Títulos similares
-
Coherent Minimisation: Towards efficient tamper-proof compilation
por: Dan R. Ghica, et al.
Publicado: (2012-12-01) -
Tamper-proof image watermarking using self-embedding
por: Makur, Anamitra, et al.
Publicado: (2013) -
Comparison of Distributed Tamper-Proof Storage Methods for Public Key Infrastructures
por: Fabian Honecker, et al.
Publicado: (2022-11-01) -
Tamper-Proof Time–Temperature Indicator for Inspecting Ultracold Supply Chain
por: Lam Tan Hao, et al.
Publicado: (2021-03-01) -
EngraveChain: A Blockchain-Based Tamper-Proof Distributed Log System
por: Louis Shekhtman, et al.
Publicado: (2021-05-01)