summaryrefslogtreecommitdiff
path: root/doc/system-documentation/thesis.bbl
diff options
context:
space:
mode:
Diffstat (limited to 'doc/system-documentation/thesis.bbl')
-rw-r--r--doc/system-documentation/thesis.bbl148
1 files changed, 47 insertions, 101 deletions
diff --git a/doc/system-documentation/thesis.bbl b/doc/system-documentation/thesis.bbl
index efd9b6e..b30324b 100644
--- a/doc/system-documentation/thesis.bbl
+++ b/doc/system-documentation/thesis.bbl
@@ -22,7 +22,7 @@
\entry{jerome2015}{article}{}
\name{author}{4}{}{%
{{hash=e042fd1cbe6bde0a3c8d7e8074ded97f}{%
- family={J{é}r{ô}me},
+ family={Jérôme},
familyi={J\bibinitperiod},
given={Brugger},
giveni={B\bibinitperiod}}}%
@@ -52,10 +52,10 @@
\strng{authornamehash}{7c1cd3857fa434fc3f5603bf8f77898f}
\strng{authorfullhash}{2a4edbd7fe20c9aeda5b1dfcb9ebb082}
\field{sortinit}{1}
- \field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
+ \field{sortinithash}{4f6aaa89bab872aa0999fec09ff8e98a}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
- \field{title}{AHV-Nummer als einheitlicher, organisations{ü}bergreifender Personenidentifikator}
+ \field{title}{AHV-Nummer als einheitlicher, organisationsübergreifender Personenidentifikator}
\field{year}{2015}
\endentry
\entry{garfinkel1995}{book}{}
@@ -76,7 +76,7 @@
\strng{authornamehash}{f7ae1c1e91c1c29835e2ff7e98908fa7}
\strng{authorfullhash}{f7ae1c1e91c1c29835e2ff7e98908fa7}
\field{sortinit}{2}
- \field{sortinithash}{ed39bb39cf854d5250e95b1c1f94f4ed}
+ \field{sortinithash}{8b555b3791beccb63322c22f3320aa9a}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{title}{PGP: pretty good privacy}
@@ -87,7 +87,7 @@
{pEp Security SA}%
}
\field{sortinit}{3}
- \field{sortinithash}{a37a8ef248a93c322189792c34fc68c9}
+ \field{sortinithash}{ad6fe7482ffbd7b9f99c9e8b5dccd3d7}
\field{labeltitlesource}{title}
\field{title}{Welcome to p≡p Documentation!}
\field{urlday}{6}
@@ -120,7 +120,7 @@
\strng{authornamehash}{881bf2fe8d7563c67a7bf0dca669ec1e}
\strng{authorfullhash}{881bf2fe8d7563c67a7bf0dca669ec1e}
\field{sortinit}{4}
- \field{sortinithash}{e071e0bcb44634fab398d68ad04e69f4}
+ \field{sortinithash}{9381316451d1b9788675a07e972a12a7}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{booktitle}{Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)}
@@ -177,7 +177,7 @@
\strng{authornamehash}{10c7b94477775db573510e04e477a77b}
\strng{authorfullhash}{40a5ec0e4490a4063bf48a5924ef1c0f}
\field{sortinit}{5}
- \field{sortinithash}{5dd416adbafacc8226114bc0202d5fdd}
+ \field{sortinithash}{20e9b4b0b173788c5dace24730f47d8c}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{booktitle}{2017 11th IEEE International Conference on Anti-counterfeiting, Security, and Identification (ASID)}
@@ -204,7 +204,7 @@
\strng{authornamehash}{3648296958ad2ea0461fac7a13e12981}
\strng{authorfullhash}{3648296958ad2ea0461fac7a13e12981}
\field{sortinit}{6}
- \field{sortinithash}{7851c86048328b027313775d8fbd2131}
+ \field{sortinithash}{b33bc299efb3c36abec520a4c896a66d}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{title}{Bitcoin: Millions of dollars of cryptocurrency 'lost' after man dies with only password}
@@ -225,7 +225,7 @@
{Bitcoin}%
}
\field{sortinit}{7}
