Property | Value |
dcterms:bibliographicCitation
|
<http://dblp.uni-trier.de/rec/bibtex/conf/hipeac/2014cs>
|
dc:creator
|
<https://dblp.l3s.de/d2r/resource/authors/Gerardo_Pelosi>
|
dc:creator
|
<https://dblp.l3s.de/d2r/resource/authors/Israel_Koren>
|
dc:creator
|
<https://dblp.l3s.de/d2r/resource/authors/Jens_Knoop>
|
dc:creator
|
<https://dblp.l3s.de/d2r/resource/authors/Valentina_Salapura>
|
swrc:editor
|
<https://dblp.l3s.de/d2r/resource/authors/Gerardo_Pelosi>
|
swrc:editor
|
<https://dblp.l3s.de/d2r/resource/authors/Israel_Koren>
|
swrc:editor
|
<https://dblp.l3s.de/d2r/resource/authors/Jens_Knoop>
|
swrc:editor
|
<https://dblp.l3s.de/d2r/resource/authors/Valentina_Salapura>
|
foaf:homepage
|
<http://dl.acm.org/citation.cfm?id=2556315>
|
dc:identifier
|
DBLP conf/hipeac/2014cs
(xsd:string)
|
dc:identifier
|
ISBN 978-1-4503-2484-7
(xsd:string)
|
swrc:isbn
|
ISBN 978-1-4503-2484-7
(xsd:string)
|
dcterms:issued
|
2014
(xsd:gYear)
|
rdfs:label
|
Proceedings of the First Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC 2014, Vienna, Austria, January 20, 2014
(xsd:string)
|
is
dcterms:partOf
of
|
<https://dblp.l3s.de/d2r/resource/publications/conf/hipeac/BerlachLSLH14>
|
is
dcterms:partOf
of
|
<https://dblp.l3s.de/d2r/resource/publications/conf/hipeac/DangerDGS14>
|
is
dcterms:partOf
of
|
<https://dblp.l3s.de/d2r/resource/publications/conf/hipeac/GominaGCRT14>
|
is
dcterms:partOf
of
|
<https://dblp.l3s.de/d2r/resource/publications/conf/hipeac/LacknerBWS14>
|
is
dcterms:partOf
of
|
<https://dblp.l3s.de/d2r/resource/publications/conf/hipeac/PicekEBJCG14>
|
is
dcterms:partOf
of
|
<https://dblp.l3s.de/d2r/resource/publications/conf/hipeac/SaraswatFKD14>
|
is
dcterms:partOf
of
|
<https://dblp.l3s.de/d2r/resource/publications/conf/hipeac/SchnarzWS14>
|
is
dcterms:partOf
of
|
<https://dblp.l3s.de/d2r/resource/publications/conf/hipeac/SeepersSSZ14>
|
is
dcterms:partOf
of
|
<https://dblp.l3s.de/d2r/resource/publications/conf/hipeac/SpreitzerS14>
|
dc:publisher
|
ACM
(xsd:string)
|
owl:sameAs
|
<http://bibsonomy.org/uri/bibtexkey/conf/hipeac/2014cs/dblp>
|
owl:sameAs
|
<http://dblp.rkbexplorer.com/id/conf/hipeac/2014cs>
|
owl:sameAs
|
<urn:isbn:978-1-4503-2484-7>
|
rdfs:seeAlso
|
<http://amazon.com/s/ref=nb_ss_gw?field-keywords=978-1-4503-2484-7>
|
rdfs:seeAlso
|
<http://dl.acm.org/citation.cfm?id=2556315>
|
swrc:series
|
<https://dblp.l3s.de/d2r/resource/conferences/hipeac>
|
dcterms:tableOfContent
|
<http://dblp.uni-trier.de/db/conf/hipeac/cs2014.html>
|
dc:title
|
Proceedings of the First Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC 2014, Vienna, Austria, January 20, 2014
(xsd:string)
|
dc:type
|
<http://purl.org/dc/dcmitype/Collection>
|
rdf:type
|
swrc:Proceedings
|
rdf:type
|
foaf:Document
|