Bitte melden Sie sich an um selbst Rezensionen oder Kommentare zu erstellen.
Zitieren Sie diese Publikation
Mehr Zitationsstile
- bitte auswählen -
%0 Conference Paper
%1 conf/acsac/Bishop90
%A Bishop, Matt
%B ACSAC
%D 1990
%I IEEE
%K dblp
%P 20-29
%T A security analysis of the NTP protocol version 2.
%U http://dblp.uni-trier.de/db/conf/acsac/acsac1990.html#Bishop90
@inproceedings{conf/acsac/Bishop90,
added-at = {2016-02-03T00:00:00.000+0100},
author = {Bishop, Matt},
biburl = {https://www.bibsonomy.org/bibtex/2c410c00651f2241eb1e230e767047c58/dblp},
booktitle = {ACSAC},
crossref = {conf/acsac/1990},
ee = {http://dx.doi.org/10.1109/CSAC.1990.143746},
interhash = {472b23fd79d266d9c14b8b841e94534c},
intrahash = {c410c00651f2241eb1e230e767047c58},
keywords = {dblp},
pages = {20-29},
publisher = {IEEE},
timestamp = {2016-02-04T11:39:49.000+0100},
title = {A security analysis of the NTP protocol version 2.},
url = {http://dblp.uni-trier.de/db/conf/acsac/acsac1990.html#Bishop90},
year = 1990
}