Safe Serialization Under Mutual Suspicion

From Erights

(Difference between revisions)
Jump to: navigation, search
(Safe Serialization Under Mutual Suspicion)
(Safe Serialization Under Mutual Suspicion)
Line 6: Line 6:
-
* <span style="color:red">*</span>[[Safe_Serialization_Under_Mutual_Suspicion/Abstract_and_Introduction]]
+
* <span style="color:red">*</span>[[Safe_Serialization_Under_Mutual_Suspicion/Abstract_and_Introduction|Abstract & Introduction]]
* Deconstructing Serialization  
* Deconstructing Serialization  
** <span style="color:red">*</span>[http://www.erights.org/data/serial/jhu-paper/deconstructing.html Part 1: Introducing Data-E ]
** <span style="color:red">*</span>[http://www.erights.org/data/serial/jhu-paper/deconstructing.html Part 1: Introducing Data-E ]

Revision as of 22:49, 29 November 2006

Safe Serialization Under Mutual Suspicion

by Mark S. Miller

The chapters of this paper marked below with a "*" are submitted,
together with a working implementation,
to Professor Scott Smith for credit as independent study.(At the present time, the rest are not yet in a coherent state. Read farther at your own risk.)


Personal tools
more tools