The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for obfuscation with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1998-2003 (31) 2004 (18) 2005 (37) 2006 (40) 2007 (50) 2008 (50) 2009 (43) 2010 (39) 2011 (37) 2012 (48) 2013 (56) 2014 (133) 2015 (115) 2016 (153) 2017 (148) 2018 (159) 2019 (139) 2020 (157) 2021 (168) 2022 (152) 2023 (148) 2024 (44)
Publication types (Num. hits)
article(830) book(2) incollection(9) inproceedings(1091) phdthesis(33)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 385 occurrences of 212 keywords

Results
Found 1965 publication records. Showing 1965 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
25Nicolas Szlifierski Contrôle sûr de chaînes d'obfuscation logicielle. (Safe control of obfuscation toolchains). Search on Bibsonomy 2020   RDF
25Pierre Graux Challenges of native android applications: obfuscation and vulnerabilities. (Défis pour les applications Android Natives: obfuscation et vulnérabilités). Search on Bibsonomy 2020   RDF
25Yuan Kang, Chengyu Lin 0001, Tal Malkin, Mariana Raykova 0001 Obfuscation from Polynomial Hardness: Beyond Decomposable Obfuscation. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2019 DBLP  BibTeX  RDF
25Yuan Kang, Chengyu Lin 0001, Tal Malkin, Mariana Raykova 0001 Obfuscation from Polynomial Hardness: Beyond Decomposable Obfuscation. Search on Bibsonomy SCN The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
25Qipeng Liu 0001, Mark Zhandry Exploding Obfuscation: A Framework for Building Applications of Obfuscation From Polynomial Hardness. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2017 DBLP  BibTeX  RDF
25Qipeng Liu 0001, Mark Zhandry Decomposable Obfuscation: A Framework for Building Applications of Obfuscation from Polynomial Hardness. Search on Bibsonomy TCC (1) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
25G. Sumathi, L. Srivani, D. Thirugnana Murthy, Anish Kumar, K. Madhusoodanan Hardware Obfuscation Using Different Obfuscation Cell Structures for PLDs. Search on Bibsonomy SG-CRC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
25Ninon Eyrolles Obfuscation with Mixed Boolean-Arithmetic Expressions : reconstruction, analysis and simplification tools. (Obfuscation par expressions mixtes arithmético-booléennes : reconstruction, analyse et outils de simplification). Search on Bibsonomy 2017   RDF
25Hayato Sagisaka, Haruaki Tamada Identifying the applied obfuscation method towards de-obfuscation. Search on Bibsonomy ICIS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
25Christina Brzuska, Arno Mittelbach Indistinguishability Obfuscation versus Point Obfuscation with Auxiliary Input. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2014 DBLP  BibTeX  RDF
25Sandrine Blazy, Stéphanie Riaud Measuring the robustness of source program obfuscation: studying the impact of compiler optimizations on the obfuscation of C programs. Search on Bibsonomy CODASPY The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
25Christina Brzuska, Arno Mittelbach Indistinguishability Obfuscation versus Multi-bit Point Obfuscation with Auxiliary Input. Search on Bibsonomy ASIACRYPT (2) The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
25Jan Cappaert Code Obfuscation Techniques for Software Protection (Code obfuscatietechnieken voor softwarebeveiliging) ; Code Obfuscation Techniques for Software Protection. Search on Bibsonomy 2012   RDF
25Joanna Witkowska The Quality of Obfuscation and Obfuscation Techniques. Search on Bibsonomy Biometrics, Computer Security Systems and Artificial Intelligence Applications The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
25Liu Wenyin, Anthony Y. Fu, Xiaotie Deng Exposing Homograph Obfuscation Intentions by Coloring Unicode Strings. Search on Bibsonomy APWeb The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
25Claudio A. Ardagna, Marco Cremonini, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati Location Privacy Protection Through Obfuscation-Based Techniques. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
25Ryan Wishart, Karen Henricksen, Jadwiga Indulska Context Privacy and Obfuscation Supported by Dynamic Context Source Discovery and Processing in a Context Management System. Search on Bibsonomy UIC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
25Spyros Antonatos, Kostas G. Anagnostakis TAO: Protecting Against Hitlist Worms Using Transparent Address Obfuscation. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
