Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Journal Article
%1 Wright2008a
%A Wright, D.
%A Friedewald, M.
%A Schreurs, W.
%A Verlinden, M.
%A Gutwirth, S.
%A Punie, Y.
%A Maghiros, I.
%A Vildjiounaite, E.
%A Alahuhta, P.
%D 2008
%I ACM ASSOCIATION FOR COMPUTING MACHINERY
%J Commun. ACM
%K Computing; Ubiquitous Privacy
%N 3
%P 56
%T The illusion of security
%V 51
%X Stellt ein Szenario vor, an dem die Gefährdungen und unrealistischen Annahmen, bzgl. der These Sicherheit sei herstellbar, diskutiert werden.
@article{Wright2008a,
abstract = {Stellt ein Szenario vor, an dem die Gefährdungen und unrealistischen Annahmen, bzgl. der These Sicherheit sei herstellbar, diskutiert werden.},
added-at = {2012-01-19T16:07:25.000+0100},
author = {Wright, D. and Friedewald, M. and Schreurs, W. and Verlinden, M. and Gutwirth, S. and Punie, Y. and Maghiros, I. and Vildjiounaite, E. and Alahuhta, P.},
biburl = {https://www.bibsonomy.org/bibtex/2bd06cc5ed9e0627d6afde9dc997516c6/enitsirhc},
interhash = {31465855500a3a81263ea4c38b6a6e31},
intrahash = {bd06cc5ed9e0627d6afde9dc997516c6},
journal = {Commun. ACM},
keywords = {Computing; Ubiquitous Privacy},
number = 3,
pages = 56,
publisher = {ACM ASSOCIATION FOR COMPUTING MACHINERY},
timestamp = {2012-01-19T16:07:25.000+0100},
title = {The illusion of security},
volume = 51,
year = 2008
}