Cryptographic Security Through a Hardware Root of Trust.
Resource URI: https://dblp.l3s.de/d2r/resource/publications/conf/arc/RojasMunozSMCNKGTPCOAJB24
Home
|
Example Publications
Property
Value
dcterms:
bibliographicCitation
<
http://dblp.uni-trier.de/rec/bibtex/conf/arc/RojasMunozSMCNKGTPCOAJB24
>
dc:
creator
<
https://dblp.l3s.de/d2r/resource/authors/Alejandro_Casado-Gal%E2%88%9A%C2%B0n
>
dc:
creator
<
https://dblp.l3s.de/d2r/resource/authors/Antonio_Acosta-Jim%E2%88%9A%C2%A9nez
>
dc:
creator
<
https://dblp.l3s.de/d2r/resource/authors/Apurba_Karmakar
>
dc:
creator
<
https://dblp.l3s.de/d2r/resource/authors/Carlos_Fern%E2%88%9A%C2%B0ndez_Garc%E2%88%9A%E2%89%A0a
>
dc:
creator
<
https://dblp.l3s.de/d2r/resource/authors/Carlos_Jes%E2%88%9A%C4%BCs_Jim%E2%88%9A%C2%A9nez-Fern%E2%88%9A%C2%B0ndez
>
dc:
creator
<
https://dblp.l3s.de/d2r/resource/authors/Erica_Tena-S%E2%88%9A%C2%B0nchez
>
dc:
creator
<
https://dblp.l3s.de/d2r/resource/authors/Eros_Camacho-Ruiz
>
dc:
creator
<
https://dblp.l3s.de/d2r/resource/authors/Francisco_Eugenio_Potestad-Ord%E2%88%9A%E2%89%A5%E2%88%9A%C4%AAez
>
dc:
creator
<
https://dblp.l3s.de/d2r/resource/authors/Luis_F._Rojas-Mu%E2%88%9A%C4%AAoz
>
dc:
creator
<
https://dblp.l3s.de/d2r/resource/authors/Macarena_C._Mart%E2%88%9A%E2%89%A0nez-Rodr%E2%88%9A%E2%89%A0guez
>
dc:
creator
<
https://dblp.l3s.de/d2r/resource/authors/Pablo_Navarro-Torrero
>
dc:
creator
<
https://dblp.l3s.de/d2r/resource/authors/Pau_Ortega-Castro
>
dc:
creator
<
https://dblp.l3s.de/d2r/resource/authors/Piedad_Brox
>
dc:
creator
<
https://dblp.l3s.de/d2r/resource/authors/Santiago_S%E2%88%9A%C2%B0nchez-Solano
>
foaf:
homepage
<
http://dx.doi.org/doi.org%2F10.1007%2F978-3-031-55673-9%5F8
>
foaf:
homepage
<
https://doi.org/10.1007/978-3-031-55673-9_8
>
dc:
identifier
DBLP conf/arc/RojasMunozSMCNKGTPCOAJB24
(xsd:string)
dc:
identifier
DOI doi.org%2F10.1007%2F978-3-031-55673-9%5F8
(xsd:string)
dcterms:
issued
2024
(xsd:gYear)
rdfs:
label
Cryptographic Security Through a Hardware Root of Trust.
(xsd:string)
foaf:
maker
<
https://dblp.l3s.de/d2r/resource/authors/Alejandro_Casado-Gal%E2%88%9A%C2%B0n
>
foaf:
maker
<
https://dblp.l3s.de/d2r/resource/authors/Antonio_Acosta-Jim%E2%88%9A%C2%A9nez
>
foaf:
maker
<
https://dblp.l3s.de/d2r/resource/authors/Apurba_Karmakar
>
foaf:
maker
<
https://dblp.l3s.de/d2r/resource/authors/Carlos_Fern%E2%88%9A%C2%B0ndez_Garc%E2%88%9A%E2%89%A0a
>
foaf:
maker
<
https://dblp.l3s.de/d2r/resource/authors/Carlos_Jes%E2%88%9A%C4%BCs_Jim%E2%88%9A%C2%A9nez-Fern%E2%88%9A%C2%B0ndez
>
foaf:
maker
<
https://dblp.l3s.de/d2r/resource/authors/Erica_Tena-S%E2%88%9A%C2%B0nchez
>
foaf:
maker
<
https://dblp.l3s.de/d2r/resource/authors/Eros_Camacho-Ruiz
>
foaf:
maker
<
https://dblp.l3s.de/d2r/resource/authors/Francisco_Eugenio_Potestad-Ord%E2%88%9A%E2%89%A5%E2%88%9A%C4%AAez
>
foaf:
maker
<
https://dblp.l3s.de/d2r/resource/authors/Luis_F._Rojas-Mu%E2%88%9A%C4%AAoz
>
foaf:
maker
<
https://dblp.l3s.de/d2r/resource/authors/Macarena_C._Mart%E2%88%9A%E2%89%A0nez-Rodr%E2%88%9A%E2%89%A0guez
>
foaf:
maker
<
https://dblp.l3s.de/d2r/resource/authors/Pablo_Navarro-Torrero
>
foaf:
maker
<
https://dblp.l3s.de/d2r/resource/authors/Pau_Ortega-Castro
>
foaf:
maker
<
https://dblp.l3s.de/d2r/resource/authors/Piedad_Brox
>
foaf:
maker
<
https://dblp.l3s.de/d2r/resource/authors/Santiago_S%E2%88%9A%C2%B0nchez-Solano
>
swrc:
pages
106-119
(xsd:string)
dcterms:
partOf
<
https://dblp.l3s.de/d2r/resource/publications/conf/arc/2024
>
owl:
sameAs
<
http://bibsonomy.org/uri/bibtexkey/conf/arc/RojasMunozSMCNKGTPCOAJB24/dblp
>
owl:
sameAs
<
http://dblp.rkbexplorer.com/id/conf/arc/RojasMunozSMCNKGTPCOAJB24
>
rdfs:
seeAlso
<
http://dblp.uni-trier.de/db/conf/arc/arc2024.html#RojasMunozSMCNKGTPCOAJB24
>
rdfs:
seeAlso
<
https://doi.org/10.1007/978-3-031-55673-9_8
>
swrc:
series
<
https://dblp.l3s.de/d2r/resource/conferences/arc
>
dc:
title
Cryptographic Security Through a Hardware Root of Trust.
(xsd:string)
dc:
type
<
http://purl.org/dc/dcmitype/Text
>
rdf:
type
swrc:InProceedings
rdf:
type
foaf:Document