Secure | Play |
Index |
Previous |
Next |
Enable the construction of virus-free, tamper-free systems
Authentication techniques: Base on public-key encryption
Changes the semantics of pointers
Suitable for use in networked/distributed environments
Index | Previous |
Next |