|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 88 occurrences of 76 keywords
|
|
|
Results
Found 67 publication records. Showing 67 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
51 | Praveen Sivadasan, P. Sojan Lal, Naveen Sivadasan |
JDATATRANS for array obfuscation in Java source codes to defeat reverse engineering from decompiled codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Bangalore Compute Conf. ![In: Proceedings of the 2nd Bangalore Annual Compute Conference, Compute 2009, Bangalore, India, January 9-10, 2009, pp. 13, 2009, ACM, 978-1-60558-476-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
restructured arrays, source code obfuscation, reverse engineering |
36 | Muhammad Raza Ali |
Why teach reverse engineering? ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGSOFT Softw. Eng. Notes ![In: ACM SIGSOFT Softw. Eng. Notes 30(4), pp. 1-4, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
software evolution and maintenance, software reverse engineering, internet, software engineering, program understanding, reengineering, legacy systems, obfuscate, plagiarism |
34 | Shenoda Guirguis, Alok Pareek |
BronzeGate: real-time transactional data obfuscation for GoldenGate. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDBT ![In: EDBT 2010, 13th International Conference on Extending Database Technology, Lausanne, Switzerland, March 22-26, 2010, Proceedings, pp. 645-650, 2010, ACM, 978-1-60558-945-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
data obfuscation, real-time transactional data management, security, privacy, usability, masking |
34 | Haibo Chen 0001, Liwei Yuan, Xi Wu 0001, Binyu Zang, Bo Huang 0002, Pen-Chung Yew |
Control flow obfuscation with information flow tracking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MICRO ![In: 42st Annual IEEE/ACM International Symposium on Microarchitecture (MICRO-42 2009), December 12-16, 2009, New York, New York, USA, pp. 391-400, 2009, ACM, 978-1-60558-798-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
control flow obfuscation, opaque predicate, information flow tracking, control speculation |
34 | Xiangdong An 0001, Dawn N. Jutla, Nick Cercone |
Reasoning about obfuscated private information: who have lied and how to lie. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2006 ACM Workshop on Privacy in the Electronic Society, WPES 2006, Alexandria, VA, USA, October 30, 2006, pp. 85-88, 2006, ACM, 1-59593-556-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Bayesian networks, privacy protection, inference control, ubiquitous environments |
34 | Satoshi Hada |
Zero-Knowledge and Code Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, December 3-7, 2000, Proceedings, pp. 443-457, 2000, Springer, 3-540-41404-5. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
34 | Christian S. Collberg, Clark D. Thomborson, Douglas Low |
Breaking Abstractions and Unstructuring Data Structures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCL ![In: Proceedings of the 1998 International Conference on Computer Languages, ICCL 1998, Chicago, IL, USA, May 14-16, 1998, pp. 28-38, 1998, IEEE Computer Society, 0-8186-8454-2. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
obfuscation, intellectual property protection, code transformations |
30 | Antigoni Polychroniadou, Gabriele Cipriani, Richard Hua, Tucker Balch |
Atlas-X Equity Financing: Unlocking New Methods to Securely Obfuscate Axe Inventory Data Based on Differential Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2024, pp. 461, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP BibTeX RDF |
|
30 | Antigoni Polychroniadou, Gabriele Cipriani, Richard Hua, Tucker Balch |
Atlas-X Equity Financing: Unlocking New Methods to Securely Obfuscate Axe Inventory Data Based on Differential Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAMAS ![In: Proceedings of the 23rd International Conference on Autonomous Agents and Multiagent Systems, AAMAS 2024, Auckland, New Zealand, May 6-10, 2024, pp. 1585-1592, 2024, ACM. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP BibTeX RDF |
|
30 | Yanhui Chen, Yun Feng, Zhi Wang, Jianjun Zhao, Chengchun Wang, Qixu Liu |
IMaler: An Adversarial Attack Framework to Obfuscate Malware Structure Against DGCNN-Based Classifier via Reinforcement Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: IEEE International Conference on Communications, ICC 2023, Rome, Italy, May 28 - June 1, 2023, pp. 790-796, 2023, IEEE, 978-1-5386-7462-8. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
