A consistent history authentication protocol. Rotondi, G. & Guerrera, G. ACM SIGSOFT Software Engineering Notes, 31(3):1-7, 2006. Link Paper bibtex @article{journals/sigsoft/RotondiG06,
added-at = {2008-05-07T00:00:00.000+0200},
author = {Rotondi, Guido and Guerrera, Gianpiero},
biburl = {http://www.bibsonomy.org/bibtex/22f0e787e1c9a2bef9e6a1c1dd0d6e2dd/dblp},
date = {2008-05-07},
description = {dblp},
ee = {http://doi.acm.org/10.1145/1127878.1127887},
interhash = {b6399e3440ad104096e6d7ca11fc6412},
intrahash = {2f0e787e1c9a2bef9e6a1c1dd0d6e2dd},
journal = {ACM SIGSOFT Software Engineering Notes},
keywords = {dblp},
number = 3,
pages = {1-7},
timestamp = {2008-05-08T11:41:30.000+0200},
title = {A consistent history authentication protocol.},
url = {http://dblp.uni-trier.de/db/journals/sigsoft/sigsoft31.html#RotondiG06},
volume = 31,
year = 2006
}
Downloads: 0
{"_id":"PFtYJ8CgbRfenepeF","bibbaseid":"rotondi-guerrera-aconsistenthistoryauthenticationprotocol-2006","downloads":0,"creationDate":"2016-06-07T10:36:23.595Z","title":"A consistent history authentication protocol.","author_short":["Rotondi, G.","Guerrera, G."],"year":2006,"bibtype":"article","biburl":"http://www.bibsonomy.org/bib/author/guerrera?items=1000","bibdata":{"bibtype":"article","type":"article","added-at":"2008-05-07T00:00:00.000+0200","author":[{"propositions":[],"lastnames":["Rotondi"],"firstnames":["Guido"],"suffixes":[]},{"propositions":[],"lastnames":["Guerrera"],"firstnames":["Gianpiero"],"suffixes":[]}],"biburl":"http://www.bibsonomy.org/bibtex/22f0e787e1c9a2bef9e6a1c1dd0d6e2dd/dblp","date":"2008-05-07","description":"dblp","ee":"http://doi.acm.org/10.1145/1127878.1127887","interhash":"b6399e3440ad104096e6d7ca11fc6412","intrahash":"2f0e787e1c9a2bef9e6a1c1dd0d6e2dd","journal":"ACM SIGSOFT Software Engineering Notes","keywords":"dblp","number":"3","pages":"1-7","timestamp":"2008-05-08T11:41:30.000+0200","title":"A consistent history authentication protocol.","url":"http://dblp.uni-trier.de/db/journals/sigsoft/sigsoft31.html#RotondiG06","volume":"31","year":"2006","bibtex":"@article{journals/sigsoft/RotondiG06,\n added-at = {2008-05-07T00:00:00.000+0200},\n author = {Rotondi, Guido and Guerrera, Gianpiero},\n biburl = {http://www.bibsonomy.org/bibtex/22f0e787e1c9a2bef9e6a1c1dd0d6e2dd/dblp},\n date = {2008-05-07},\n description = {dblp},\n ee = {http://doi.acm.org/10.1145/1127878.1127887},\n interhash = {b6399e3440ad104096e6d7ca11fc6412},\n intrahash = {2f0e787e1c9a2bef9e6a1c1dd0d6e2dd},\n journal = {ACM SIGSOFT Software Engineering Notes},\n keywords = {dblp},\n number = 3,\n pages = {1-7},\n timestamp = {2008-05-08T11:41:30.000+0200},\n title = {A consistent history authentication protocol.},\n url = {http://dblp.uni-trier.de/db/journals/sigsoft/sigsoft31.html#RotondiG06},\n volume = 31,\n year = 2006\n}\n\n","author_short":["Rotondi, G.","Guerrera, G."],"key":"journals/sigsoft/RotondiG06","id":"journals/sigsoft/RotondiG06","bibbaseid":"rotondi-guerrera-aconsistenthistoryauthenticationprotocol-2006","role":"author","urls":{"Link":"http://doi.acm.org/10.1145/1127878.1127887","Paper":"http://dblp.uni-trier.de/db/journals/sigsoft/sigsoft31.html#RotondiG06"},"keyword":["dblp"],"downloads":0},"search_terms":["consistent","history","authentication","protocol","rotondi","guerrera"],"keywords":["dblp"],"authorIDs":[],"dataSources":["b5r29Q7XJ5dNwsHfo"]}