-
1
-
-
0025230154
-
Secure circuit evaluation: A protocol based on hiding information from an oracle
-
M. Abadi and J. Feigenbaum. Secure circuit evaluation: A protocol based on hiding information from an oracle. Journal of Cryptology, 2(1): 1-12, 1990.
-
(1990)
Journal of Cryptology
, vol.2
, Issue.1
, pp. 1-12
-
-
Abadi, M.1
Feigenbaum, J.2
-
2
-
-
0034828870
-
Cryptographic security for mobile code
-
# 93348
-
J. Algesheimer, C. Cachin, J. Camenisch, and G. Karjoth. Cryptographic security for mobile code. In Proceedings of the IEEE Symposium on Security and Privacy, number RZ 3302 (# 93348), pages 2-11, 2001.
-
(2001)
Proceedings of the IEEE Symposium on Security and Privacy
, vol.RZ 3302
, pp. 2-11
-
-
Algesheimer, J.1
Cachin, C.2
Camenisch, J.3
Karjoth, G.4
-
3
-
-
24744451983
-
Securing mobile code
-
Sandia National Laboratories
-
E. Anderson, C. Beaver, W. Neumann, R. Schroeppel, P. Campbell, H. Link, and L. Pierson. Securing mobile code. Technical Report SAND2004-5114, Sandia National Laboratories, 2004.
-
(2004)
Technical Report
, vol.SAND2004-5114
-
-
Anderson, E.1
Beaver, C.2
Neumann, W.3
Schroeppel, R.4
Campbell, P.5
Link, H.6
Pierson, L.7
-
4
-
-
79251578513
-
On the (im)possibility of obfuscating programs
-
B. Barak, O. Goldreich, R. Impagliazzo, S. Rudich, A. Sahai, S. Vadhan, and K. Yang. On the (im)possibility of obfuscating programs. Lecture Notes in Computer Science, 2139:1-18, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2139
, pp. 1-18
-
-
Barak, B.1
Goldreich, O.2
Impagliazzo, R.3
Rudich, S.4
Sahai, A.5
Vadhan, S.6
Yang, K.7
-
5
-
-
21144457759
-
A white-box cryptography and an AES implementation
-
Proceedings of SAC 2002. Springer
-
S. Chow, P. Eisen, H. Johnson, and P. van Oorschot. A white-box cryptography and an AES implementation. In Proceedings of SAC 2002, volume 2595 of Lecture Notes in Computer Science, pages 250-270. Springer, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2595
, pp. 250-270
-
-
Chow, S.1
Eisen, P.2
Johnson, H.3
Van Oorschot, P.4
-
7
-
-
0004046658
-
A taxonomy of obfuscating transformations
-
Department of Computer Science, University of Auckland, July
-
C. Collberg, C. Thomborson, and D. Low. A taxonomy of obfuscating transformations. Technical Report 148, Department of Computer Science, University of Auckland, July 1997.
-
(1997)
Technical Report
, vol.148
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
8
-
-
0031649930
-
Manufacturing cheap, resilient, and stealthy opaque constructs
-
C. Collberg, C. Thomborson, and D. Low. Manufacturing cheap, resilient, and stealthy opaque constructs. In Principles of Programming Languages 1998, POPL'98, pages 184-196, 1998.
-
(1998)
Principles of Programming Languages 1998, POPL'98
, pp. 184-196
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
9
-
-
84861239703
-
-
http://www.dvdcca.org/css.
-
-
-
-
10
-
-
0001943763
-
Time limited blackbox security: Protecting mobile agents from malicious hosts
-
F. Hohl. Time limited blackbox security: Protecting mobile agents from malicious hosts. Lecture Notes in Computer Science, 1419:90-111, 1998.
-
(1998)
Lecture Notes in Computer Science
, vol.1419
, pp. 90-111
-
-
Hohl, F.1
-
12
-
-
84947930522
-
Protecting secret keys in a compromised computational system
-
W. Mitchell. Protecting secret keys in a compromised computational system. Lecture Notes In Computer Science, 1768:448-462, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1768
, pp. 448-462
-
-
Mitchell, W.1
-
16
-
-
0022882770
-
How to generate and exchange secrets
-
Toronto, Ontario, October 1986. IEEE
-
A. C.-C. Yao. How to generate and exchange secrets (extended abstract). In 27th Annual Symposium on Foundations of Computer Science, pages 162-167, Toronto, Ontario, October 1986 1986. IEEE.
-
(1986)
27th Annual Symposium on Foundations of Computer Science
, pp. 162-167
-
-
Yao, A.C.-C.1
|