Safe Serialization Under Mutual Suspicion
From Erights
(Difference between revisions)
(→Safe Serialization Under Mutual Suspicion) |
(→Safe Serialization Under Mutual Suspicion) |
||
Line 6: | Line 6: | ||
- | * <span style="color:red">*</span>[ | + | * <span style="color:red">*</span>[[Safe_Serialization_Under_Mutual_Suspicion/Abstract_and_Introduction]] |
* Deconstructing Serialization | * Deconstructing Serialization | ||
** <span style="color:red">*</span>[http://www.erights.org/data/serial/jhu-paper/deconstructing.html Part 1: Introducing Data-E ] | ** <span style="color:red">*</span>[http://www.erights.org/data/serial/jhu-paper/deconstructing.html Part 1: Introducing Data-E ] |
Revision as of 22:49, 29 November 2006
Safe Serialization Under Mutual Suspicion
by Mark S. Miller
The chapters of this paper marked below with a "*" are submitted,
together with a working implementation,
to Professor Scott Smith for credit as independent study.(At the present time, the rest are not yet in a coherent state. Read farther at your own risk.)
- *Safe_Serialization_Under_Mutual_Suspicion/Abstract_and_Introduction
- Deconstructing Serialization