Security analysis and resource requirements of group-oriented user access control for hardware-constrained wireless network services. Ventura, D., Gómez-Goiri, A., Catania, V., de Ipiña, D. L., Naranjo, J. A. M., & Casado, L. G. Logic Journal of the IGPL, 24(1):80-91, 2016. Link Paper bibtex @article{journals/igpl/VenturaGCLNC16,
added-at = {2016-02-11T00:00:00.000+0100},
author = {Ventura, Daniela and Gómez-Goiri, Aitor and Catania, Vincenzo and de Ipiña, Diego López and Naranjo, J. A. M. and Casado, Leocadio G.},
biburl = {http://www.bibsonomy.org/bibtex/281ed3ba090f24592a5bde50338e96fea/dblp},
ee = {http://dx.doi.org/10.1093/jigpal/jzv045},
interhash = {75e2c9a988870a84a7640efd4e57c666},
intrahash = {81ed3ba090f24592a5bde50338e96fea},
journal = {Logic Journal of the IGPL},
keywords = {dblp},
number = 1,
pages = {80-91},
timestamp = {2016-02-12T11:36:13.000+0100},
title = {Security analysis and resource requirements of group-oriented user access control for hardware-constrained wireless network services.},
url = {http://dblp.uni-trier.de/db/journals/igpl/igpl24.html#VenturaGCLNC16},
volume = 24,
year = 2016
}
Downloads: 0
{"_id":"xghYp853gPKHLtNQ6","bibbaseid":"ventura-gmezgoiri-catania-deipia-naranjo-casado-securityanalysisandresourcerequirementsofgrouporienteduseraccesscontrolforhardwareconstrainedwirelessnetworkservices-2016","downloads":0,"creationDate":"2016-02-15T15:11:14.372Z","title":"Security analysis and resource requirements of group-oriented user access control for hardware-constrained wireless network services.","author_short":["Ventura, D.","Gómez-Goiri, A.","Catania, V.","de Ipiña, D. L.","Naranjo, J. A. M.","Casado, L. G."],"year":2016,"bibtype":"article","biburl":"http://www.bibsonomy.org/bib/author/pablo j gonzalez?items=1000","bibdata":{"bibtype":"article","type":"article","added-at":"2016-02-11T00:00:00.000+0100","author":[{"propositions":[],"lastnames":["Ventura"],"firstnames":["Daniela"],"suffixes":[]},{"propositions":[],"lastnames":["Gómez-Goiri"],"firstnames":["Aitor"],"suffixes":[]},{"propositions":[],"lastnames":["Catania"],"firstnames":["Vincenzo"],"suffixes":[]},{"propositions":["de"],"lastnames":["Ipiña"],"firstnames":["Diego","López"],"suffixes":[]},{"propositions":[],"lastnames":["Naranjo"],"firstnames":["J.","A.","M."],"suffixes":[]},{"propositions":[],"lastnames":["Casado"],"firstnames":["Leocadio","G."],"suffixes":[]}],"biburl":"http://www.bibsonomy.org/bibtex/281ed3ba090f24592a5bde50338e96fea/dblp","ee":"http://dx.doi.org/10.1093/jigpal/jzv045","interhash":"75e2c9a988870a84a7640efd4e57c666","intrahash":"81ed3ba090f24592a5bde50338e96fea","journal":"Logic Journal of the IGPL","keywords":"dblp","number":"1","pages":"80-91","timestamp":"2016-02-12T11:36:13.000+0100","title":"Security analysis and resource requirements of group-oriented user access control for hardware-constrained wireless network services.","url":"http://dblp.uni-trier.de/db/journals/igpl/igpl24.html#VenturaGCLNC16","volume":"24","year":"2016","bibtex":"@article{journals/igpl/VenturaGCLNC16,\n added-at = {2016-02-11T00:00:00.000+0100},\n author = {Ventura, Daniela and Gómez-Goiri, Aitor and Catania, Vincenzo and de Ipiña, Diego López and Naranjo, J. A. M. and Casado, Leocadio G.},\n biburl = {http://www.bibsonomy.org/bibtex/281ed3ba090f24592a5bde50338e96fea/dblp},\n ee = {http://dx.doi.org/10.1093/jigpal/jzv045},\n interhash = {75e2c9a988870a84a7640efd4e57c666},\n intrahash = {81ed3ba090f24592a5bde50338e96fea},\n journal = {Logic Journal of the IGPL},\n keywords = {dblp},\n number = 1,\n pages = {80-91},\n timestamp = {2016-02-12T11:36:13.000+0100},\n title = {Security analysis and resource requirements of group-oriented user access control for hardware-constrained wireless network services.},\n url = {http://dblp.uni-trier.de/db/journals/igpl/igpl24.html#VenturaGCLNC16},\n volume = 24,\n year = 2016\n}\n\n","author_short":["Ventura, D.","Gómez-Goiri, A.","Catania, V.","de Ipiña, D. L.","Naranjo, J. A. M.","Casado, L. G."],"key":"journals/igpl/VenturaGCLNC16","id":"journals/igpl/VenturaGCLNC16","bibbaseid":"ventura-gmezgoiri-catania-deipia-naranjo-casado-securityanalysisandresourcerequirementsofgrouporienteduseraccesscontrolforhardwareconstrainedwirelessnetworkservices-2016","role":"author","urls":{"Link":"http://dx.doi.org/10.1093/jigpal/jzv045","Paper":"http://dblp.uni-trier.de/db/journals/igpl/igpl24.html#VenturaGCLNC16"},"keyword":["dblp"],"downloads":0},"search_terms":["security","analysis","resource","requirements","group","oriented","user","access","control","hardware","constrained","wireless","network","services","ventura","gómez-goiri","catania","de ipiña","naranjo","casado"],"keywords":["dblp"],"authorIDs":[],"dataSources":["Lao6JF73XpBJmfaxa"]}