Foundations and applications for secure triggers
Imagine there is certain content we want to maintain private until some particular event occurs, when we want to have it automatically disclosed. Suppose, furthermore, that we want this done in a (possibly) malicious host. Say the confidential content is a piece of code belonging to a computer progr...
Guardado en:
Autores principales: | Futoransky, A., Kargieman, E., Sarraute, C., Waissbein, A. |
---|---|
Formato: | JOUR |
Materias: | |
Acceso en línea: | http://hdl.handle.net/20.500.12110/paper_10949224_v9_n1_p94_Futoransky |
Aporte de: |
Ejemplares similares
-
Foundations and applications for secure triggers
Publicado: (2006) -
STALlion: a simple typed assembly language for static analysis
por: Nordio, Martín, et al.
Publicado: (2004) -
Watermarking based on difference expansion and genetic algorithms
por: Vargas, Laura
Publicado: (2024) -
SAARC: security with a new perspective
por: Biswas, Aparajita - Autor/a
Publicado: (2013) -
Seeking security in an insecure world /
por: Caldwell, Dan
Publicado: (2006)