BibTeX records: J. Black

download as .bib file

@incollection{DBLP:reference/crypt/Black11,
  author    = {J. Black},
  title     = {Authenticated Encryption},
  booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed.},
  pages     = {52--61},
  year      = {2011},
  crossref  = {DBLP:reference/crypt/2011},
  url       = {https://doi.org/10.1007/978-1-4419-5906-5\_548},
  doi       = {10.1007/978-1-4419-5906-5\_548},
  timestamp = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/reference/crypt/Black11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ibmrd/BlackGLM09,
  author    = {J. Black and
               R. Gottschalk and
               T. Lococo and
               D. Moore},
  title     = {Architectures and technologies for the globally integrated enterprise},
  journal   = {{IBM} Journal of Research and Development},
  volume    = {53},
  number    = {6},
  pages     = {1},
  year      = {2009},
  url       = {https://doi.org/10.1147/JRD.2009.5429029},
  doi       = {10.1147/JRD.2009.5429029},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ibmrd/BlackGLM09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:reference/crypt/2011,
  editor    = {Henk C. A. van Tilborg and
               Sushil Jajodia},
  title     = {Encyclopedia of Cryptography and Security, 2nd Ed},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-1-4419-5906-5},
  doi       = {10.1007/978-1-4419-5906-5},
  isbn      = {978-1-4419-5905-8},
  timestamp = {Tue, 16 May 2017 14:01:51 +0200},
  biburl    = {https://dblp.org/rec/bib/reference/crypt/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
maintained by Schloss Dagstuhl LZI, founded at University of Trier