Last update: Sat Oct 14 03:06:25 MDT 2017
Top |
Symbols |
Math |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z
BibTeX entry
@Article{Gibbs:2009:SHS,
author = "W. Wayt Gibbs",
title = "Security: How to Steal Secrets without a Network",
journal = j-SCI-AMER,
volume = "300",
number = "5",
pages = "58--63",
month = may,
year = "2009",
CODEN = "SCAMAC",
DOI = "https://doi.org/10.1038/scientificamerican0509-58",
ISSN = "0036-8733 (print), 1946-7087 (electronic)",
ISSN-L = "0036-8733",
bibdate = "Fri May 17 10:30:02 MDT 2013",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sciam2000.bib",
URL = "http://www.nature.com/scientificamerican/journal/v300/n5/full/scientificamerican0509-58.html;
http://www.nature.com/scientificamerican/journal/v300/n5/pdf/scientificamerican0509-58.pdf",
acknowledgement = ack-nhfb,
fjournal = "Scientific American",
journal-URL = "http://www.nature.com/scientificamerican",
}
Related entries
- 283-3s-10-z, 283-3s-12-z, 283-3s-38-z,
283(4)36,
283(4)50,
283(5)32,
284(1)36,
284(1)74,
284(2)52,
284(2)56,
284(2)84,
284(3)78,
284(5)26,
284(5)31,
284(5)90,
284(6)98,
284(6)102,
284(6)107-1,
285(1)38,
285(1)38-1,
285(1)99-1,
285(2)16,
285(4)88-1,
285(5)36,
285(6)34,
285(6)56,
285(6)56-1,
286(2)30-1,
286(2)64-1,
286(3)84,
286(3)84-1,
287(3)50,
292(1)94,
292(3)46,
292(4)72,
292(5)94,
293(1)56,
293(3)108,
294(6)4,
295(4)42,
296(4)64,
297(4)76,
297(6)114,
298(5)74,
299(3)88,
301(5)38
- Gibbs, W. Wayt,
283(3)46,
283(4)34,
283(5)36,
283(6)20,
284(1)24,
284(2)16,
284(2)33,
284(3)16,
284(3)33,
284(3)34,
284(4)40,
284(5)62,
285(2)30,
285(2)52,
285(2)52-1,
285(4)16,
285(4)16-1,
285(5)29-1,
285(5)40,
285(5)40-1,
285(5)88,
285(5)88,
286(1)14,
286(2)38,
286(2)38-1,
286(4)62,
286(4)94,
286(5)39,
286(6)98,
287(1)88,
287(2)26,
287(2)78,
287(3)86,
287(5)92,
288(5)23,
289(1)23,
289(1)56,
289(2)88,
289(3)24,
289(4)28,
289(4)94,
289(5)20,
289(5)46,
289(5)100,
289(6)48,
289(6)106,
290(1)37,
290(3)58,
290(4)100,
290(5)75,
290(5)108,
291(2)33,
291(3)56,
291(4)20,
291(5)80,
291(5)96,
292(1)54,
292(5)36-2,
292(6)70,
293(2)23,
293(2)78,
293(3)108,
293(5)44,
293(6)42,
293(6)57,
294(1)64,
295(2)80,
295(3)102,
300(4)18
- network,
282(3)72,
282(6)72,
283(4)40,
284(1)80,
284(1)88,
284(1)96,
286(2)38,
286(2)38-1,
288(5)60,
290(6)84,
296(6)78,
297(4)12,
299(2)16
- secret, 283-6-38,
283(6)70,
284(5)70,
286(2)54,
286(2)54-1,
286(3)92,
286(3)92,
289(2)22,
291(5)28-2,
292(1)78,
294(3)48,
294(6)36,
296(6)39,
299(3)88
- Security,
285(1)16,
285(4)42,
286(3)18,
290(6)108,
295(3)44,
297(3)112,
298(4)98,
299(3)96,
299(6)104,
300(3)70,
301(4)80