Foundations and applications for secure triggers
Imagine there is certain content we want to maintain private until some particular event occurs, when we want to have it automatically disclosed. Suppose, furthermore, that we want this done in a (possibly) malicious host. Say the confidential content is a piece of code belonging to a computer progr...
Guardado en:
Publicado: |
2006
|
---|---|
Materias: | |
Acceso en línea: | https://bibliotecadigital.exactas.uba.ar/collection/paper/document/paper_10949224_v9_n1_p94_Futoransky http://hdl.handle.net/20.500.12110/paper_10949224_v9_n1_p94_Futoransky |
Aporte de: |
Ejemplares similares
-
Foundations and applications for secure triggers
por: Futoransky, A., et al. -
Watermarking based on difference expansion and genetic algorithms
por: Vargas, Laura
Publicado: (2024) -
The complete guide to physical security /
por: Baker, Paul R., 1958-
Publicado: (2013) -
STALlion: a simple typed assembly language for static analysis
por: Nordio, Martín, et al.
Publicado: (2004) -
Securing E-Business applications and communications
por: Held, Jonathan S.
Publicado: (2001)