Show simple item record

dc.contributor.authorTewari, Hiteshen
dc.contributor.authorHughes, Arthuren
dc.contributor.editorDieter Gollmann, Felix C. Freilingen
dc.date.accessioned2014-02-27T15:35:35Z
dc.date.available2014-02-27T15:35:35Z
dc.date.created19th Sep 2012en
dc.date.issued2012en
dc.date.submitted2012en
dc.identifier.citationMichael Clear, Karl Reid, Desmond Ennis, Arthur Hughes and Hitesh Tewari, Collaboration-Preserving Authenticated Encryption for Operational Transformation Systems, Lecture Notes in Computer Science, Information Security Conference (ISC 2012), Passau, Germany, 19th Sep 2012, Dieter Gollmann, Felix C. Freiling, 7483, Springer Berlin Heidelberg, 2012, 204 - 223en
dc.identifier.otherYen
dc.identifier.urihttp://hdl.handle.net/2262/68179
dc.descriptionPUBLISHEDen
dc.descriptionhttp://link.springer.com/chapter/10.1007%2F978-3-642-33383-5_13en
dc.descriptionPassau, Germanyen
dc.format.extent204en
dc.format.extent223en
dc.language.isoenen
dc.publisherSpringer Berlin Heidelbergen
dc.relation.ispartofseries7483en
dc.rightsYen
dc.titleCollaboration-Preserving Authenticated Encryption for Operational Transformation Systemsen
dc.title.alternativeLecture Notes in Computer Scienceen
dc.title.alternativeInformation Security Conference (ISC 2012)en
dc.typeConference Paperen
dc.type.supercollectionscholarly_publicationsen
dc.type.supercollectionrefereed_publicationsen
dc.identifier.peoplefinderurlhttp://people.tcd.ie/htewarien
dc.identifier.peoplefinderurlhttp://people.tcd.ie/aphughesen
dc.identifier.rssinternalid79806en
dc.identifier.doihttp://dx.doi.org/10.1007/978-3-642-33383-5_13en
dc.rights.ecaccessrightsOpenAccess
dc.relation.doi10.1007/978-3-642-33383-5_13en
dc.subject.TCDThemeTelecommunicationsen
dc.identifier.rssurihttp://link.springer.com/chapter/10.1007%2F978-3-642-33383-5_13en
dc.relation.iscitedbyIsCitedByen
dc.identifier.orcid_id0000-0003-1738-527Xen


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record