Ordered Merkle Tree - a versatile data-structure for security kernels
<p>Hidden undesired functionality is an unavoidable reality in any complex hardware or software component. Undesired functionality deliberately introduced Trojan horses or accidentally introduced bugsin any component of a system can be exploited by attackers to exert control over the system. T...
Main Author: | Mohanty, Somya Darsan |
---|---|
Other Authors: | Dr. Yoginder S. Dandass |
Format: | Others |
Language: | en |
Published: |
MSSTATE
2013
|
Subjects: | |
Online Access: | http://sun.library.msstate.edu/ETD-db/theses/available/etd-06242013-124105/ |
Similar Items
-
Authenticated Data Structure via Arithmetic Merkle Tree
by: Hsin-Ming Wu, et al.
Published: (2016) -
Improving Security and Reliability in Merkle Tree-Based Online Data Authentication with Leakage Resilience
by: Dongyoung Koo, et al.
Published: (2018-12-01) -
Secure Dissemination and Protection of Raster Data using Merkle Hash Tree based Cryptowatermarking
by: Chaudhari Sangita Santosh
Published: (2020-01-01) -
Visual blockchain using Merkle Tree
by: Hu, Rui
Published: (2019) -
Sparse Merkle Trees: Definitions and Space-Time Trade-Offs with Applications for Balloon
by: Östersjö, Rasmus
Published: (2016)