- \field{sortinithash}{f615fb9c6fba11c6f962fb3fd599810e}
+ \field{sortinithash}{108d0be1b1bee9773a1173443802c0a3}
\field{labeltitlesource}{title}
\field{title}{BIP 32 - Hierarchical Deterministic Wallets}
\field{urlday}{6}
@@ -255,7 +255,7 @@
\strng{authornamehash}{b5c45c4b8deb48651c65650f0409e671}
\strng{authorfullhash}{b5c45c4b8deb48651c65650f0409e671}
\field{sortinit}{9}
- \field{sortinithash}{54047ffb55bdefa0694bbd554c1b11a0}
+ \field{sortinithash}{0a5ebc79d83c96b6579069544c73c7d4}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{journaltitle}{Mobile Platforms Group Intel Corporation}
@@ -285,10 +285,10 @@
\strng{authornamehash}{abb7f98446293f740b141f01ff61554d}
\strng{authorfullhash}{abb7f98446293f740b141f01ff61554d}
\field{sortinit}{1}
- \field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
+ \field{sortinithash}{4f6aaa89bab872aa0999fec09ff8e98a}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
- \field{journaltitle}{Foundations and Trends® in Theoretical Computer Science}
+ \field{journaltitle}{Foundations and Trends{®} in Theoretical Computer Science}
\field{number}{1--3}
\field{title}{Pseudorandomness}
\field{volume}{7}
@@ -314,7 +314,7 @@
\strng{authornamehash}{6535189281ff6a1012638e384823f5cf}
\strng{authorfullhash}{6535189281ff6a1012638e384823f5cf}
\field{sortinit}{1}
- \field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
+ \field{sortinithash}{4f6aaa89bab872aa0999fec09ff8e98a}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{booktitle}{Annual International Cryptology Conference}
@@ -354,7 +354,7 @@
\strng{authornamehash}{39e304099b960365cdb56b83f4c70df6}
\strng{authorfullhash}{39e304099b960365cdb56b83f4c70df6}
\field{sortinit}{1}
- \field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
+ \field{sortinithash}{4f6aaa89bab872aa0999fec09ff8e98a}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{issn}{0004-5411}
@@ -407,7 +407,7 @@
\strng{editornamehash}{14f9bdb855aa40873ff3dce506ed6fff}
\strng{editorfullhash}{14f9bdb855aa40873ff3dce506ed6fff}
\field{sortinit}{1}
- \field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
+ \field{sortinithash}{4f6aaa89bab872aa0999fec09ff8e98a}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{abstract}{This paper describes the state of the art for cryptographic hash functions. Different definitions are compared, and the few theoretical results on hash functions are discussed. A brief overview is presented of the most important constructions, and some open problems are presented.}
@@ -450,7 +450,7 @@
\strng{authornamehash}{4d5e3f9d17e0c0b2294603b963e91c33}
\strng{authorfullhash}{4d5e3f9d17e0c0b2294603b963e91c33}
\field{sortinit}{1}
- \field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
+ \field{sortinithash}{4f6aaa89bab872aa0999fec09ff8e98a}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{journaltitle}{International Journal of Computer Science Issues (IJCSI)}
@@ -481,7 +481,7 @@
\strng{authornamehash}{79ea2c47cb704d13b6d9bcf7c199fc51}
\strng{authorfullhash}{79ea2c47cb704d13b6d9bcf7c199fc51}
\field{sortinit}{1}
- \field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
+ \field{sortinithash}{4f6aaa89bab872aa0999fec09ff8e98a}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{journaltitle}{IJCSNS International Journal of Computer Science and Network Security}
