Foundations and applications for secure triggers
"Imagine there is certain content we want to maintain private until some particular event occurs, when we want to have it automatically disclosed. Suppose furthermore, that we want this done in a (possibly) malicious host. Say, the confidential content is a piece of code belonging to a computer...
Guardado en:
| Autores principales: | Futoransky, Ariel, Kargieman, Emiliano, Sarraute, Carlos, Waissbein, Ariel |
|---|---|
| Formato: | Artículos de Publicaciones Periódicas acceptedVersion |
| Lenguaje: | Inglés |
| Publicado: |
2018
|
| Materias: | |
| Acceso en línea: | http://ri.itba.edu.ar/handle/123456789/1365 |
| Aporte de: |
Ejemplares similares
-
Foundations and applications for secure triggers
por: Futoransky, A., et al. -
Computer security : art and science
por: Bishop, Matt (Matthew A.)
Publicado: (2003) -
Foundations and applications for secure triggers
por: Futoransky, A.
Publicado: (2006) -
Cryptography and network security: principles and practice.
por: Stallings, William
Publicado: (1998) -
Criptografía post-cuántica integrada en SSL/TLS y HTTPS
por: Córdoba, Diego, et al.
Publicado: (2019)