Obfuscation

Results: 1117



#Item
781ID-based encryption / Cipher / Adaptive chosen-ciphertext attack / Semantic security / Cryptography / Ciphertext indistinguishability / RSA

Fully Secure Functional Encryption without Obfuscation Sanjam Garg∗ Craig Gentry† Shai Halevi‡

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-11-12 08:24:27
782Computing / Obfuscated code / Obfuscation / Source code / Latin-derived alphabet / Computer programming / Latin alphabets / Software engineering

Financial Statements Gaelic College Foundation March 31, 2013

Add to Reading List

Source URL: www.gaeliccollege.edu

Language: English - Date: 2014-01-17 22:44:49
783Obfuscated code / Obfuscation / Source code / Classical cipher / Computer programming / Computing / Linguistics

PDF Document

Add to Reading List

Source URL: www.minedu.govt.nz

Language: English - Date: 2014-02-18 20:09:02
784Obfuscated code / Obfuscation / Source code / Word square / Computer programming / Computing / Software engineering

VILLAGEOF FERINTOSH Land Use Bylaw No. 426 F O R MA APPLICATIONNO.

Add to Reading List

Source URL: www.ferintosh.info

Language: English - Date: 2013-01-01 12:09:38
785Source code / Computing / Classical cipher / Computer programming / Obfuscated code / Obfuscation

PDF Document

Add to Reading List

Source URL: pcw.gov.ph

Language: English - Date: 2014-07-31 21:53:26
786Classical cipher / Obfuscated code / Obfuscation / Source code

PDF Document

Add to Reading List

Source URL: www.westharlemdc.org

Language: English - Date: 2012-11-09 10:37:37
787Obfuscated code / Obfuscation / Source code / Speech Assessment Methods Phonetic Alphabet chart for English / Computer programming / Computing / Software engineering

Microsoft Word[removed]CICA Stmts BOG.doc

Add to Reading List

Source URL: www.trentu.ca

Language: English - Date: 2010-03-25 09:52:24
788Obfuscated code / Obfuscation / Source code / Four-square cipher / Computer programming / Computing / Software engineering

Case 3:13-cv[removed]LRH-WGC Document 23 Filed[removed]Page 1 of 4 EXHIBIT 19 Page 1 of 3

Add to Reading List

Source URL: www.southeastconnector.com

Language: English - Date: 2013-09-24 19:15:32
789Crime prevention / Law enforcement / National security / Obfuscation / Surveillance / Internet privacy / Data mining / Privacy / Point of interest / Ethics / Behavior / Security

Cyber-Surveillance in Everyday Life: An International Workshop * May 12-15, 2011 *University of Toronto DRAFT: DO NOT CITE Vernacular Resistance To Data Collection And Analysis: A Political Philosophy Of Obfuscation [Tor

Add to Reading List

Source URL: www.digitallymediatedsurveillance.ca

Language: English - Date: 2011-04-21 17:57:43
790Obfuscated code / Obfuscation / Source code / Classical cipher / International Obfuscated C Code Contest / Computer programming / Computing / Software engineering

To the Mother of W a t e r s By Kevin Healey / admit your plateau, because have not yet satisfied myself

Add to Reading List

Source URL: www.saexplorers.org

Language: English - Date: 2014-11-29 05:14:08
UPDATE