myalgia 发表于 2025-3-25 06:34:09

http://reply.papertrans.cn/47/4653/465253/465253_21.png

BAIT 发表于 2025-3-25 09:55:16

http://reply.papertrans.cn/47/4653/465253/465253_22.png

inclusive 发表于 2025-3-25 13:15:10

http://reply.papertrans.cn/47/4653/465253/465253_23.png

灌溉 发表于 2025-3-25 18:48:48

http://reply.papertrans.cn/47/4653/465253/465253_24.png

clarify 发表于 2025-3-25 20:55:04

An Approach to the Objective and Quantitative Evaluation of Tamper-Resistant Softwareincluding the method of making software hard to read. So far, no objective and quantitative method is known for evaluating tamper-resistant software. Most of known evaluation methods require involvement of human being. That means their evaluation results deeply depend on the skill and subjectivity o

bizarre 发表于 2025-3-26 02:30:16

http://reply.papertrans.cn/47/4653/465253/465253_26.png

Blatant 发表于 2025-3-26 05:02:09

http://reply.papertrans.cn/47/4653/465253/465253_27.png

FUSC 发表于 2025-3-26 09:36:56

http://reply.papertrans.cn/47/4653/465253/465253_28.png

expansive 发表于 2025-3-26 16:27:22

Linkability in Practical Electronic Cash Designency, anonymity, the ability to make exact payments. Gains in one area often result in a loss in one or more other areas. Several schemes have accepted linkability of some payments as a concession to getting the balance right. A point that has not been highlighted is the problem of preventing linkin

叙述 发表于 2025-3-26 19:19:27

Towards a Practical Secure Framework for Mobile Code Commercethe general issues that must be addressed. In a second step we list the possible techniques that can be used for that purpose. In a third step, we build a framework based on the analysis done. This framework has been implemented to show its validity.
页: 1 2 [3] 4 5 6 7
查看完整版本: Titlebook: Information Security; Third International Gerhard Goos,Juris Hartmanis,Eiji Okamoto Conference proceedings 2000 Springer-Verlag Berlin Hei