30 | Ian McQuoid, Mike Rosulek, Jiayu Xu |
How to Obfuscate MPC Inputs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2022, pp. 1463, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
30 | Daniel Gibert, Matt Fredrikson, Carles Mateu, Jordi Planes, Quan Le |
Enhancing the insertion of NOP instructions to obfuscate malware via deep reinforcement learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 113, pp. 102543, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
30 | Ian McQuoid, Mike Rosulek, Jiayu Xu |
How to Obfuscate MPC Inputs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC (2) ![In: Theory of Cryptography - 20th International Conference, TCC 2022, Chicago, IL, USA, November 7-10, 2022, Proceedings, Part II, pp. 151-180, 2022, Springer, 978-3-031-22364-8. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
30 | Bijan Shahbaz Nejad, Peter Roch, Marcus Handte, Pedro José Marrón |
Enhancing Privacy in Computer Vision Applications: An Emotion Preserving Approach to Obfuscate Faces. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISVC (2) ![In: Advances in Visual Computing - 17th International Symposium, ISVC 2022, San Diego, CA, USA, October 3-5, 2022, Proceedings, Part II, pp. 80-90, 2022, Springer, 978-3-031-20715-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
30 | Daniel Gibert, Matt Fredrikson, Carles Mateu, Jordi Planes, Quan Le |
Enhancing the Insertion of NOP Instructions to Obfuscate Malware via Deep Reinforcement Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2111.09626, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
30 | David Eberius, David Böhme, Olga Pearce |
Did the GPU obfuscate the load imbalance in my MPI simulation? ![Search on Bibsonomy](Pics/bibsonomy.png) |
HiPar@SC ![In: IEEE/ACM International Workshop on Hierarchical Parallelism for Exascale Computing, HiPar@SC 2021, St. Louis, MO, USA, November 14, 2021, pp. 20-29, 2021, IEEE, 978-1-6654-1132-5. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
30 | Raghavendra Pradyumna Pothukuchi, Sweta Yamini Pothukuchi, Petros G. Voulgaris, Alexander G. Schwing, Josep Torrellas |
Maya: Using Formal Control to Obfuscate Power Side Channels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCA ![In: 48th ACM/IEEE Annual International Symposium on Computer Architecture, ISCA 2021, Virtual Event / Valencia, Spain, June 14-18, 2021, pp. 888-901, 2021, IEEE, 978-1-6654-3333-4. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
30 | Marcin Kardas, Marek Klonowski, Piotr Syga |
How to obfuscate execution of protocols in an ad hoc radio network? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ad Hoc Networks ![In: Ad Hoc Networks 84, pp. 90-106, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
30 | Jia-Ning Luo, Ming-Hour Yang, Kuo-Yu Tsai |
A geographic map-based middleware framework to obfuscate smart vehicles' locations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Tools Appl. ![In: Multim. Tools Appl. 78(20), pp. 28877-28902, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
30 | Diego Esteves, Aniketh Janardhan Reddy, Piyush Chawla, Jens Lehmann 0001 |
Belittling the Source: Trustworthiness Indicators to Obfuscate Fake News on the Web. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1809.00494, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
30 | Xiaopeng Yang, Stanko Dimitrov |
Data envelopment analysis may obfuscate corporate financial data: using support vector machine and data envelopment analysis to predict corporate failure for nonmanufacturing firms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INFOR Inf. Syst. Oper. Res. ![In: INFOR Inf. Syst. Oper. Res. 55(4), pp. 295-311, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
30 | Dale Schinstock, Shane Smith, Warren N. White |
Does inexpensive hardware obfuscate simple experiments for control systems laboratories? ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACC ![In: 2017 American Control Conference, ACC 2017, Seattle, WA, USA, May 24-26, 2017, pp. 5355-5360, 2017, IEEE, 978-1-5090-5992-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
30 | Joe Zimmerman |
How to Obfuscate Programs Directly. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT (2) ![In: Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II, pp. 439-467, 2015, Springer, 978-3-662-46802-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
30 | Joe Zimmerman |
