Obfuscation

Results: 1117



#Item
341Obfuscation / Index of Abkhazia-related articles

   .

Add to Reading List

Source URL: kilgarriff.co.uk

Language: English - Date: 2014-03-09 16:16:05
342

A Primer on Cryptographic Multilinear Maps and Code Obfuscation by Kenwrick Mayo

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2015-09-22 00:19:28
    343

    Program Obfuscation with Leaky Hardware∗ Nir Bitansky† Ran Canetti∗ Shafi Goldwasser‡

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2011-12-06 22:25:01
      344

      Obfuscation by Partial Evaluation of Distorted Interpreters (Invited Talk) (meta 2012)

      Add to Reading List

      Source URL: meta2012.pereslavl.ru

      Language: English - Date: 2012-08-19 16:00:00
        345

        Search History Privacy Through Obfuscation: Introducing the Haystack Project Toorcamp 2009 Obligatory Biography ●

        Add to Reading List

        Source URL: www.davidhuerta.me

        Language: English - Date: 2014-03-15 02:18:32
          346Obfuscation / Computer programming / Index of Abkhazia-related articles / Software engineering / Toledo Nanochess

          Ohio Topic Guides – Answers Word Search for Chronicling America (http://chroniclingamerica.loc.gov) Directions: Find the words related to Ohio newspapers on Chronicling America. Answers can be forwards, backwards, hori

          Add to Reading List

          Source URL: www.ohiohistoryhost.org

          Language: English - Date: 2014-12-02 15:10:44
          347Obfuscation / Computer programming / Index of Abkhazia-related articles / Software engineering / Toledo Nanochess

          Ohio Newspaper Titles – Answers Word Search for Chronicling America (http://chroniclingamerica.loc.gov) Directions: Find the words related to Ohio newspapers on Chronicling America. Answers can be forwards, backwards,

          Add to Reading List

          Source URL: www.ohiohistoryhost.org

          Language: English - Date: 2014-12-02 15:10:34
          348

          Proceedings on Privacy Enhancing Technologies 2015; ):1–17 Reza Shokri* Privacy Games: Optimal User-Centric Data Obfuscation Abstract: Consider users who share their data (e.g., location) with an untrusted serv

          Add to Reading List

          Source URL: www.shokri.org

          Language: English - Date: 2015-05-28 18:48:10
            349

            Introduction Obfuscation Virtual Machines Android/Java appplications Conclusion

            Add to Reading List

            Source URL: archive.hack.lu

            Language: English - Date: 2010-11-01 09:39:47
              350Acorn Computers / Obfuscation / Telesoftware / BBC Micro / Bedstead - Mode7 Fonts

              BBC CONTINUING EDUCATION TELEVISION Computer Literacy Project BBC COMPUTER LITERACY PROJECT

              Add to Reading List

              Source URL: www.computinghistory.org.uk

              Language: English - Date: 2010-04-27 03:46:07
              UPDATE