{"_id":"Nvj7tk44gRRSaL99m","bibbaseid":"namhuh-jeong-kim-mun-securexmlawarenetworkdesignandperformanceanalysis-2005","author_short":["nam Huh, E.","Jeong, J.","Kim, Y.","Mun, K."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","added-at":"2017-05-24T00:00:00.000+0200","author":[{"propositions":["nam"],"lastnames":["Huh"],"firstnames":["Eui"],"suffixes":[]},{"propositions":[],"lastnames":["Jeong"],"firstnames":["Jong-Youl"],"suffixes":[]},{"propositions":[],"lastnames":["Kim"],"firstnames":["Young-Shin"],"suffixes":[]},{"propositions":[],"lastnames":["Mun"],"firstnames":["Ki-Young"],"suffixes":[]}],"biburl":"https://www.bibsonomy.org/bibtex/2a34d3d18477b75b366088dd7ed224a2c/dblp","booktitle":"ICCSA (1)","crossref":"conf/iccsa/2005-1","editor":[{"propositions":[],"lastnames":["Gervasi"],"firstnames":["Osvaldo"],"suffixes":[]},{"propositions":[],"lastnames":["Gavrilova"],"firstnames":["Marina","L."],"suffixes":[]},{"propositions":[],"lastnames":["Kumar"],"firstnames":["Vipin"],"suffixes":[]},{"propositions":[],"lastnames":["Laganà"],"firstnames":["Antonio"],"suffixes":[]},{"propositions":[],"lastnames":["Lee"],"firstnames":["Heow","Pueh"],"suffixes":[]},{"propositions":[],"lastnames":["Mun"],"firstnames":["Youngsong"],"suffixes":[]},{"propositions":[],"lastnames":["Taniar"],"firstnames":["David"],"suffixes":[]},{"propositions":[],"lastnames":["Tan"],"firstnames":["Chih","Jeng","Kenneth"],"suffixes":[]}],"ee":"https://doi.org/10.1007/11424758_33","interhash":"8c97b3236224879c8117847816056524","intrahash":"a34d3d18477b75b366088dd7ed224a2c","isbn":"3-540-25860-4","keywords":"dblp","pages":"311-319","publisher":"Springer","series":"Lecture Notes in Computer Science","timestamp":"2019-05-15T17:33:42.000+0200","title":"Secure XML Aware Network Design and Performance Analysis.","url":"http://dblp.uni-trier.de/db/conf/iccsa/iccsa2005-1.html#HuhJKM05","volume":"3480","year":"2005","bibtex":"@inproceedings{conf/iccsa/HuhJKM05,\n added-at = {2017-05-24T00:00:00.000+0200},\n author = {nam Huh, Eui and Jeong, Jong-Youl and Kim, Young-Shin and Mun, Ki-Young},\n biburl = {https://www.bibsonomy.org/bibtex/2a34d3d18477b75b366088dd7ed224a2c/dblp},\n booktitle = {ICCSA (1)},\n crossref = {conf/iccsa/2005-1},\n editor = {Gervasi, Osvaldo and Gavrilova, Marina L. and Kumar, Vipin and Laganà, Antonio and Lee, Heow Pueh and Mun, Youngsong and Taniar, David and Tan, Chih Jeng Kenneth},\n ee = {https://doi.org/10.1007/11424758_33},\n interhash = {8c97b3236224879c8117847816056524},\n intrahash = {a34d3d18477b75b366088dd7ed224a2c},\n isbn = {3-540-25860-4},\n keywords = {dblp},\n pages = {311-319},\n publisher = {Springer},\n series = {Lecture Notes in Computer Science},\n timestamp = {2019-05-15T17:33:42.000+0200},\n title = {Secure XML Aware Network Design and Performance Analysis.},\n url = {http://dblp.uni-trier.de/db/conf/iccsa/iccsa2005-1.html#HuhJKM05},\n volume = 3480,\n year = 2005\n}\n\n","author_short":["nam Huh, E.","Jeong, J.","Kim, Y.","Mun, K."],"editor_short":["Gervasi, O.","Gavrilova, M. L.","Kumar, V.","Laganà, A.","Lee, H. P.","Mun, Y.","Taniar, D.","Tan, C. J. K."],"key":"conf/iccsa/HuhJKM05","id":"conf/iccsa/HuhJKM05","bibbaseid":"namhuh-jeong-kim-mun-securexmlawarenetworkdesignandperformanceanalysis-2005","role":"author","urls":{"Link":"https://doi.org/10.1007/11424758_33","Paper":"http://dblp.uni-trier.de/db/conf/iccsa/iccsa2005-1.html#HuhJKM05"},"keyword":["dblp"],"metadata":{"authorlinks":{}},"html":""},"bibtype":"inproceedings","biburl":"http://www.bibsonomy.org/bib/author/huh?items=1000","dataSources":["J2gJAfLLcQLvsAk4c"],"keywords":["dblp"],"search_terms":["secure","xml","aware","network","design","performance","analysis","nam huh","jeong","kim","mun"],"title":"Secure XML Aware Network Design and Performance Analysis.","year":2005}