Back to Results
First PageMeta Content
Data synchronization / Computer storage / Replication / Obfuscated code / Obfuscation / Fault-tolerant system / Tamper resistance / Proactivity / Computer security / Computing / Fault-tolerant computer systems / Computer programming


4 Proactive Obfuscation TOM ROEDER Microsoft Research and
Add to Reading List

Document Date: 2010-08-11 18:49:50


Open Document

File Size: 569,93 KB

Share Result on Facebook
UPDATE