Cryptographie Références bibliographiques. TI Techniques de l'Ingénieur, 1998.
Paper bibtex @article{
title = {Cryptographie Références bibliographiques},
type = {article},
year = {1998},
pages = {1998},
id = {2fb78853-2b70-39ff-9fa6-db3602ff5c30},
created = {2011-12-15T13:46:46.000Z},
file_attached = {true},
profile_id = {181202e9-9e14-3446-b699-8df37a3580b5},
group_id = {36e61195-3063-323c-b879-d6d31394db8a},
last_modified = {2017-03-14T14:39:23.619Z},
tags = {Mathématiques},
read = {true},
starred = {false},
authored = {false},
confirmed = {true},
hidden = {false},
citation_key = {TI1998w},
folder_uuids = {d10a704f-f298-425b-99b3-9752b6438360},
private_publication = {false},
bibtype = {article},
author = {TI, undefined},
journal = {Techniques de l'Ingénieur}
}
Downloads: 0
{"_id":"NGjvqN95pyPQEEnbA","bibbaseid":"ti-cryptographierfrencesbibliographiques-1998","downloads":0,"creationDate":"2017-10-18T08:27:05.713Z","title":"Cryptographie Références bibliographiques","author_short":["TI"],"year":1998,"bibtype":"article","biburl":null,"bibdata":{"title":"Cryptographie Références bibliographiques","type":"article","year":"1998","pages":"1998","id":"2fb78853-2b70-39ff-9fa6-db3602ff5c30","created":"2011-12-15T13:46:46.000Z","file_attached":"true","profile_id":"181202e9-9e14-3446-b699-8df37a3580b5","group_id":"36e61195-3063-323c-b879-d6d31394db8a","last_modified":"2017-03-14T14:39:23.619Z","tags":"Mathématiques","read":"true","starred":false,"authored":false,"confirmed":"true","hidden":false,"citation_key":"TI1998w","folder_uuids":"d10a704f-f298-425b-99b3-9752b6438360","private_publication":false,"bibtype":"article","author":"TI, undefined","journal":"Techniques de l'Ingénieur","bibtex":"@article{\n title = {Cryptographie Références bibliographiques},\n type = {article},\n year = {1998},\n pages = {1998},\n id = {2fb78853-2b70-39ff-9fa6-db3602ff5c30},\n created = {2011-12-15T13:46:46.000Z},\n file_attached = {true},\n profile_id = {181202e9-9e14-3446-b699-8df37a3580b5},\n group_id = {36e61195-3063-323c-b879-d6d31394db8a},\n last_modified = {2017-03-14T14:39:23.619Z},\n tags = {Mathématiques},\n read = {true},\n starred = {false},\n authored = {false},\n confirmed = {true},\n hidden = {false},\n citation_key = {TI1998w},\n folder_uuids = {d10a704f-f298-425b-99b3-9752b6438360},\n private_publication = {false},\n bibtype = {article},\n author = {TI, undefined},\n journal = {Techniques de l'Ingénieur}\n}","author_short":["TI"],"urls":{"Paper":"https://bibbase.org/service/mendeley/25bd5b32-29aa-37df-a206-ab5dc511be68/file/20f71fdf-8cd4-0b71-1a01-b5fd493b4aaf/1998-Cryptographie_Rfrences_bibliographiques.pdf.pdf"},"bibbaseid":"ti-cryptographierfrencesbibliographiques-1998","role":"author","downloads":0,"html":""},"search_terms":["cryptographie","rences","bibliographiques","ti"],"keywords":[],"authorIDs":[]}