Run-time selection of security algorithms for networked devices. Taddeo, A. V. & Ferrante, A. In Mueller, P. & Cesana, M., editors, Q2SWinet, pages 92-96, 2009. ACM.
Link
Paper bibtex @inproceedings{conf/mswim/TaddeoF09,
added-at = {2014-09-19T00:00:00.000+0200},
author = {Taddeo, Antonio Vincenzo and Ferrante, Alberto},
biburl = {http://www.bibsonomy.org/bibtex/28d5164c7e13229c071c88f10b951d18e/dblp},
booktitle = {Q2SWinet},
crossref = {conf/mswim/2009q},
editor = {Mueller, Peter and Cesana, Matteo},
ee = {http://doi.acm.org/10.1145/1641944.1641963},
interhash = {b97db26a07ed101669668d6f0a27134c},
intrahash = {8d5164c7e13229c071c88f10b951d18e},
isbn = {978-1-60558-619-9},
keywords = {dblp},
pages = {92-96},
publisher = {ACM},
timestamp = {2015-06-19T07:42:40.000+0200},
title = {Run-time selection of security algorithms for networked devices.},
url = {http://dblp.uni-trier.de/db/conf/mswim/q2swinet2009.html#TaddeoF09},
year = 2009
}
Downloads: 0
{"_id":"ARbyy5zN2ShifqCTy","bibbaseid":"taddeo-ferrante-runtimeselectionofsecurityalgorithmsfornetworkeddevices-2009","downloads":0,"creationDate":"2016-01-30T12:17:55.699Z","title":"Run-time selection of security algorithms for networked devices.","author_short":["Taddeo, A. V.","Ferrante, A."],"year":2009,"bibtype":"inproceedings","biburl":"http://www.bibsonomy.org/bib/author/ferrante eliseo?items=1000","bibdata":{"bibtype":"inproceedings","type":"inproceedings","added-at":"2014-09-19T00:00:00.000+0200","author":[{"propositions":[],"lastnames":["Taddeo"],"firstnames":["Antonio","Vincenzo"],"suffixes":[]},{"propositions":[],"lastnames":["Ferrante"],"firstnames":["Alberto"],"suffixes":[]}],"biburl":"http://www.bibsonomy.org/bibtex/28d5164c7e13229c071c88f10b951d18e/dblp","booktitle":"Q2SWinet","crossref":"conf/mswim/2009q","editor":[{"propositions":[],"lastnames":["Mueller"],"firstnames":["Peter"],"suffixes":[]},{"propositions":[],"lastnames":["Cesana"],"firstnames":["Matteo"],"suffixes":[]}],"ee":"http://doi.acm.org/10.1145/1641944.1641963","interhash":"b97db26a07ed101669668d6f0a27134c","intrahash":"8d5164c7e13229c071c88f10b951d18e","isbn":"978-1-60558-619-9","keywords":"dblp","pages":"92-96","publisher":"ACM","timestamp":"2015-06-19T07:42:40.000+0200","title":"Run-time selection of security algorithms for networked devices.","url":"http://dblp.uni-trier.de/db/conf/mswim/q2swinet2009.html#TaddeoF09","year":"2009","bibtex":"@inproceedings{conf/mswim/TaddeoF09,\n added-at = {2014-09-19T00:00:00.000+0200},\n author = {Taddeo, Antonio Vincenzo and Ferrante, Alberto},\n biburl = {http://www.bibsonomy.org/bibtex/28d5164c7e13229c071c88f10b951d18e/dblp},\n booktitle = {Q2SWinet},\n crossref = {conf/mswim/2009q},\n editor = {Mueller, Peter and Cesana, Matteo},\n ee = {http://doi.acm.org/10.1145/1641944.1641963},\n interhash = {b97db26a07ed101669668d6f0a27134c},\n intrahash = {8d5164c7e13229c071c88f10b951d18e},\n isbn = {978-1-60558-619-9},\n keywords = {dblp},\n pages = {92-96},\n publisher = {ACM},\n timestamp = {2015-06-19T07:42:40.000+0200},\n title = {Run-time selection of security algorithms for networked devices.},\n url = {http://dblp.uni-trier.de/db/conf/mswim/q2swinet2009.html#TaddeoF09},\n year = 2009\n}\n\n","author_short":["Taddeo, A. V.","Ferrante, A."],"editor_short":["Mueller, P.","Cesana, M."],"key":"conf/mswim/TaddeoF09","id":"conf/mswim/TaddeoF09","bibbaseid":"taddeo-ferrante-runtimeselectionofsecurityalgorithmsfornetworkeddevices-2009","role":"author","urls":{"Link":"http://doi.acm.org/10.1145/1641944.1641963","Paper":"http://dblp.uni-trier.de/db/conf/mswim/q2swinet2009.html#TaddeoF09"},"keyword":["dblp"],"downloads":0},"search_terms":["run","time","selection","security","algorithms","networked","devices","taddeo","ferrante"],"keywords":["dblp"],"authorIDs":[],"dataSources":["fdxJKYwAiKyc9RArn"]}