How to Obfuscate Programs Directly. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2014, pp. 776, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
30 | Justin L. Rice, Vir V. Phoha, Philip Robinson |
Using Mussel-Inspired Self-Organization and Account Proxies to Obfuscate Workload Ownership and Placement in Clouds. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 8(6), pp. 963-972, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
30 | Juan E. Tapiador, Julio C. Hernandez-Castro, Pedro Peris-Lopez |
Online Randomization Strategies to Obfuscate User Behavioral Patterns. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Netw. Syst. Manag. ![In: J. Netw. Syst. Manag. 20(4), pp. 561-578, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
30 | Edward Ferguson, Joseph Weber, Ragib Hasan |
Cloud Based Content Fetching: Using Cloud Infrastructure to Obfuscate Phishing Scam Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SERVICES ![In: Eighth IEEE World Congress on Services, SERVICES 2012, Honolulu, HI, USA, June 24-29, 2012, pp. 255-261, 2012, IEEE Computer Society, 978-1-4673-3053-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
30 | Patrick LaRoche, Nur Zincir-Heywood, Malcolm I. Heywood |
Using Code Bloat to Obfuscate Evolved Network Traffic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EvoApplications (2) ![In: Applications of Evolutionary Computation, EvoApplications 2010: EvoCOMNET, EvoENVIRONMENT, EvoFIN, EvoMUSART, and EvoTRANSLOG, Istanbul, Turkey, April 7-9, 2010, Proceedings, Part II, pp. 101-110, 2010, Springer, 978-3-642-12241-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
30 | William R. Cheswick |
Johnny Can Obfuscate: Beyond Mother's Maiden Name. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HotSec ![In: 1st USENIX Workshop on Hot Topics in Security, HotSec'06, Vancouver, BC, Canada, July 31, 2006, 2006, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
30 | William Zhu 0001, Clark D. Thomborson, Fei-Yue Wang 0001 |
Obfuscate arrays by homomorphic functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GrC ![In: 2006 IEEE International Conference on Granular Computing, GrC 2006, Atlanta, Georgia, USA, May 10-12, 2006, pp. 770-773, 2006, IEEE, 1-4244-0134-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Andrea Bianchi, Ian Oakley, Dong-Soo Kwon |
The secure haptic keypad: a tactile password system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI ![In: Proceedings of the 28th International Conference on Human Factors in Computing Systems, CHI 2010, Atlanta, Georgia, USA, April 10-15, 2010, pp. 1089-1092, 2010, ACM, 978-1-60558-929-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
pin entry, tactile ui, security, user study |
17 | Karen Renaud, Joseph Maguire 0001 |
Armchair authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BCS HCI ![In: Proceedings of the 2009 British Computer Society Conference on Human-Computer Interaction, BCS-HCI 2009, Cambridge, United Kingdom, 1-5 September 2009, pp. 388-397, 2009, ACM. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
graphical authentication mechanism, secluded space, context, shared space |
17 | Ken Layng |
Non-technical keys to keeping your personally identifiable information PII risk mitigation project on track. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the ACM SIGUCCS Fall Conference on User Services 2009, St. Louis, Missouri, USA, October 11-14, 2009, pp. 223-228, 2009, ACM, 978-1-60558-477-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
PII, non-technical, management, efficiency, encryption, project, risks, strategy, sensitive, scanning, data, team, remediation, mitigate |
17 | Shucai Xiao, Jung-Min Park 0001, Yanzhu Ye |
Tamper Resistance for Software Defined Radio Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC (1) ![In: Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, COMPSAC 2009, Seattle, Washington, USA, July 20-24, 2009. Volume 1, pp. 383-391, 2009, IEEE Computer Society, 978-0-7695-3726-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Razvi Doomun, Thaier Hayajneh, Prashant Krishnamurthy, David Tipper |
SECLOUD: Source and Destination Seclusion Using Clouds for wireless ad hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC 2009), July 5-8, Sousse, Tunisia, pp. 361-367, 2009, IEEE Computer Society, 978-1-4244-4672-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Kevin J. Hoffman, Patrick Eugster, Suresh Jagannathan |
