{"_id":"N43cNmzJvEPEoXsy6","bibbaseid":"you-weippl-informationsecurity-2013","downloads":0,"creationDate":"2017-03-20T08:02:14.762Z","title":"Information Security","author_short":["You, I.","Weippl, E. R."],"year":2013,"bibtype":"article","biburl":"http://dblp.org/pers/tb2/w/Weippl:Edgar_R=.map","bibdata":{"bibtype":"article","type":"article","author":[{"firstnames":["Ilsun"],"propositions":[],"lastnames":["You"],"suffixes":[]},{"firstnames":["Edgar","R."],"propositions":[],"lastnames":["Weippl"],"suffixes":[]}],"title":"Information Security","journal":"J. Univers. Comput. Sci.","volume":"19","number":"16","pages":"2347–2348","year":"2013","url":"http://www.jucs.org/jucs\\_19\\_16/information\\_security","timestamp":"Wed, 17 Feb 2021 00:00:00 +0100","biburl":"https://dblp.org/rec/journals/jucs/YouW13.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@article{DBLP:journals/jucs/YouW13,\n author = {Ilsun You and\n Edgar R. Weippl},\n title = {Information Security},\n journal = {J. Univers. Comput. Sci.},\n volume = {19},\n number = {16},\n pages = {2347--2348},\n year = {2013},\n url = {http://www.jucs.org/jucs\\_19\\_16/information\\_security},\n timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},\n biburl = {https://dblp.org/rec/journals/jucs/YouW13.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["You, I.","Weippl, E. R."],"key":"DBLP:journals/jucs/YouW13","id":"DBLP:journals/jucs/YouW13","bibbaseid":"you-weippl-informationsecurity-2013","role":"author","urls":{"Paper":"http://www.jucs.org/jucs\\_19\\_16/information\\_security"},"metadata":{"authorlinks":{}},"downloads":0,"html":""},"search_terms":["information","security","you","weippl"],"keywords":[],"authorIDs":["PbrP9YFAtA9NxijbL"],"dataSources":["A3zRESQ88WfwMCJn3","xwKFeNnfet6rmuMtX"]}