Similar Items
-
Coherent Minimisation: Towards efficient tamper-proof compilation
by: Dan R. Ghica, et al.
Published: (2012-12-01) -
Tamper-proof image watermarking using self-embedding
by: Makur, Anamitra, et al.
Published: (2013) -
Comparison of Distributed Tamper-Proof Storage Methods for Public Key Infrastructures
by: Fabian Honecker, et al.
Published: (2022-11-01) -
Tamper-Proof Time–Temperature Indicator for Inspecting Ultracold Supply Chain
by: Lam Tan Hao, et al.
Published: (2021-03-01) -
EngraveChain: A Blockchain-Based Tamper-Proof Distributed Log System
by: Louis Shekhtman, et al.
Published: (2021-05-01)