The final quarter of the 20th century has seen the establishment of a global computational infrastructure. This and the advent of programming languages such as Java, supporting mobile distributed computing, has posed a significant challenge to computer sciences. The infrastructure can support commerce, medicine and government, but only if communications and computing can be secured against catastrophic failure and malicious interference.There is a fundamental constraint: for every flow / different from the incoming flow 0 there is exactly one cell k (be it void or boolean returning) for which entr9(k) equals /. Computation of a flow chart works as follows: start in the incoming flow 0 .
|Title||:||Foundations of Secure Computation|
|Author||:||Friedrich L. Bauer, Ralf Steinbrüggen|
|Publisher||:||IOS Press - 2000-01-01|