Foundations and applications for secure triggers

"Imagine there is certain content we want to maintain private until some particular event occurs, when we want to have it automatically disclosed. Suppose furthermore, that we want this done in a (possibly) malicious host. Say, the confidential content is a piece of code belonging to a computer...

Descripción completa

Guardado en:
Detalles Bibliográficos
Autores principales: Futoransky, Ariel, Kargieman, Emiliano, Sarraute, Carlos, Waissbein, Ariel
Formato: Artículos de Publicaciones Periódicas acceptedVersion
Lenguaje:Inglés
Publicado: 2018
Materias:
Acceso en línea:http://ri.itba.edu.ar/handle/123456789/1365
Aporte de:

Ejemplares similares