[RDF data]
Home | Example Publications
PropertyValue
dcterms:bibliographicCitation <http://dblp.uni-trier.de/rec/bibtex/journals/compsec/Highland87r>
dc:creator <https://dblp.l3s.de/d2r/resource/authors/Harold_Joseph_Highland>
foaf:homepage <http://dx.doi.org/doi.org%2F10.1016%2F0167-4048%2887%2990104-0>
foaf:homepage <https://doi.org/10.1016/0167-4048(87)90104-0>
dc:identifier DBLP journals/compsec/Highland87r (xsd:string)
dc:identifier DOI doi.org%2F10.1016%2F0167-4048%2887%2990104-0 (xsd:string)
dcterms:issued 1987 (xsd:gYear)
swrc:journal <https://dblp.l3s.de/d2r/resource/journals/compsec>
rdfs:label How to evaluate microcomputer encryption software and hardware. (xsd:string)
foaf:maker <https://dblp.l3s.de/d2r/resource/authors/Harold_Joseph_Highland>
swrc:number 3 (xsd:string)
swrc:pages 229-244 (xsd:string)
owl:sameAs <http://bibsonomy.org/uri/bibtexkey/journals/compsec/Highland87r/dblp>
owl:sameAs <http://dblp.rkbexplorer.com/id/journals/compsec/Highland87r>
rdfs:seeAlso <http://dblp.uni-trier.de/db/journals/compsec/compsec6.html#Highland87r>
rdfs:seeAlso <https://doi.org/10.1016/0167-4048(87)90104-0>
dc:title How to evaluate microcomputer encryption software and hardware. (xsd:string)
dc:type <http://purl.org/dc/dcmitype/Text>
rdf:type swrc:Article
rdf:type foaf:Document
swrc:volume 6 (xsd:string)