Ordered Merkle Tree - a versatile data-structure for security kernels

<p>Hidden undesired functionality is an unavoidable reality in any complex hardware or software component. Undesired functionality deliberately introduced Trojan horses or accidentally introduced bugsin any component of a system can be exploited by attackers to exert control over the system. T...

Full description

Bibliographic Details
Main Author: Mohanty, Somya Darsan
Other Authors: Dr. Yoginder S. Dandass
Format: Others
Language:en
Published: MSSTATE 2013
Subjects:
Online Access:http://sun.library.msstate.edu/ETD-db/theses/available/etd-06242013-124105/