Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
6856448 | Information Sciences | 2018 | 47 Pages |
Abstract
 Considering applications, it is instructive to note that our proposed schemes can be used to implement an algorithmic tamper-detection at a software level while satisfying the necessary security conditions.
Related Topics
Physical Sciences and Engineering
Computer Science
Artificial Intelligence
Authors
Amir S. Mortazavi, Mahmoud Salmasizadeh, Amir Daneshgar,