@@ -520,7 +520,7 @@
\strng{authornamehash}{4b253103893adba3aada17995ac73ec0}
\strng{authorfullhash}{4b253103893adba3aada17995ac73ec0}
\field{sortinit}{1}
- \field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
+ \field{sortinithash}{4f6aaa89bab872aa0999fec09ff8e98a}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{booktitle}{2011 Eighth International Conference on Information Technology: New Generations}
@@ -554,7 +554,7 @@
\strng{authornamehash}{2527ef0685da3bdb01959cd066adc238}
\strng{authorfullhash}{2527ef0685da3bdb01959cd066adc238}
\field{sortinit}{2}
- \field{sortinithash}{ed39bb39cf854d5250e95b1c1f94f4ed}
+ \field{sortinithash}{8b555b3791beccb63322c22f3320aa9a}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{journaltitle}{RSA Laboratories’ CryptoBytes}
@@ -583,7 +583,7 @@
\strng{authornamehash}{088445b3855bedf4bcc9d25651eb98b2}
\strng{authorfullhash}{088445b3855bedf4bcc9d25651eb98b2}
\field{sortinit}{2}
- \field{sortinithash}{ed39bb39cf854d5250e95b1c1f94f4ed}
+ \field{sortinithash}{8b555b3791beccb63322c22f3320aa9a}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{booktitle}{Annual Cryptology Conference}
@@ -610,7 +610,7 @@
\strng{authornamehash}{0afd18d7b25d23c61db1fe942ec1c236}
\strng{authorfullhash}{0afd18d7b25d23c61db1fe942ec1c236}
\field{sortinit}{2}
- \field{sortinithash}{ed39bb39cf854d5250e95b1c1f94f4ed}
+ \field{sortinithash}{8b555b3791beccb63322c22f3320aa9a}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{title}{Field-programmable gate array technology}
@@ -634,7 +634,7 @@
\strng{authornamehash}{093f14ec763e8df6227fd18ac8958011}
\strng{authorfullhash}{093f14ec763e8df6227fd18ac8958011}
\field{sortinit}{2}
- \field{sortinithash}{ed39bb39cf854d5250e95b1c1f94f4ed}
+ \field{sortinithash}{8b555b3791beccb63322c22f3320aa9a}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{month}{6}
@@ -670,7 +670,7 @@
\strng{authornamehash}{037d5c3d4e3ef2dcef34dc59a05beed9}
\strng{authorfullhash}{037d5c3d4e3ef2dcef34dc59a05beed9}
\field{sortinit}{2}
- \field{sortinithash}{ed39bb39cf854d5250e95b1c1f94f4ed}
+ \field{sortinithash}{8b555b3791beccb63322c22f3320aa9a}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{booktitle}{2016 IEEE European Symposium on Security and Privacy (EuroS\&P)}
@@ -694,7 +694,7 @@
\strng{authornamehash}{799c6648cb97b6ffb4e9da11a6e277ac}
\strng{authorfullhash}{799c6648cb97b6ffb4e9da11a6e277ac}
\field{sortinit}{2}
- \field{sortinithash}{ed39bb39cf854d5250e95b1c1f94f4ed}
+ \field{sortinithash}{8b555b3791beccb63322c22f3320aa9a}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{journaltitle}{San Jose State University, Department of Computer Science}
@@ -719,7 +719,7 @@
\strng{authornamehash}{71b77dd8ab33fe646ef25cded49e9881}
\strng{authorfullhash}{71b77dd8ab33fe646ef25cded49e9881}
\field{sortinit}{2}
- \field{sortinithash}{ed39bb39cf854d5250e95b1c1f94f4ed}
+ \field{sortinithash}{8b555b3791beccb63322c22f3320aa9a}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{journaltitle}{Communications of the ACM}
@@ -749,7 +749,7 @@
\strng{authorfullhash}{ee278eaf10727ef21f15ba59cdfcb51b}
\field{extraname}{1}
\field{sortinit}{2}
