Last update: Sun Mar 31 02:13:37 MDT 2019
@Article{Uzun:2004:BRB,
author = "Isa Servan Uzun",
title = "Book Review: {{\booktitle{Cryptographic Security
Architecture --- Design and Verification}}, by Peter
Gutmann}",
journal = j-COMP-J,
volume = "47",
number = "5",
pages = "622--623",
month = sep,
year = "2004",
CODEN = "CMPJA6",
DOI = "https://doi.org/10.1093/comjnl/47.5.622",
ISSN = "0010-4620 (print), 1460-2067 (electronic)",
ISSN-L = "0010-4620",
bibdate = "Tue Jun 28 17:48:35 MDT 2005",
bibsource = "http://www.math.utah.edu/pub/tex/bib/compj2000.bib;
http://www3.oup.co.uk/computer_journal/hdb/Volume_47/Issue_05/",
URL = "http://www3.oup.co.uk/computer_journal/free_pdf/470622a.pdf;
http://www3.oup.co.uk/computer_journal/hdb/Volume_47/Issue_05/470622a.sgm.abs.html",
acknowledgement = ack-nhfb,
fjournal = "The Computer Journal",
journal-URL = "http://comjnl.oxfordjournals.org/",
}