Safe Serialization Under Mutual Suspicion

From Erights

(Difference between revisions)
Jump to: navigation, search
(Switched sense of red marking)
(adding an new page)
 
(10 intermediate revisions not shown)
Line 5: Line 5:
* Deconstructing Serialization  
* Deconstructing Serialization  
** [[Safe_Serialization_Under_Mutual_Suspicion/Introducing_Data_E |Part 1: Introducing Data-E ]]
** [[Safe_Serialization_Under_Mutual_Suspicion/Introducing_Data_E |Part 1: Introducing Data-E ]]
-
** [http://www.erights.org/data/serial/jhu-paper/recog-n-build.html Part 2: "Reversing" Evaluation]
+
** [[Safe_Serialization_Under_Mutual_Suspicion/"Reversing"_Evaluation |Part 2: "Reversing" Evaluation ]]
* [http://www.erights.org/data/serial/jhu-paper/exit-security.html Manipulating Authority at the Exits]
* [http://www.erights.org/data/serial/jhu-paper/exit-security.html Manipulating Authority at the Exits]

Latest revision as of 06:02, 29 January 2008

The chapters marked below with a "*" are not yet in a coherent state. Read those at your own risk. The rest are in a readable state, though still in need of much improvement.


Personal tools
more tools