메뉴 건너뛰기




Volumn 1, Issue , 2006, Pages 451-456

Remote trust with aspect-oriented programming

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER PROGRAMMING; COMPUTER SOFTWARE; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; PROBLEM SOLVING; RAPID PROTOTYPING; RESEARCH AND DEVELOPMENT MANAGEMENT;

EID: 33751071642     PISSN: 1550445X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/AINA.2006.286     Document Type: Conference Paper
Times cited : (8)

References (14)
  • 1
    • 33751095748 scopus 로고    scopus 로고
    • Idiosyncratic signatures for authenticated execution of management code
    • M. Baldi, Y. Ofek, and M. Yung, "Idiosyncratic Signatures for Authenticated Execution of Management Code" Proc. of DSOM 2003, 2003
    • (2003) Proc. of DSOM 2003
    • Baldi, M.1    Ofek, Y.2    Yung, M.3
  • 7
    • 84955621400 scopus 로고    scopus 로고
    • Tamper resistant software: An implementation
    • R. J. Anderson, Ed.: Springer-Verlag
    • D. Aucsmith, "Tamper resistant software: An implementation" in Information Hiding, Lecture Notes in Computer Science 1174, R. J. Anderson, Ed.: Springer-Verlag, 1996.
    • (1996) Information Hiding, Lecture Notes in Computer Science , vol.1174
    • Aucsmith, D.1
  • 8
    • 33751116901 scopus 로고    scopus 로고
    • last access 30th May, 2005
    • TCG, The Trusted Computing Group, available at: https://www. trustedcomputinggroup.org (last access 30th May, 2005),
  • 13
    • 33751092632 scopus 로고    scopus 로고
    • BCEL, Byte Code Engineering Library
    • BCEL, Byte Code Engineering Library, available at: http://jakarta.apache. org/bcel/


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.