Foundations and applications for secure triggers

Imagine there is certain content we want to maintain private until some particular event occurs, when we want to have it automatically disclosed. Suppose, furthermore, that we want this done in a (possibly) malicious host. Say the confidential content is a piece of code belonging to a computer progr...

Descripción completa

Guardado en:
Detalles Bibliográficos
Autores principales: Futoransky, A., Kargieman, E., Sarraute, C., Waissbein, A.
Formato: JOUR
Materias:
Acceso en línea:http://hdl.handle.net/20.500.12110/paper_10949224_v9_n1_p94_Futoransky
Aporte de:

Ejemplares similares