Show simple item record

dc.contributor.author
Zhang, Fuyuan
dc.contributor.author
Jia, Limin
dc.contributor.author
Basescu, Cristina
dc.contributor.author
Kim, Tiffany Hyun-Jin
dc.contributor.author
Hu, Yih-Chun
dc.contributor.author
Perrig, Adrian
dc.date.accessioned
2017-06-11T13:24:35Z
dc.date.available
2017-06-11T13:24:35Z
dc.date.issued
2014
dc.identifier.isbn
978-1-4503-2957-6
dc.identifier.other
10.1145/2660267.2660349
dc.identifier.uri
http://hdl.handle.net/20.500.11850/91671
dc.language.iso
en
dc.publisher
ACM
dc.subject
Origin authenticity
dc.subject
Path authenticity
dc.subject
Formal methods
dc.subject
Mechanized proofs
dc.title
Mechanized Network Origin and Path Authenticity Proofs
dc.type
Conference Paper
ethz.journal.title
Proceedings of the ACM Conference on Computer and Communications Security (CCS 2014)
ethz.pages.start
346
ethz.pages.end
357
ethz.event
21st ACM Conference on Computer and Communications Security, CSS 2014
ethz.event.location
Scottsdale, AZ, USA
ethz.event.date
November 3-7, 2014
ethz.publication.place
New York, N.Y.
ethz.publication.status
published
ethz.leitzahl
ETH Zürich::00002 - ETH Zürich::00012 - Lehre und Forschung::00007 - Departemente::02150 - Dep. Informatik / Dep. of Computer Science::02660 - Institut für Informationssicherheit / Institute of Information Security::03975 - Perrig, Adrian / Perrig, Adrian
ethz.leitzahl.certified
ETH Zürich::00002 - ETH Zürich::00012 - Lehre und Forschung::00007 - Departemente::02150 - Dep. Informatik / Dep. of Computer Science::02660 - Institut für Informationssicherheit / Institute of Information Security::03975 - Perrig, Adrian / Perrig, Adrian
ethz.date.deposited
2017-06-11T13:24:53Z
ethz.source
ECIT
ethz.identifier.importid
imp59365278c0ef656389
ethz.ecitpid
pub:144195
ethz.eth
yes
ethz.availability
Metadata only
ethz.rosetta.installDate
2017-07-13T15:45:49Z
ethz.rosetta.lastUpdated
2022-03-28T13:15:48Z
ethz.rosetta.versionExported
true
ethz.COinS
ctx_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.atitle=Mechanized%20Network%20Origin%20and%20Path%20Authenticity%20Proofs&rft.jtitle=Proceedings%20of%20the%20ACM%20Conference%20on%20Computer%20and%20Communications%20Security%20(CCS%202014)&rft.date=2014&rft.spage=346&rft.epage=357&rft.au=Zhang,%20Fuyuan&Jia,%20Limin&Basescu,%20Cristina&Kim,%20Tiffany%20Hyun-Jin&Hu,%20Yih-Chun&rft.isbn=978-1-4503-2957-6&rft.genre=proceeding&rft_id=info:doi/10.1145/2660267.2660349&
 Search print copy at ETH Library

Files in this item

FilesSizeFormatOpen in viewer

There are no files associated with this item.

Publication type

Show simple item record