<--- Back to Details
First PageDocument Content
Source code / Jan Willem Klop / Computer programming / Obfuscated code / Obfuscation
Date: 2012-08-29 14:13:08
Source code
Jan Willem Klop
Computer programming
Obfuscated code
Obfuscation

Add to Reading List

Source URL: www.cdc.gov

Download Document from Source Website

File Size: 66,32 KB

Share Document on Facebook

Similar Documents

Internet architecture / Computing / Network architecture / Routing / Information and communications technology / Computer networking / Internet protocols / Traceroute / Hop / Network topology / Forwarding plane / Computer network

NetHide: Secure and Practical Network Topology Obfuscation Roland Meier∗ , Petar Tsankov∗ , Vincent Lenders , Laurent Vanbever∗ , Martin Vechev∗ ∗ ETH Zürich

DocID: 1xVcN - View Document

Internet architecture / Computing / Network architecture / Routing / Information and communications technology / Computer networking / Internet protocols / Traceroute / Hop / Network topology / Forwarding plane / Computer network

NetHide: Secure and Practical Network Topology Obfuscation Roland Meier∗ , Petar Tsankov∗ , Vincent Lenders , Laurent Vanbever∗ , Martin Vechev∗ ∗ ETH Zürich

DocID: 1xV3c - View Document

Internet architecture / Computing / Network architecture / Routing / Information and communications technology / Computer networking / Internet protocols / Traceroute / Hop / Network topology / Forwarding plane / Computer network

NetHide: Secure and Practical Network Topology Obfuscation Roland Meier∗ , Petar Tsankov∗ , Vincent Lenders , Laurent Vanbever∗ , Martin Vechev∗ ∗ ETH Zürich

DocID: 1xUT6 - View Document

Internet architecture / Computing / Network architecture / Routing / Information and communications technology / Computer networking / Internet protocols / Traceroute / Hop / Network topology / Forwarding plane / Computer network

NetHide: Secure and Practical Network Topology Obfuscation Roland Meier∗ , Petar Tsankov∗ , Vincent Lenders , Laurent Vanbever∗ , Martin Vechev∗ ∗ ETH Zürich

DocID: 1xUSD - View Document

Internet architecture / Computing / Network architecture / Routing / Information and communications technology / Computer networking / Internet protocols / Traceroute / Hop / Network topology / Forwarding plane / Computer network

NetHide: Secure and Practical Network Topology Obfuscation Roland Meier∗ , Petar Tsankov∗ , Vincent Lenders , Laurent Vanbever∗ , Martin Vechev∗ ∗ ETH Zürich

DocID: 1xUvT - View Document