Safe Serialization Under Mutual Suspicion
From Erights
(Difference between revisions)
(Switched sense of red marking) |
(adding an new page) |
||
(10 intermediate revisions not shown) | |||
Line 5: | Line 5: | ||
* Deconstructing Serialization | * Deconstructing Serialization | ||
** [[Safe_Serialization_Under_Mutual_Suspicion/Introducing_Data_E |Part 1: Introducing Data-E ]] | ** [[Safe_Serialization_Under_Mutual_Suspicion/Introducing_Data_E |Part 1: Introducing Data-E ]] | ||
- | ** [ | + | ** [[Safe_Serialization_Under_Mutual_Suspicion/"Reversing"_Evaluation |Part 2: "Reversing" Evaluation ]] |
* [http://www.erights.org/data/serial/jhu-paper/exit-security.html Manipulating Authority at the Exits] | * [http://www.erights.org/data/serial/jhu-paper/exit-security.html Manipulating Authority at the Exits] |
Latest revision as of 06:02, 29 January 2008
The chapters marked below with a "*" are not yet in a coherent state. Read those at your own risk. The rest are in a readable state, though still in need of much improvement.
- Abstract & Introduction
- Deconstructing Serialization