Semantics-aware trace analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PLDI ![In: Proceedings of the 2009 ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI 2009, Dublin, Ireland, June 15-21, 2009, pp. 453-464, 2009, ACM, 978-1-60558-392-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
semantic tracing, trace views, tracing, testing tools, automated debugging, debugging aids |
17 | Stephen Drape, Irina Voiculescu |
Creating Transformations for Matrix Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAS ![In: Static Analysis, 16th International Symposium, SAS 2009, Los Angeles, CA, USA, August 9-11, 2009. Proceedings, pp. 273-292, 2009, Springer, 978-3-642-03236-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Program Transformations, Information Hiding, Obfuscation, Matrix Operations |
17 | Kevin S. Bauer, Damon McCoy, Ben Greenstein, Dirk Grunwald, Douglas C. Sicker |
Performing traffic analysis on a wireless identifier-free link layer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Richard Tapia Celebration of Diversity in Computing Conference ![In: Proceedings of the Richard Tapia Celebration of Diversity in Computing Conference 2009: Intellect, Initiatives, Insight, and Innovations, Portland, Oregon, USA, April 1-4, 2009, pp. 18-23, 2009, ACM, 978-1-60558-217-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Monirul Islam Sharif, Andrea Lanzi, Jonathon T. Giffin, Wenke Lee |
Automatic Reverse Engineering of Malware Emulators. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SP ![In: 30th IEEE Symposium on Security and Privacy (SP 2009), 17-20 May 2009, Oakland, California, USA, pp. 94-109, 2009, IEEE Computer Society, 978-0-7695-3633-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Christelle Braun, Konstantinos Chatzikokolakis 0001, Catuscia Palamidessi |
Compositional Methods for Information-Hiding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FoSSaCS ![In: Foundations of Software Science and Computational Structures, 11th International Conference, FOSSACS 2008, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2008, Budapest, Hungary, March 29 - April 6, 2008. Proceedings, pp. 443-457, 2008, Springer, 978-3-540-78497-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Christian Kästner, Sven Apel, Martin Kuhlemann |
Granularity in software product lines. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSE ![In: 30th International Conference on Software Engineering (ICSE 2008), Leipzig, Germany, May 10-18, 2008, pp. 311-320, 2008, ACM, 978-1-60558-079-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
feature refactoring, virtual separation of concerns, software product lines, ide |
17 | ZhangBing Zhou, Sami Bhiri, Manfred Hauswirth |
Control and data dependencies in business processes based on semantic business activities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
iiWAS ![In: iiWAS'2008 - The Tenth International Conference on Information Integration and Web-based Applications Services, 24-26 November 2008, Linz, Austria, pp. 257-263, 2008, ACM, 978-1-60558-349-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
web service based business process, semantics, data dependency, control dependency, sequencing constraint |
17 | Diomidis Spinellis |
I Spy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Softw. ![In: IEEE Softw. 24(2), pp. 16-17, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
performance, measurement, analysis, tracing, instrumentation |
17 | Romain Beauxis, Konstantinos Chatzikokolakis 0001, Catuscia Palamidessi, Prakash Panangaden |
Formal Approaches to Information-Hiding (Tutorial). ![Search on Bibsonomy](Pics/bibsonomy.png) |
TGC ![In: Trustworthy Global Computing, Third Symposium, TGC 2007, Sophia-Antipolis, France, November 5-6, 2007, Revised Selected Papers, pp. 347-362, 2007, Springer, 978-3-540-78662-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Marcelo De Barros, Jing Shiau, Chen Shang, Kenton Gidewall, Hui Shi, Joe Forsmann |
Web Services Wind Tunnel: On Performance Testing Large-Scale Stateful Web Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSN ![In: The 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2007, 25-28 June 2007, Edinburgh, UK, Proceedings, pp. 612-617, 2007, IEEE Computer Society, 0-7695-2855-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Bobby D. Birrer, Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins, Robert W. Bennington |
