Results 221 to 230 of about 49,336 (256)
Some of the next articles are maybe not open access.
2015
How we can evade, protest, and sabotage today's pervasive digital surveillance by deploying more data, not less—and why we should. With Obfuscation, Finn Brunton and Helen Nissenbaum mean to start a revolution. They are calling us not to the barricades but to our computers, offering us ways to fight today's pervasive digital surveillance—
Finn Brunton, Helen Nissenbaum
openaire +1 more source
How we can evade, protest, and sabotage today's pervasive digital surveillance by deploying more data, not less—and why we should. With Obfuscation, Finn Brunton and Helen Nissenbaum mean to start a revolution. They are calling us not to the barricades but to our computers, offering us ways to fight today's pervasive digital surveillance—
Finn Brunton, Helen Nissenbaum
openaire +1 more source
Obfuscation from Polynomial Hardness: Beyond Decomposable Obfuscation
2018Every known construction of general indistinguishability obfuscation (\(\mathsf {i}\mathcal {O}\)) is either based on a family of exponentially many assumptions, or is based on a single assumption – e.g. functional encryption (\(\mathsf {FE}\)) – using a reduction that incurs an exponential loss in security.
Yuan Kang +3 more
openaire +1 more source
2016
Obfuscation is challenging; we currently have practical candidates with rather vague security guarantees on the one side, and theoretical constructions which have recently experienced jeopardizing attacks against the underlying cryptographic assumptions on the other side.
Marc Fischlin +3 more
openaire +1 more source
Obfuscation is challenging; we currently have practical candidates with rather vague security guarantees on the one side, and theoretical constructions which have recently experienced jeopardizing attacks against the underlying cryptographic assumptions on the other side.
Marc Fischlin +3 more
openaire +1 more source
ACM Transactions on Computer Systems, 2010
Proactive obfuscation is a new method for creating server replicas that are likely to have fewer shared vulnerabilities. It uses semantics-preserving code transformations to generate diverse executables, periodically restarting servers with these fresh versions.
Roeder, Tom, Schneider, Fred B.
openaire +1 more source
Proactive obfuscation is a new method for creating server replicas that are likely to have fewer shared vulnerabilities. It uses semantics-preserving code transformations to generate diverse executables, periodically restarting servers with these fresh versions.
Roeder, Tom, Schneider, Fred B.
openaire +1 more source
The Quality of Obfuscation and Obfuscation Techniques
2007This paper aims an overview of the obfuscation transformations like layout, data, control, preventative and stealthy obfuscation. Software obfuscation is the common way to prevent reverse engineering. Obfuscation is one of the software secrets technique protections and in general, describes a practice that is used intentionally to make something more ...
openaire +1 more source
IEEE Transactions on Professional Communication, 1982
A rational and popular viewpoint is that the function of scientific writing is to communicate knowledge. A study of prominent journals, however, suggests that clear communication is not appreciated within the reading-writing-refereeing community. If clarity is a goal for a journal, the editor must take action.
openaire +2 more sources
A rational and popular viewpoint is that the function of scientific writing is to communicate knowledge. A study of prominent journals, however, suggests that clear communication is not appreciated within the reading-writing-refereeing community. If clarity is a goal for a journal, the editor must take action.
openaire +2 more sources

