Results 241 to 250 of about 50,028 (274)
Some of the next articles are maybe not open access.

Obfuscation from Polynomial Hardness: Beyond Decomposable Obfuscation

2018
Every known construction of general indistinguishability obfuscation (\(\mathsf {i}\mathcal {O}\)) is either based on a family of exponentially many assumptions, or is based on a single assumption – e.g. functional encryption (\(\mathsf {FE}\)) – using a reduction that incurs an exponential loss in security.
Yuan Kang   +3 more
openaire   +2 more sources

Incremental Program Obfuscation

2017
Recent advances in program obfuscation suggest that it is possible to create software that can provably safeguard secret information. However, software systems usually contain large executable code that is updated multiple times and sometimes very frequently.
Sanjam Garg, Omkant Pandey
openaire   +2 more sources

On Obstructing Obscenity Obfuscation

ACM Transactions on the Web, 2017
Obscenity (the use of rude words or offensive expressions) has spread from informal verbal conversations to digital media, becoming increasingly common on user-generated comments found in Web forums, newspaper user boards, social networks, blogs, and media-sharing sites.
openaire   +1 more source

Lockable Obfuscation

2017 IEEE 58th Annual Symposium on Foundations of Computer Science (FOCS), 2017
Rishab Goyal   +2 more
openaire   +2 more sources

Obfuscation

2021
Jeffrey Pawlick, Quanyan Zhu
openaire   +2 more sources

Eschew obfuscation

Obstetrics & Gynecology, 1996
E A, Friedman, J A, Pennisi
openaire   +2 more sources

Measuring Software Obfuscation Quality–A Systematic Literature Review

IEEE Access, 2021
Shouki A Ebad, Abdulbasit A Darem
exaly  

Obfuscation, Revisited

Journal of the American Society of Echocardiography, 2010
openaire   +2 more sources

Home - About - Disclaimer - Privacy