{"@context":["https://w3id.org/fdo/context/v1",{"schema":"https://schema.org/","prov":"http://www.w3.org/ns/prov#","fdo":"https://w3id.org/fdo/vocabulary/"}],"@id":"https://fdo.portal.mardi4nfdi.de/fdo/Q3445656","@type":"DigitalObject","kernel":{"@id":"https://fdo.portal.mardi4nfdi.de/fdo/Q3445656","digitalObjectType":"https://schema.org/ScholarlyArticle","primaryIdentifier":"mardi:Q3445656","kernelVersion":"v1","immutable":true,"modified":"2026-01-13T04:38:18Z"},"profile":{"@context":"https://schema.org","@type":"ScholarlyArticle","@id":"https://portal.mardi4nfdi.de/entity/Q3445656","name":"Study and application of trusted computing technology","headline":"Study and application of trusted computing technology","description":"scientific article; zbMATH DE number 5163720","url":"https://portal.mardi4nfdi.de/entity/Q3445656","datePublished":"2007-06-12","author":[{"@id":"https://portal.mardi4nfdi.de/entity/Q3445654"},{"@id":"https://portal.mardi4nfdi.de/entity/Q3445655"},{"@id":"https://portal.mardi4nfdi.de/entity/Q1930045"}]},"provenance":{"prov:generatedAtTime":"2026-01-13T04:38:18Z","prov:wasAttributedTo":"MaRDI Knowledge Graph"}}