25Peter Kawalek, David Graham Wastell, Michael Newman Problematisation and Obfuscation in e-Government. Search on Bibsonomy EGOV The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
25Stanley Chow, Yuan Xiang Gu, Harold Johnson, Vladimir A. Zakharov An Approach to the Obfuscation of Control-Flow of Sequential Computer Programs. Search on Bibsonomy ISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
25Satoshi Hada Zero-Knowledge and Code Obfuscation. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
24Amir Herzberg, Haya Schulmann, Amitabh Saxena, Bruno Crispo Towards a Theory of White-Box Security. Search on Bibsonomy SEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
24Artem Dinaburg, Paul Royal, Monirul Islam Sharif, Wenke Lee Ether: malware analysis via hardware virtualization extensions. Search on Bibsonomy CCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF unpacking, virtualization, dynamic analysis, emulation, malware analysis
24Shafi Goldwasser, Yael Tauman Kalai, Guy N. Rothblum One-Time Programs. Search on Bibsonomy CRYPTO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
24Sébastien Josse Secure and advanced unpacking using computer emulation. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Anti-virus testing, Human driven analysis, Fault injection, Forensics, Software protection, Malware analysis
24Changwei Liu, Sid Stamm Fighting unicode-obfuscated spam. Search on Bibsonomy eCrime Researchers Summit The full citation details ... 2007 DBLP  DOI  BibTeX  RDF SpamAssassin, deobfuscated emails, obfuscated emails, spam emails, unicode characters
24Bobby D. Birrer, Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins, Robert W. Bennington Program Fragmentation as a Metamorphic Software Protection. Search on Bibsonomy IAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Jeffrey Todd McDonald, Alec Yasinsac Applications for Provably Secure Intent Protection with Bounded Input-Size Programs. Search on Bibsonomy ARES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Carole Delporte-Gallet, Hugues Fauconnier, Rachid Guerraoui, Eric Ruppert Secretive Birds: Privacy in Population Protocols. Search on Bibsonomy OPODIS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Vijayanand Nagarajan, Rajiv Gupta 0001, Matias Madou, Xiangyu Zhang 0001, Bjorn De Sutter Matching Control Flow of Program Versions. Search on Bibsonomy ICSM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Anirban Majumdar 0001, Clark D. Thomborson, Stephen Drape A Survey of Control-Flow Obfuscations. Search on Bibsonomy ICISS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Jürgen Nützel, Anja Beyer How to Increase the Security of Digital Rights Management Systems Without Affecting Consumer's Security. Search on Bibsonomy ETRICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Richard J. Edell, Peter Kruus, Uri Meth Tracing HTTP Activity Through Non-cooperating HTTP Proxies (Short Paper). Search on Bibsonomy ICICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Ginger Myles, Hongxia Jin Self-validating Branch-Based Software Watermarking. Search on Bibsonomy Information Hiding The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Hideaki Goto, Masahiro Mambo, Hiroki Shizuya, Yasuyoshi Watanabe Evaluation of Tamper-Resistant Software Deviating from Structured Programming Rules. Search on Bibsonomy ACISP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
17P. V. G. D. Prasad Reddy, T. Srinivasa Rao, S. Phani Venkat A Threat Free Architecture for Privacy Assurance in Cloud Computing. Search on Bibsonomy SERVICES The full citation details ... 2011 DBLP  DOI  BibTeX  RDF Double Authentication, Hybrid Cloud, Privacy, Network, Obfuscation, Security Management, Plug-in, Cloud Computing Security
17Adam Waksman, Simha Sethumadhavan Silencing Hardware Backdoors. Search on Bibsonomy IEEE Symposium on Security and Privacy The full citation details ... 2011 DBLP  DOI  BibTeX  RDF security, performance, hardware, obfuscation, triggers, backdoors
17Arun Lakhotia, Davidson R. Boccardo, Anshuman Singh, Aleardo Manacero Context-sensitive analysis of obfuscated x86 executables. Search on Bibsonomy PEPM The full citation details ... 2010 DBLP  DOI  BibTeX  RDF analysis of bianries, deobfuscation, obfuscation, context-sensitive analysis
17Jeffrey Todd McDonald, Eric D. Trias, Yong C. Kim, Michael R. Grimaila Using logic-based reduction for adversarial component recovery. Search on Bibsonomy SAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF anti-tamper applications, circuit obfuscation, reverse engineering, intellectual property protection, hardware security
17He Lin, Xuan-sheng Mo, Ying Gao Based on RSA and Self-Modifying Mechanism of Software Protection. Search on Bibsonomy ISPA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF register-number, temper-resistance, self-modifying mechanism, software protection, code obfuscation
17John Bethencourt, Dawn Xiaodong Song, Brent Waters New Techniques for Private Stream Searching. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF private stream searching, public key program obfuscation, Bloom filter, private information retrieval
17Bertrand Anckaert, Mariusz H. Jakubowski, Ramarathnam Venkatesan, Chit Wei Saw Runtime Protection via Dataflow Flattening. Search on Bibsonomy SECURWARE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF security, data hiding, obfuscation, software protection
17Hyoungshick Kim, Joseph Bonneau Privacy-enhanced public view for social graphs. Search on Bibsonomy CIKM-SWSM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF graph obfuscation, public view, privacy, social networks
17Yichi Zhang, Jianmin Pang, Lili Bai, Wen Fu Static Analysis of Malware to Detect Exception Return. Search on Bibsonomy IFITA (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Malware, Obfuscation, Disassemble
17Vinod P. Nair, Vijay Laxmi, Manoj Singh Gaur, G. V. S. S. Phani Kumar, Yadvendra S. Chundawat Static CFG analyzer for metamorphic Malware code. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF metamorphic malware, normalization, obfuscation, control flow graph, longest common subsequence
17JungMin Kang, KiWook Sohn, Soonyoung Jung WebVaccine: A Client-Side Realtime Prevention System against Obfuscated Malicious Web Pages. Search on Bibsonomy NCM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF WebVaccine, Web Page, Obfuscation
17Zunping Cheng, Neil Hurley Effective diverse and obfuscated attacks on model-based recommender systems. Search on Bibsonomy RecSys The full citation details ... 2009 DBLP  DOI  BibTeX  RDF recommender systems, collaborative filtering, detection, attack, obfuscation
17Yevgeniy Dodis, Yael Tauman Kalai, Shachar Lovett On cryptography with auxiliary input. Search on Bibsonomy STOC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF auxiliary information, encryption schemes, learning parity with noise, error-correcting codes, randomness extractors, code obfuscation
17Mila Dalla Preda, Mihai Christodorescu, Somesh Jha, Saumya K. Debray A semantics-based approach to malware detection. Search on Bibsonomy ACM Trans. Program. Lang. Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF abstract interpretation, obfuscation, Malware detection, trace semantics
17Ran Canetti, Susan Hohenberger Chosen-ciphertext secure proxy re-encryption. Search on Bibsonomy CCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF encryption, obfuscation, chosen-ciphertext security, re-encryption
17Brecht Wyseur, Wil Michiels, Paul Gorissen, Bart Preneel Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF White-Box Cryptography, Cryptanalysis, DES, Data Encryption Standard, Obfuscation
17Mila Dalla Preda, Mihai Christodorescu, Somesh Jha, Saumya K. Debray A semantics-based approach to malware detection. Search on Bibsonomy POPL The full citation details ... 2007 DBLP  DOI  BibTeX  RDF abstract interpretation, obfuscation, malware detection, trace semantics
17Adam J. Lee, Parisa Tabriz, Nikita Borisov A privacy-preserving interdomain audit framework. Search on Bibsonomy WPES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF data obfuscation, distributed audit, logging
17Bertrand Anckaert, Mariusz H. Jakubowski, Ramarathnam Venkatesan Proteus: virtualization for diversified tamper-resistance. Search on Bibsonomy Digital Rights Management Workshop The full citation details ... 2006 DBLP  DOI  BibTeX  RDF virtualization, diversity, copyright protection, intellectual property, obfuscation, tamper-resistance
17Arun Lakhotia, Eric Uday Kumar, Michael Venable A Method for Detecting Obfuscated Calls in Malicious Binaries. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Invasive software (viruses, worms), abstract stack, validation, program analysis, obfuscation
