Results 231 to 240 of about 50,028 (274)
Some of the next articles are maybe not open access.

On the Complexity of Compressing Obfuscation

Journal of Cryptology, 2018
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Gilad Asharov   +3 more
openaire   +3 more sources

Obfuscation Combiners

2016
Obfuscation is challenging; we currently have practical candidates with rather vague security guarantees on the one side, and theoretical constructions which have recently experienced jeopardizing attacks against the underlying cryptographic assumptions on the other side.
Marc Fischlin   +3 more
openaire   +2 more sources

Obfuscation

Monthly Review, 2022
A new poem by Marge Piercy.
openaire   +1 more source

The Quality of Obfuscation and Obfuscation Techniques

2007
This paper aims an overview of the obfuscation transformations like layout, data, control, preventative and stealthy obfuscation. Software obfuscation is the common way to prevent reverse engineering. Obfuscation is one of the software secrets technique protections and in general, describes a practice that is used intentionally to make something more ...
openaire   +1 more source

Identifying the applied obfuscation method towards de-obfuscation

2016 IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS), 2016
Recently, to prevent cracking, the various protection methods have been proposed. One of the protection methods is the obfuscation method. Obfuscation method changes the program into hard to understand for hiding secret information in the program. On the other hand, de-obfuscation is an interesting research topic for protecting the software.
Hayato Sagisaka, Haruaki Tamada
openaire   +1 more source

Obfuscation

2015
How we can evade, protest, and sabotage today's pervasive digital surveillance by deploying more data, not less—and why we should. With Obfuscation, Finn Brunton and Helen Nissenbaum mean to start a revolution. They are calling us not to the barricades but to our computers, offering us ways to fight today's pervasive digital surveillance—
Finn Brunton, Helen Nissenbaum
openaire   +1 more source

Obfuscated volume rendering

The Visual Computer, 2015
Analyzing and processing various data types in a privacy-preserving perspective has been researched in many disciplines; however, such an issue draws very limited attention in the research field of scientific visualization. We wondered if it is possible to delegate the rendering of a volume data set to a remote server(s) while still being able to ...
Chou, J.-K, Yang, C.-K.
openaire   +2 more sources

On obfuscating point functions

Proceedings of the thirty-seventh annual ACM symposium on Theory of computing, 2005
We investigate the possibility of obfuscating point functions in the framework of Barak et al. from Crypto '01. A point function is a Boolean function that assumes the value 1 at exactly one point. Our main results are as follows:We provide a simple construction of efficient obfuscators for point functions for a slightly relaxed notion of obfuscation ...
openaire   +2 more sources

Vertical Bargaining and Obfuscation

2022
Firms often take actions that make it more difficult for consumers to gather information about the prices of products. These practices are widespread in many markets—by both the retailers that sell directly to consumers and, often, by product manufacturers. For instance, manufacturers can obscure prices by imposing different restrictions that limit the
openaire   +2 more sources

Obfuscation: The Hidden Malware

IEEE Security & Privacy, 2011
A cyberwar exists between malware writers and antimalware researchers. At this war's heart rages a weapons race that originated in the 80s with the first computer virus. Obfuscation is one of the latest strategies to camouflage the telltale signs of malware, undermine antimalware software, and thwart malware analysis.
O'Kane, Philip   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy