Login / Signup
Remote Entrusting by Run-Time Software Authentication.
Mariano Ceccato
Yoram Ofek
Paolo Tonella
Published in:
SOFSEM (2008)
Keyphrases
</>
software architecture
software systems
software development
software tools
software design
real time
source code
computer systems
remote monitoring
control center
neural network
case study
user interface
personal computer
authentication protocol
fragile watermarking