{"labels":{"en":"Using hash functions to protect critical messages from changes in risky computing systems"},"descriptions":{"en":"scientific paper published in CEUR-WS Volume 3101"},"claims":{"P31":"Q13442814","P1433":"Q113541698","P1476":{"text":"Using hash functions to protect critical messages from changes in risky computing systems","language":"en"},"P407":"Q1860","P953":"https://ceur-ws.org/Vol-3101/Paper32.pdf","P50":[],"P2093":[{"value":"Andrzej Smolarz","qualifiers":{"P1545":"1"}},{"value":"Andrzej Kotyra","qualifiers":{"P1545":"2"}},{"value":"Vasyl Sheketa","qualifiers":{"P1545":"3"}},{"value":"Svitlana Chupakhina","qualifiers":{"P1545":"4"}},{"value":"Petro Krul","qualifiers":{"P1545":"5"}},{"value":"Mykola Suprun","qualifiers":{"P1545":"6"}},{"value":"Nadia Pasieka","qualifiers":{"P1545":"7"}},{"value":"Mykola Pasyeka","qualifiers":{"P1545":"8"}}]}}