Program Fragmentation as a Metamorphic Software Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Third International Symposium on Information Assurance and Security, IAS 2007, August 29-31, 2007, Manchester, United Kingdom, pp. 369-374, 2007, IEEE Computer Society, 978-0-7695-2876-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Qinyi Wu, Calton Pu, Akhil Sahai, Roger S. Barga |
Categorization and Optimization of Synchronization Dependencies in Business Processes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDE ![In: Proceedings of the 23rd International Conference on Data Engineering, ICDE 2007, The Marmara Hotel, Istanbul, Turkey, April 15-20, 2007, pp. 306-315, 2007, IEEE Computer Society, 1-4244-0802-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Ben Adida, Douglas Wikström |
How to Shuffle in Public. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings, pp. 555-574, 2007, Springer, 3-540-70935-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Karl Gyllstrom, Dorian Miller, P. David Stotts |
Techniques for improving the visibility and "sharability" of semi-transparent video in shared workspaces. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Southeast Regional Conference ![In: Proceedings of the 45th Annual Southeast Regional Conference, 2007, Winston-Salem, North Carolina, USA, March 23-24, 2007, pp. 425-430, 2007, ACM, 978-1-59593-629-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
semi-transparency, collaboration, videoconferencing |
17 | Tao Jiang 0004, Helen J. Wang, Yih-Chun Hu |
Preserving location privacy in wireless lans. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiSys ![In: Proceedings of the 5th International Conference on Mobile Systems, Applications, and Services (MobiSys 2007), San Juan, Puerto Rico, June 11-13, 2007, pp. 246-257, 2007, ACM, 978-1-59593-614-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
privacy, localization, 802.11 |
17 | Di Lin, Paul Dunphy, Patrick Olivier, Jeff Yan |
Graphical passwords & qualitative spatial relations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOUPS ![In: Proceedings of the 3rd Symposium on Usable Privacy and Security, SOUPS 2007, Pittsburgh, Pennsylvania, USA, July 18-20, 2007, pp. 161-162, 2007, ACM, 978-1-59593-801-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
17 | James A. Jones, Mary Jean Harrold, James F. Bowring |
Debugging in Parallel. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSTA ![In: Proceedings of the ACM/SIGSOFT International Symposium on Software Testing and Analysis, ISSTA 2007, London, UK, July 9-12, 2007, pp. 16-26, 2007, ACM, 978-1-59593-734-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
execution clustering, empirical study, program analysis, fault localization, automated debugging |
17 | Pandurang Kamat, Wenyuan Xu 0001, Wade Trappe, Yanyong Zhang |
Temporal Privacy in Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS ![In: 27th IEEE International Conference on Distributed Computing Systems (ICDCS 2007), June 25-29, 2007, Toronto, Ontario, Canada, pp. 23, 2007, IEEE Computer Society, 0-7695-2837-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Srikanth Palla, Ram Dantu |
Unwanted SMTP Paths and Relays. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMSWARE ![In: Proceedings of the Second International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2007), January 7-12, 2007, Bangalore, India, 2007, IEEE, 1-4244-0614-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Christophe Clavier |
Secret External Encodings Do Not Prevent Transient Fault Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings, pp. 181-194, 2007, Springer, 978-3-540-74734-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Physical Attacks, Secret Algorithm, Cryptographic Design, External Encoding, Smart Cards, DES, Fault Analysis |
17 | Marios Iliofotou, Prashanth Pappu, Michalis Faloutsos, Michael Mitzenmacher, Sumeet Singh, George Varghese |
Network monitoring using traffic dispersion graphs (tdgs). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internet Measurement Conference ![In: Proceedings of the 7th ACM SIGCOMM Internet Measurement Conference, IMC 2007, San Diego, California, USA, October 24-26, 2007, pp. 315-320, 2007, ACM, 978-1-59593-908-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
behavioral approach, hosts' connection graphs, network traffic visualization, network monitoring |
17 | Xiangdong An 0001, Dawn N. Jutla, Nick Cercone |
Temporal Context Lie Detection and Generation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secure Data Management ![In: Secure Data Management, Third VLDB Workshop, SDM 2006, Seoul, Korea, September 10-11, 2006, Proceedings, pp. 30-47, 2006, Springer, 978-3-540-38984-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
