In this paper, we introduce a collection of cryptographic key constructionsbuilt from environmental data that are resistant to adversarial analysisand deceit. We expound upon their properties and discuss some possibleapplications; the primary envisioned use of these constructions is in thecreation of mobile agents whose analysis does not reveal their exact purpose.
CITATION STYLE
Riordan, J., & Schneier, B. (1998). Environmental Key Generation Towards Clueless Agents (pp. 15–24). https://doi.org/10.1007/3-540-68671-1_2
Mendeley helps you to discover research relevant for your work.