{"author":[{"first_name":"Tibor","last_name":"Jager","full_name":"Jager, Tibor"},{"first_name":"Juraj","full_name":"Somorovsky, Juraj","id":"83504","last_name":"Somorovsky","orcid":"0000-0002-3593-7720"}],"date_created":"2020-02-15T10:17:17Z","date_updated":"2022-01-06T06:52:40Z","main_file_link":[{"url":"https://www.nds.ruhr-uni-bochum.de/media/nds/veroeffentlichungen/2011/10/22/HowToBreakXMLenc.pdf"}],"doi":"10.1145/2046707.2046756","title":"How to break XML encryption","publication_status":"published","publication_identifier":{"isbn":["9781450309486"]},"citation":{"ieee":"T. Jager and J. Somorovsky, “How to break XML encryption,” in Proceedings of the 18th ACM conference on Computer and communications security - CCS ’11, 2011.","chicago":"Jager, Tibor, and Juraj Somorovsky. “How to Break XML Encryption.” In Proceedings of the 18th ACM Conference on Computer and Communications Security - CCS ’11, 2011. https://doi.org/10.1145/2046707.2046756.","ama":"Jager T, Somorovsky J. How to break XML encryption. In: Proceedings of the 18th ACM Conference on Computer and Communications Security - CCS ’11. ; 2011. doi:10.1145/2046707.2046756","apa":"Jager, T., & Somorovsky, J. (2011). How to break XML encryption. In Proceedings of the 18th ACM conference on Computer and communications security - CCS ’11. https://doi.org/10.1145/2046707.2046756","bibtex":"@inproceedings{Jager_Somorovsky_2011, title={How to break XML encryption}, DOI={10.1145/2046707.2046756}, booktitle={Proceedings of the 18th ACM conference on Computer and communications security - CCS ’11}, author={Jager, Tibor and Somorovsky, Juraj}, year={2011} }","short":"T. Jager, J. Somorovsky, in: Proceedings of the 18th ACM Conference on Computer and Communications Security - CCS ’11, 2011.","mla":"Jager, Tibor, and Juraj Somorovsky. “How to Break XML Encryption.” Proceedings of the 18th ACM Conference on Computer and Communications Security - CCS ’11, 2011, doi:10.1145/2046707.2046756."},"year":"2011","user_id":"83504","_id":"15915","language":[{"iso":"eng"}],"extern":"1","type":"conference","publication":"Proceedings of the 18th ACM conference on Computer and communications security - CCS '11","status":"public"}