Login / Signup

Oblivious Hashing: A Stealthy Software Integrity Verification Primitive.

Yuqun ChenRamarathnam VenkatesanMatthew CaryRuoming PangSaurabh SinhaMariusz H. Jakubowski
Published in: Information Hiding (2002)
Keyphrases
  • integrity verification
  • multimedia
  • high level
  • data management