作者: Benoit Chevallier-Mames , Pascal Paillier , David Naccache
DOI:
关键词: Computer science 、 Object (computer science) 、 Protocol (object-oriented programming) 、 Computer network 、 Portable object 、 Key (cryptography) 、 Operating system 、 Authentication 、 Executable
摘要: The invention concerns a method for dynamically authenticating an executable programme, that is the continuation of instructions defined thereby. More specifically, authentication programme performed repeatedly during very execution said programme. making secure electronic portable object through P supplied by another insecure uses, inter alia, secret key protocol.