17Matias Madou, Bertrand Anckaert, Bjorn De Sutter, Koen De Bosschere Hybrid static-dynamic attacks against software protection mechanisms. Search on Bibsonomy Digital Rights Management Workshop The full citation details ... 2005 DBLP  DOI  BibTeX  RDF watermarking, attacks, intellectual property, obfuscation, software protection, tamper-resistance
17Patrick Cousot, Radhia Cousot An abstract interpretation-based framework for software watermarking. Search on Bibsonomy POPL The full citation details ... 2004 DBLP  DOI  BibTeX  RDF software authorship, stegoanalyst, stegoattacks, stegokey, stegomark, stegosignature, validation watermarking, authentication, static analysis, abstract interpretation, steganography, fingerprinting, identification, copyrights protection, trustworthiness, obfuscation, intellectual property protection, software watermarking, tamper-proofing
17Elena Gabriela Barrantes, David H. Ackley, Trek S. Palmer, Darko Stefanovic, Dino Dai Zovi Randomized instruction set emulation to disrupt binary code injection attacks. Search on Bibsonomy CCS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF automated diversity, language randomization, security, emulation, information hiding, obfuscation
17Stephen Drape, Oege de Moor, Ganesh Sittampalam Transforming the .NET intermediate language using path logic programming. Search on Bibsonomy PPDP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF compiler optimisations, logic programming, program transformation, program analysis, obfuscation, meta programming
13Shu Hong, Lingjie Duan Location Privacy Protection Game Against Adversary Through Multi-User Cooperative Obfuscation. Search on Bibsonomy IEEE Trans. Mob. Comput. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Rahul Chaurasia, Anirban Sengupta Multi-cut based architectural obfuscation and handprint biometric signature for securing transient fault detectable IP cores during HLS. Search on Bibsonomy Integr. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Md. Moshiur Rahman 0001, Swarup Bhunia Practical Implementation of Robust State-Space Obfuscation for Hardware IP Protection. Search on Bibsonomy IEEE Trans. Very Large Scale Integr. Syst. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Prabhdeep Singh, Pawan Singh, Abhay Kumar Agarwal Improved encryption and obfuscation process of lightweight secured auditable cloud storage with data dynamics. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Yuval Ishai, Alexis Korb, Paul Lou, Amit Sahai Beyond the Csiszár-Körner Bound: Best-Possible Wiretap Coding via Obfuscation. Search on Bibsonomy J. Cryptol. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Aditi Roy, Kokila Jagadeesh, Ramasubramanian Natarajan, B. Shameedha Begum OTK-based PUF CRP obfuscation for IoT device authentication. Search on Bibsonomy Microelectron. J. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Hideaki Takahashi, Alex Fukunaga On the Transit Obfuscation Problem. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13James Bartusek, Zvika Brakerski, Vinod Vaikuntanathan Quantum State Obfuscation from Classical Oracles. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Tanvir Hossain, Matthew Showers, Mahmudul Hasan 0012, Tamzidul Hoque HOACS: Homomorphic Obfuscation Assisted Concealing of Secrets to Thwart Trojan Attacks in COTS Processor. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Filip Ilic, He Zhao 0004, Thomas Pock, Richard P. Wildes Selective, Interpretable, and Motion Consistent Privacy Attribute Obfuscation for Action Recognition. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Dominik Macko, Róbert Móro, Adaku Uchendu, Ivan Srba, Jason Samuel Lucas, Michiharu Yamashita, Nafis Irtiza Tripto, Dongwon Lee 0001, Jakub Simko, Mária Bieliková Authorship Obfuscation in Multilingual Machine-Generated Text Detection. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Songjie Xie, Youlong Wu, Jiaxuan Li, Ming Ding 0001, Khaled B. Letaief Privacy for Fairness: Information Obfuscation for Fair Representation Learning with Local Differential Privacy. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Brian Etter, James Lee Hu, Mohammedreza Ebrahimi, Weifeng Li 0002, Xin Li 0108, Hsinchun Chen Evading Deep Learning-Based Malware Detectors via Obfuscation: A Deep Reinforcement Learning Approach. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Yixiang Yao, Fei Wang, Srivatsan Ravi, Muhao Chen Privacy-Preserving Language Model Inference with Instance Obfuscation. