Secure

   		
Play Index Previous Next

Enable the construction of virus-free, tamper-free systems

Authentication techniques: Base on public-key encryption

Changes the semantics of pointers

Suitable for use in networked/distributed environments


Index Previous Next