نتایج جستجو برای: tamper shape
تعداد نتایج: 192340 فیلتر نتایج به سال:
We introduce a novel method called constant encoding, which can be used to tamper-proof a software watermark that is embedded in the dynamic data structures of a program. Our novel tamperproofing method is based on transforming numeric or non-numeric constant values in the text of the watermarked program into function calls whose value depends on the watermark data structure. Under reasonable a...
Non-malleable codes are a natural relaxation of error correcting/detecting codes that have useful applications in the context of tamper resilient cryptography. Informally, a code is non-malleable if an adversary trying to tamper with an encoding of a given message can only leave it unchanged or modify it to the encoding of a completely unrelated value. This paper introduces an extension of the ...
We address the problem of using an untrusted server with a trusted platform module (TPM) to provide trusted storage for a large number of clients, where each client may own and use several different devices that may be offline at different times and may not be able to communicate with each other except through the untrusted server (over an untrusted network). The clients only trust the server’s...
ESR has undertaken national surveillance of methicillin-resistant Staphylococcus aureus (MRSA) since MRSA was first identified in New Zealand in 1975. For the next decade, MRSA remained uncommon in New Zealand, with a maximum of 13 people identified with MRSA in any one year. In a 1982 national survey of antimicrobial resistance among S. aureus, just one (0.05%) of 2077 isolates included in the...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید