Obfuscation

Results: 1117



#Item
911Software engineering / Obfuscated code / Obfuscation / Source code / Seattle Mariners all-time roster / Computer programming / Latin alphabets / Computing

PDF Document

Add to Reading List

Source URL: www.nh.gov

Language: English - Date: 2014-06-24 11:05:23
912Obfuscated code / Obfuscation / Source code / Classical cipher / Computer programming / Computing / Software engineering

2001 IUPUI PERFORMANCE REPORT IUPUI AT A GLANCE INDIANA’S MOST COMPREHENSIVE UNIVERSITY, OFFERING MORE THAN 180 INDIANA AND PURDUE DEGREE PROGRAMS ★ INDIANA’S CENTER FOR GRADUATE PROFESSIONAL EDUCATION

Add to Reading List

Source URL: iport.iupui.edu

Language: English - Date: 2006-02-22 14:34:30
913Obfuscated code / Obfuscation / Source code

Microsoft Word - 58BBF43F.doc

Add to Reading List

Source URL: www.ifad.org

Language: English - Date: 2010-10-06 12:17:46
914Obfuscated code / Obfuscation / Source code / Classical cipher / Computer programming / Computing / Software engineering

PDF Document

Add to Reading List

Source URL: www.ifad.org

Language: English - Date: 2010-10-06 12:23:54
915Debugging / Disassembler / Programming language implementation / Assembly language / Branch table / Decompiler / JMP / Basic block / Pointer / Computer programming / Computing / Software engineering

Obfuscation of Executable Code to Improve Resistance to Static Disassembly  Cullen Linn Saumya Debray Department of Computer Science University of Arizona

Add to Reading List

Source URL: www.cs.arizona.edu

Language: English - Date: 2007-05-20 07:04:23
916Obfuscation / Source code / Linguistics / Classical cipher / Computer programming / Computing / Obfuscated code

PDF Document

Add to Reading List

Source URL: www.cbk.gov.kw

Language: English - Date: 2011-06-16 06:55:44
917Game theory / Consumer theory / Economic equilibrium / Location model / Monopoly / Price dispersion / Oligopoly / Demand / Search theory / Economics / Pricing / Microeconomics

NBER WORKING PAPER SERIES A SEARCH COST MODEL OF OBFUSCATION Glenn Ellison Alexander Wolitzky Working Paper 15237

Add to Reading List

Source URL: www.nber.org

Language: English - Date: 2011-12-05 13:22:32
918Complexity classes / Circuit complexity / Computability theory / Cryptography / Obfuscation / Obfuscated code / Algorithm / Oracle machine / Semantic security / Theoretical computer science / Computational complexity theory / Applied mathematics

On the (Im)possibility of Obfuscating Programs (Extended Abstract) Boaz Barak1 , Oded Goldreich1 , Rusell Impagliazzo2 , Steven Rudich3 , Amit Sahai4 , Salil Vadhan5 , and Ke Yang3 1

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2006-11-25 00:57:23
919Obfuscated code / Obfuscation / Source code / Four-square cipher / Computer programming / Linguistics / Computing

C LlEMTIOAA}OTIIIAMIIAHCKOE P e x o r u e n g yueerS - n o a a pp e c r o p a HBae r g sK a c n a p!cu c o r c \4[T I

Add to Reading List

Source URL: www.hotelbergs.lv

Language: English - Date: 2012-03-06 04:52:36
920Jan Willem Klop / Obfuscated code / Obfuscation / Source code

Pre-Bid Conference Presentation for RFQ[removed], Bright Schools Technical Assistance Program

Add to Reading List

Source URL: www.energy.ca.gov

Language: English - Date: 2014-07-24 14:52:06
UPDATE