-
3
-
-
70749087413
-
On the secure obfuscation of deterministic finite automata
-
W. E. Anderson, "On the Secure Obfuscation of Deterministic Finite Automata," in Cryptology ePrint Archive, 2008/148, 2008.
-
(2008)
Cryptology ePrint Archive, 2008/148
-
-
Anderson, W.E.1
-
4
-
-
0004046658
-
A taxonomy of obfuscating transformations
-
University of Auckland, Tech. Rep.
-
C. Collberg, C. Thomborson, and D. Low, "A Taxonomy of Obfuscating Transformations," Computer Science, University of Auckland, Tech. Rep. 148, 7 1997.
-
(1997)
Computer Science
, Issue.7
, pp. 148
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
6
-
-
70749094001
-
Analysis of program obfuscation schemes with variable encoding technique
-
K. Fukushima, S. Kiyomoto, T. Tanaka, and K. Sakurai, "Analysis of Program Obfuscation Schemes with Variable Encoding Technique," IEICE Trans. on Fundamentals, vol. E91-A, no. 1, pp. 316-329, 2008.
-
(2008)
IEICE Trans. on Fundamentals
, vol.E91-A
, Issue.1
, pp. 316-329
-
-
Fukushima, K.1
Kiyomoto, S.2
Tanaka, T.3
Sakurai, K.4
-
7
-
-
0001943763
-
Time limited blackbox security: Protecting mobile agents from malicious hosts
-
F. Hohl, "Time Limited Blackbox Security: Protecting Mobile Agents from Malicious Hosts," in Lecture Notes in Computer Science 1419, 1998, pp. 92-113.
-
(1998)
Lecture Notes in Computer Science 1419
, pp. 92-113
-
-
Hohl, F.1
-
8
-
-
0035789216
-
Protection of software-based survivability mechanisms
-
C. Wang, J. Davidson, J. Hill, and J. Knight, "Protection of Software-based Survivability Mechanisms," in Proc. of Inter- national Conference of Dependable Systems and Networks (DSN2001), 2001, pp. 193-202.
-
(2001)
Proc. of Inter- National Conference of Dependable Systems and Networks (DSN2001)
, pp. 193-202
-
-
Wang, C.1
Davidson, J.2
Hill, J.3
Knight, J.4
-
9
-
-
84947229190
-
An approach to the obfuscation of control-flow of sequential computer programs
-
S. Chow, Y. Gu, H. Johnson, and V. A. Zakharov, "An Approach to the Obfuscation of Control-Flow of Sequential Computer Programs," in Proc. of 4th Information Security Conference (ISC2001), Lecture Notes in Computer Science 2200, 2001, pp. 144-155.
-
(2001)
Proc. of 4th Information Security Conference (ISC2001), Lecture Notes in Computer Science 2200
, pp. 144-155
-
-
Chow, S.1
Gu, Y.2
Johnson, H.3
Zakharov, V.A.4
-
10
-
-
79251578513
-
On the (Im)possibility of software obfuscation
-
B. Barak, O. Goldreich, R. Impagliazzo, S. Rudich, A. Sahai, S. Vadhan, and K. Yang, "On The (Im)possibility of Software Obfuscation," in Proc. of Advances in Cryptology (CRYPTO2001), Lecture Notes in Computer Science 2139, 8 2001, pp. 1-18.
-
(2001)
Proc. of Advances in Cryptology (CRYPTO2001), Lecture Notes in Computer Science 2139
, vol.8
, pp. 1-18
-
-
Barak, B.1
Goldreich, O.2
Impagliazzo, R.3
Rudich, S.4
Sahai, A.5
Vadhan, S.6
Yang, K.7
-
11
-
-
38149129392
-
A note on the (Im)possibility of using obfuscators to transform private-key encryption into public-key encryption
-
S. Hada and K. Sakurai, "A Note on the (Im)possibility of Using Obfuscators to Transform Private-Key Encryption into Public-Key Encryption," in Proc. of International Workshop on Security (IWSEC2007), Lecture Notes in Computer Science 4752, 11 2007, pp. 1-12.
-
(2007)
Proc. of International Workshop on Security (IWSEC2007), Lecture Notes in Computer Science 4752
, vol.11
, pp. 1-12
-
-
Hada, S.1
Sakurai, K.2
-
13
-
-
38049015775
-
On best-possible obfuscation
-
S. Goldwasser and G. N. Rothblum, "On Best-Possible Obfuscation," in Proc. of Fourth IACR Theory of Cryptography Conference (TCC2007), Lecture Notes in Computer Science 4392, 2 2007, pp. 194-213.
-
(2007)
Proc. of Fourth IACR Theory of Cryptography Conference (TCC2007), Lecture Notes in Computer Science 4392
, vol.2
, pp. 194-213
-
-
Goldwasser, S.1
Rothblum, G.N.2
-
14
-
-
38049056625
-
Obfuscation for cryptographic purposes
-
D. Hofheinz, J. Malone-Leeand M. Stam, "Obfuscation for Cryptographic Purposes," in Proc. of Fourth IACR Theory of Cryptography Conference (TCC2007), Lecture Notes in Computer Science 4392, 2 2007, pp. 214-232.
-
(2007)
Proc. of Fourth IACR Theory of Cryptography Conference (TCC2007), Lecture Notes in Computer Science 4392
, vol.2
, pp. 214-232
-
-
Hofheinz, D.1
Malone-Lee, J.2
Stam, M.3
-
15
-
-
70749160606
-
-
QUALCOMM Incorporated
-
QUALCOMM Incorporated., "Qualcomm BREW," http://brew.qualcomm. com/brew/en/.
-
Qualcomm BREW
-
-
|