- \field{sortinithash}{ed39bb39cf854d5250e95b1c1f94f4ed}
+ \field{sortinithash}{8b555b3791beccb63322c22f3320aa9a}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{booktitle}{Annual international cryptology conference}
@@ -777,7 +777,7 @@
\strng{authornamehash}{618e5892290641345f357d52e5ef3c12}
\strng{authorfullhash}{618e5892290641345f357d52e5ef3c12}
\field{sortinit}{3}
- \field{sortinithash}{a37a8ef248a93c322189792c34fc68c9}
+ \field{sortinithash}{ad6fe7482ffbd7b9f99c9e8b5dccd3d7}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{booktitle}{28th Annual Symposium on Foundations of Computer Science (sfcs 1987)}
@@ -805,7 +805,7 @@
\strng{authorfullhash}{ee278eaf10727ef21f15ba59cdfcb51b}
\field{extraname}{2}
\field{sortinit}{3}
- \field{sortinithash}{a37a8ef248a93c322189792c34fc68c9}
+ \field{sortinithash}{ad6fe7482ffbd7b9f99c9e8b5dccd3d7}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{booktitle}{Annual international cryptology conference}
@@ -858,7 +858,7 @@
\strng{authornamehash}{45cd1a76e0cdd8946f91bead3b664768}
\strng{authorfullhash}{c1db872bc8ef36ee51e0526f23769166}
\field{sortinit}{3}
- \field{sortinithash}{a37a8ef248a93c322189792c34fc68c9}
+ \field{sortinithash}{ad6fe7482ffbd7b9f99c9e8b5dccd3d7}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{journaltitle}{Cryptography}
@@ -899,7 +899,7 @@
\strng{authornamehash}{ce7e837cc1dbca8dddef9896de46176c}
\strng{authorfullhash}{c7f2c123e1ed3b1e1ad986ca25e522b3}
\field{sortinit}{3}
- \field{sortinithash}{a37a8ef248a93c322189792c34fc68c9}
+ \field{sortinithash}{ad6fe7482ffbd7b9f99c9e8b5dccd3d7}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{journaltitle}{Australian Journal of Basic and Applied Sciences}
@@ -934,7 +934,7 @@
\strng{authornamehash}{daa648a2c605762c09bfaab94d0f2168}
\strng{authorfullhash}{daa648a2c605762c09bfaab94d0f2168}
\field{sortinit}{3}
- \field{sortinithash}{a37a8ef248a93c322189792c34fc68c9}
+ \field{sortinithash}{ad6fe7482ffbd7b9f99c9e8b5dccd3d7}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{journaltitle}{IEEE Security \& Privacy}
@@ -978,7 +978,7 @@
\strng{authornamehash}{adce78e3f1e04476f35b2b5fcb6c6262}
\strng{authorfullhash}{85e8ef541ae3f71805b7382856006c85}
\field{sortinit}{3}
- \field{sortinithash}{a37a8ef248a93c322189792c34fc68c9}
+ \field{sortinithash}{ad6fe7482ffbd7b9f99c9e8b5dccd3d7}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{booktitle}{International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment}
@@ -1015,7 +1015,7 @@
\strng{authornamehash}{5646590031d49807385b96f9f6caae4a}
\strng{authorfullhash}{5646590031d49807385b96f9f6caae4a}
\field{sortinit}{3}
- \field{sortinithash}{a37a8ef248a93c322189792c34fc68c9}
+ \field{sortinithash}{ad6fe7482ffbd7b9f99c9e8b5dccd3d7}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{title}{Detection of Intrusions and Malware, and Vulnerability Assessment: 10th International Conference, DIMVA 2013, Berlin, Germany, July 18-19, 2013. Proceedings}
@@ -1027,7 +1027,7 @@
{OWASP Foundation}%
}
\field{sortinit}{3}
- \field{sortinithash}{a37a8ef248a93c322189792c34fc68c9}
+ \field{sortinithash}{ad6fe7482ffbd7b9f99c9e8b5dccd3d7}
\field{labeltitlesource}{title}
\field{title}{Forgot Password Cheat Sheet}
