journals/iacr/iacr2015.html#MalhotraCBG15},\n volume = 2015,\n year = 2015\n}\n\n","author_short":["Malhotra, A.","Cohen, I. E.","Brakke, E.","Goldberg, S."],"key":"journals/iacr/MalhotraCBG15","id":"journals/iacr/MalhotraCBG15","bibbaseid":"malhotra-cohen-brakke-goldberg-attackingthenetworktimeprotocol-2015","role":"author","urls":{"Link":"http://eprint.iacr.org/2015/1020","Paper":"http://dblp.uni-trier.de/db/journals/iacr/iacr2015.html#MalhotraCBG15"},"keyword":["dblp"],"downloads":0},"search_terms":["attacking","network","time","protocol","malhotra","cohen","brakke","goldberg"],"keywords":["dblp"],"authorIDs":[],"dataSources":["DY7iBA8E4Z4ZyQgtk"]}