Foundations of Secure Computation

Foundations of Secure Computation

4.11 - 1251 ratings - Source

The final quarter of the 20th century has seen the establishment of a global computational infrastructure. This and the advent of programming languages such as Java, supporting mobile distributed computing, has posed a significant challenge to computer sciences. The infrastructure can support commerce, medicine and government, but only if communications and computing can be secured against catastrophic failure and malicious interference.There is a fundamental constraint: for every flow / different from the incoming flow 0 there is exactly one cell k (be it void or boolean returning) for which entr9(k) equals /. Computation of a flow chart works as follows: start in the incoming flow 0 .

Title:Foundations of Secure Computation
Author:Friedrich L. Bauer, Ralf Steinbrüggen
Publisher:IOS Press - 2000-01-01


You Must CONTINUE and create a free account to access unlimited downloads & streaming