Results 231 to 240 of about 50,028 (274)
Some of the next articles are maybe not open access.
On the Complexity of Compressing Obfuscation
Journal of Cryptology, 2018zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Gilad Asharov +3 more
openaire +3 more sources
2016
Obfuscation is challenging; we currently have practical candidates with rather vague security guarantees on the one side, and theoretical constructions which have recently experienced jeopardizing attacks against the underlying cryptographic assumptions on the other side.
Marc Fischlin +3 more
openaire +2 more sources
Obfuscation is challenging; we currently have practical candidates with rather vague security guarantees on the one side, and theoretical constructions which have recently experienced jeopardizing attacks against the underlying cryptographic assumptions on the other side.
Marc Fischlin +3 more
openaire +2 more sources
The Quality of Obfuscation and Obfuscation Techniques
2007This paper aims an overview of the obfuscation transformations like layout, data, control, preventative and stealthy obfuscation. Software obfuscation is the common way to prevent reverse engineering. Obfuscation is one of the software secrets technique protections and in general, describes a practice that is used intentionally to make something more ...
openaire +1 more source
Identifying the applied obfuscation method towards de-obfuscation
2016 IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS), 2016Recently, to prevent cracking, the various protection methods have been proposed. One of the protection methods is the obfuscation method. Obfuscation method changes the program into hard to understand for hiding secret information in the program. On the other hand, de-obfuscation is an interesting research topic for protecting the software.
Hayato Sagisaka, Haruaki Tamada
openaire +1 more source
2015
How we can evade, protest, and sabotage today's pervasive digital surveillance by deploying more data, not less—and why we should. With Obfuscation, Finn Brunton and Helen Nissenbaum mean to start a revolution. They are calling us not to the barricades but to our computers, offering us ways to fight today's pervasive digital surveillance—
Finn Brunton, Helen Nissenbaum
openaire +1 more source
How we can evade, protest, and sabotage today's pervasive digital surveillance by deploying more data, not less—and why we should. With Obfuscation, Finn Brunton and Helen Nissenbaum mean to start a revolution. They are calling us not to the barricades but to our computers, offering us ways to fight today's pervasive digital surveillance—
Finn Brunton, Helen Nissenbaum
openaire +1 more source
The Visual Computer, 2015
Analyzing and processing various data types in a privacy-preserving perspective has been researched in many disciplines; however, such an issue draws very limited attention in the research field of scientific visualization. We wondered if it is possible to delegate the rendering of a volume data set to a remote server(s) while still being able to ...
Chou, J.-K, Yang, C.-K.
openaire +2 more sources
Analyzing and processing various data types in a privacy-preserving perspective has been researched in many disciplines; however, such an issue draws very limited attention in the research field of scientific visualization. We wondered if it is possible to delegate the rendering of a volume data set to a remote server(s) while still being able to ...
Chou, J.-K, Yang, C.-K.
openaire +2 more sources
On obfuscating point functions
Proceedings of the thirty-seventh annual ACM symposium on Theory of computing, 2005We investigate the possibility of obfuscating point functions in the framework of Barak et al. from Crypto '01. A point function is a Boolean function that assumes the value 1 at exactly one point. Our main results are as follows:We provide a simple construction of efficient obfuscators for point functions for a slightly relaxed notion of obfuscation ...
openaire +2 more sources
Vertical Bargaining and Obfuscation
2022Firms often take actions that make it more difficult for consumers to gather information about the prices of products. These practices are widespread in many markets—by both the retailers that sell directly to consumers and, often, by product manufacturers. For instance, manufacturers can obscure prices by imposing different restrictions that limit the
openaire +2 more sources
Obfuscation: The Hidden Malware
IEEE Security & Privacy, 2011A cyberwar exists between malware writers and antimalware researchers. At this war's heart rages a weapons race that originated in the 80s with the first computer virus. Obfuscation is one of the latest strategies to camouflage the telltale signs of malware, undermine antimalware software, and thwart malware analysis.
O'Kane, Philip +2 more
openaire +2 more sources