\field{urlday}{5}
@@ -1072,10 +1072,10 @@
\strng{authornamehash}{46fedf156ec86b72f1439a7e282b9fee}
\strng{authorfullhash}{7c1027a04280b6542245beeb85db1408}
\field{sortinit}{3}
- \field{sortinithash}{a37a8ef248a93c322189792c34fc68c9}
+ \field{sortinithash}{ad6fe7482ffbd7b9f99c9e8b5dccd3d7}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
- \field{title}{Wenn der Softbot menschliche Identit{ä}t best{ä}tigt. Videoident-Verfahren II: Die Technik}
+ \field{title}{Wenn der Softbot menschliche Identität bestätigt. Videoident-Verfahren II: Die Technik}
\field{year}{2017}
\endentry
\entry{biometric_auth}{article}{}
@@ -1101,7 +1101,7 @@
\strng{authornamehash}{db53816ca2458e8344846c9aa5b3bce3}
\strng{authorfullhash}{db53816ca2458e8344846c9aa5b3bce3}
\field{sortinit}{4}
- \field{sortinithash}{e071e0bcb44634fab398d68ad04e69f4}
+ \field{sortinithash}{9381316451d1b9788675a07e972a12a7}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{journaltitle}{Security and Communication Networks}
@@ -1127,7 +1127,7 @@
\strng{authornamehash}{b7a2e18f77259e34d5b676fd04412bb3}
\strng{authorfullhash}{b7a2e18f77259e34d5b676fd04412bb3}
\field{sortinit}{4}
- \field{sortinithash}{e071e0bcb44634fab398d68ad04e69f4}
+ \field{sortinithash}{9381316451d1b9788675a07e972a12a7}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{title}{CCC-Tüftler hackt Merkels Iris und von der Leyens Fingerabdruck}
@@ -1148,7 +1148,7 @@
{Coinbase}%
}
\field{sortinit}{4}
- \field{sortinithash}{e071e0bcb44634fab398d68ad04e69f4}
+ \field{sortinithash}{9381316451d1b9788675a07e972a12a7}
\field{labeltitlesource}{title}
\field{title}{Backup your encrypted private keys on Google Drive and iCloud with Coinbase Wallet}
\field{urlday}{6}
@@ -1186,7 +1186,7 @@
\strng{authornamehash}{e366017de179e8187fd5bb233ad210d8}
\strng{authorfullhash}{e366017de179e8187fd5bb233ad210d8}
\field{sortinit}{4}
- \field{sortinithash}{e071e0bcb44634fab398d68ad04e69f4}
+ \field{sortinithash}{9381316451d1b9788675a07e972a12a7}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{title}{Applied Approach to Privacy and Security for the Internet of Things}
@@ -1207,7 +1207,7 @@
\strng{authornamehash}{9dfd0bf532dd1b08969afefcdd7188b5}
\strng{authorfullhash}{9dfd0bf532dd1b08969afefcdd7188b5}
\field{sortinit}{4}
- \field{sortinithash}{e071e0bcb44634fab398d68ad04e69f4}
+ \field{sortinithash}{9381316451d1b9788675a07e972a12a7}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{journaltitle}{Black Hat USA}
@@ -1235,7 +1235,7 @@
\strng{authornamehash}{b3b08047d44ad47ea9a90d61cc647064}
\strng{authorfullhash}{b3b08047d44ad47ea9a90d61cc647064}
\field{sortinit}{4}
- \field{sortinithash}{e071e0bcb44634fab398d68ad04e69f4}
+ \field{sortinithash}{9381316451d1b9788675a07e972a12a7}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{booktitle}{Internet Research Task Force, Crypto Forum Research Group, RFC}
@@ -1261,7 +1261,7 @@
\strng{authornamehash}{f2ca7c0188bc149bef92a85d32759b7b}
\strng{authorfullhash}{f2ca7c0188bc149bef92a85d32759b7b}
\field{sortinit}{4}
- \field{sortinithash}{e071e0bcb44634fab398d68ad04e69f4}
+ \field{sortinithash}{9381316451d1b9788675a07e972a12a7}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{journaltitle}{Network Security}
@@ -1277,7 +1277,7 @@
{Taler Systems SA}%
}
\field{sortinit}{5}
- \field{sortinithash}{5dd416adbafacc8226114bc0202d5fdd}
+ \field{sortinithash}{20e9b4b0b173788c5dace24730f47d8c}
\field{labeltitlesource}{title}
\field{title}{GNU Taler: Features}
\field{urlday}{2}
@@ -1297,7 +1297,7 @@
{The PostgreSQL Global Development Group}%
}
\field{sortinit}{5}
- \field{sortinithash}{5dd416adbafacc8226114bc0202d5fdd}
+ \field{sortinithash}{20e9b4b0b173788c5dace24730f47d8c}
\field{labeltitlesource}{title}
\field{title}{PostgreSQL: The World's Most Advanced Open Source Relational Database}
\field{urlday}{2}
@@ -1317,7 +1317,7 @@
{Curl}%
}
\field{sortinit}{5}
- \field{sortinithash}{5dd416adbafacc8226114bc0202d5fdd}
+ \field{sortinithash}{20e9b4b0b173788c5dace24730f47d8c}
\field{labeltitlesource}{title}
\field{title}{libcurl - the multiprotocol file transfer library}
\field{urlday}{2}
@@ -1337,7 +1337,7 @@
{GNU project}%
}
\field{sortinit}{5}
- \field{sortinithash}{5dd416adbafacc8226114bc0202d5fdd}
+ \field{sortinithash}{20e9b4b0b173788c5dace24730f47d8c}
\field{labeltitlesource}{title}
\field{title}{GNU Libmicrohttpd}
\field{urlday}{2}
@@ -1352,60 +1352,6 @@
\verb https://www.gnu.org/software/libmicrohttpd/?
\endverb
\endentry
- \entry{global_data_index}{online}{}
- \list{organization}{1}{%
- {Dell EMC.}%
- }
- \field{sortinit}{5}
- \field{sortinithash}{5dd416adbafacc8226114bc0202d5fdd}
- \field{labeltitlesource}{title}
- \field{title}{Global Data Protection Index 2018 – Key Findings}
- \field{urlday}{7}
- \field{urlmonth}{3}
- \field{urlyear}{2020}
- \field{year}{2018}
- \field{urldateera}{ce}
- \verb{urlraw}
- \verb https://www.delltechnologies.com/content/dam/uwaem/production-design-assets/en/gdpi/assets/infographics/dell-gdpi-vb-key-findings-deck.pdf)
- \endverb
- \verb{url}
- \verb https://www.delltechnologies.com/content/dam/uwaem/production-design-assets/en/gdpi/assets/infographics/dell-gdpi-vb-key-findings-deck.pdf)
- \endverb
- \endentry
- \entry{forgot_my_pin}{online}{}
- \name{author}{1}{}{%
- {{hash=3690e6a925d190517dbba666878a6978}{%
- family={Frauenfelder},
- familyi={F\bibinitperiod},
- given={Mark},
- giveni={M\bibinitperiod}}}%
- }
- \list{organization}{1}{%
- {WIRED}%
- }
- \strng{namehash}{3690e6a925d190517dbba666878a6978}
- \strng{fullhash}{3690e6a925d190517dbba666878a6978}
- \strng{bibnamehash}{3690e6a925d190517dbba666878a6978}
- \strng{authorbibnamehash}{3690e6a925d190517dbba666878a6978}
- \strng{authornamehash}{3690e6a925d190517dbba666878a6978}
- \strng{authorfullhash}{3690e6a925d190517dbba666878a6978}
- \field{sortinit}{6}
- \field{sortinithash}{7851c86048328b027313775d8fbd2131}
- \field{labelnamesource}{author}
- \field{labeltitlesource}{title}
- \field{title}{I Forgot My PIN’: An Epic Tale of Losing \$30,000 in Bitcoin}
- \field{urlday}{7}
- \field{urlmonth}{3}
- \field{urlyear}{2020}
- \field{year}{2017}
- \field{urldateera}{ce}
- \verb{urlraw}
- \verb https://www.wired.com/story/i-forgot-my-pin-an-epic-tale-of-losing-dollar30000-in-bitcoin/
- \endverb
- \verb{url}
- \verb https://www.wired.com/story/i-forgot-my-pin-an-epic-tale-of-losing-dollar30000-in-bitcoin/
- \endverb
- \endentry
\enddatalist
\endrefsection
\endinput