pervasive computing, obfuscation, dynamic Bayesian networks, inference control, uncertain reasoning, Privacy management, context inference |
17 | Hilmi Günes Kayacik, Malcolm I. Heywood, Nur Zincir-Heywood |
On evolving buffer overflow attacks using genetic programming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GECCO ![In: Genetic and Evolutionary Computation Conference, GECCO 2006, Proceedings, Seattle, Washington, USA, July 8-12, 2006, pp. 1667-1674, 2006, ACM, 1-59593-186-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
intrusion detection systems, linear genetic programming, mimicry attacks |
17 | Abdulrahman Alarifi, Wenliang Du |
Diversify sensor nodes to improve resilience against node compromise. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SASN ![In: Proceedings of the 4th ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2006, Alexandria, VA, USA, October 30, 2006, pp. 101-112, 2006, ACM, 1-59593-554-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
wireless sensor networks, reverse engineering, diversity, obfuscation |
17 | Jürgen Nützel, Anja Beyer |
Towards Trust in Digital Rights Management Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustBus ![In: Trust and Privacy in Digital Business, Third International Conference, TrustBus 2006, Krakow, Poland, September 4-8, 2006, Proceedings, pp. 162-171, 2006, Springer, 3-540-37750-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Shafi Goldwasser, Yael Tauman Kalai |
On the Impossibility of Obfuscation with Auxiliary Input. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOCS ![In: 46th Annual IEEE Symposium on Foundations of Computer Science (FOCS 2005), 23-25 October 2005, Pittsburgh, PA, USA, Proceedings, pp. 553-562, 2005, IEEE Computer Society, 0-7695-2468-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Jurgen J. Vinju |
Type-Driven Automatic Quotation of Concrete Object Code in Meta Programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RISE ![In: Rapid Integration of Software Engineering Techniques, Second International Workshop, RISE 2005, Heraklion, Crete, Greece, September 8-9, 2005, Revised Selected Papers, pp. 97-112, 2005, Springer, 3-540-34063-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Michael Venable, Mohamed R. Chouchane, Md. Enamul Karim, Arun Lakhotia |
Analyzing Memory Accesses in Obfuscated x86 Executables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment, Second International Conference, DIMVA 2005, Vienna, Austria, July 7-8, 2005, Proceedings, pp. 1-18, 2005, Springer, 3-540-26613-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Serge Demeyer |
Refactor Conditionals into Polymorphism: What's the Performance Cost of Introducing Virtual Calls?. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSM ![In: 21st IEEE International Conference on Software Maintenance (ICSM 2005), 25-30 September 2005, Budapest, Hungary, pp. 627-630, 2005, IEEE Computer Society, 0-7695-2368-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Yusuke Sakabe, Masakazu Soshi, Atsuko Miyaji |
Java Obfuscation with a Theoretical Basis for Building Secure Mobile Agents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Communications and Multimedia Security ![In: Communications and Multimedia Security - Advanced Techniques for Network and Data Protection, 7th IFIP TC-6 TC-11 International Conference, CMS 2003, Torino, Italy, October 2-3, 2003, Proceedings, pp. 89-103, 2003, Springer, 3-540-20185-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
security, computational complexity, mobile agents, static analysis, obfuscation |
17 | André DeHon |
Very Large Scale Spatial Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UMC ![In: Unconventional Models of Computation, Third International Conference, UMC 2002, Kobe, Japan, October 15-19, 2002, Proceedings, pp. 27-36, 2002, Springer, 3-540-44311-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
17 | Hans-Wolfgang Loidl, Philip W. Trinder |
Engineering Large Parallel Functional Programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Implementation of Functional Languages ![In: Implementation of Functional Languages, 9th International Workshop, IFL'97, St. Andrews, Scotland, UK, September 10-12, 1997, Selected Papers, pp. 178-197, 1997, Springer, 3-540-64849-6. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #67 of 67 (100 per page; Change: )
|
|