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Haoran Geng, Yuezhi Che, Aaron Dingler, Michael T. Niemier, Xiaobo Sharon Hu A New Secure Memory System for Efficient Data Protection and Access Pattern Obfuscation. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Eric Xing, Saranya Venkatraman, Thai Le, Dongwon Lee 0001 ALISON: Fast and Effective Stylometric Authorship Obfuscation. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Håkon Harnes, Donn Morrison Cryptic Bytes: WebAssembly Obfuscation for Evading Cryptojacking Detection. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Jillian Fisher, Ximing Lu, Jaehun Jung, Liwei Jiang, Zaïd Harchaoui, Yejin Choi 0001 JAMDEC: Unsupervised Authorship Obfuscation using Constrained Decoding over Small Language Models. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Serhat Bakirtas, Elza Erkip Distribution-Agnostic Database De-Anonymization Under Obfuscation And Synchronization Errors. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Aayush Jain, Huijia Lin, Amit Sahai Indistinguishability Obfuscation from Well-Founded Assumptions. Search on Bibsonomy Commun. ACM The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Hassan Jameel Asghar, Benjamin Zi Hao Zhao, Muhammad Ikram 0001, Giang Linh Duc Nguyen, Dali Kaafar, Sean Lamont, Daniel Coscia Use of cryptography in malware obfuscation. Search on Bibsonomy J. Comput. Virol. Hacking Tech. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Kimia Zamiri Azar, Hadi Mardani Kamali, Farimah Farahmandi, Mark M. Tehranipoor Improving Bounded Model Checkers Scalability for Circuit De-Obfuscation: An Exploration. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Chongyao Xu, Litao Zhang, Pui-In Mak, Rui Paulo Martins, Man-Kay Law Fully Symmetrical Obfuscated Interconnection and Weak-PUF-Assisted Challenge Obfuscation Strong PUFs Against Machine-Learning Modeling Attacks. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Darius Mercadier, Viet Sang Nguyen, Matthieu Rivain, Aleksei Udovenko OBSCURE: Versatile Software Obfuscation from a Lightweight Secure Element. Search on Bibsonomy IACR Trans. Cryptogr. Hardw. Embed. Syst. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Shun Zhang 0002, Pengfei Lan, Benfei Duan, Zhili Chen, Hong Zhong 0001, Neal N. Xiong DPIVE: A Regionalized Location Obfuscation Scheme with Personalized Privacy Levels. Search on Bibsonomy ACM Trans. Sens. Networks The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Zhuang Shan, Leyou Zhang, Qing Wu 0005 Heuristic Ideal Obfuscation Scheme based on LWE Problem, its Variants and Quantum Oracle. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
13Ran Canetti, Claudio Chamon, Eduardo R. Mucciolo, Andrei E. Ruckenstein Towards general-purpose program obfuscation via local mixing. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
13Brent Waters, David J. Wu 0001 Adaptively-Sound Succinct Arguments for NP from Indistinguishability Obfuscation. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
13Kaartik Bhushan, Sai Lakshmi Bhavana Obbattu, Manoj Prabhakaran 0001, Rajeev Raghunath R3PO: Reach-Restricted Reactive Program Obfuscation and its Application to MA-ABE. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
13Fangqi Dong, Zihan Hao, Ethan Mook, Daniel Wichs Laconic Function Evaluation, Functional Encryption and Obfuscation for RAMs with Sublinear Computation. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
13Darius Mercadier, Viet Sang Nguyen, Matthieu Rivain, Aleksei Udovenko OBSCURE: Versatile Software Obfuscation from a Lightweight Secure Element. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
13James Bartusek, Zvika Brakerski, Vinod Vaikuntanathan Quantum State Obfuscation from Classical Oracles. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
13Ikram Ullah 0001, Munam Ali Shah SGO: Semantic Group Obfuscation for Location-Based Services in VANETS. Search on Bibsonomy Sensors The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Navid Rezazadeh, Solmaz S. Kia A Study of Privacy Preservation in Average Consensus Algorithm via Deterministic Obfuscation Signals. Search on Bibsonomy IEEE Trans. Control. Netw. Syst. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Kaartik Bhushan, Venkata Koppula, Manoj Prabhakaran 0001 Homomorphic Indistinguishability Obfuscation and Its Applications. Search on Bibsonomy ITCS The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Naiqian Zhang, Zheyun Feng, Dongpeng Xu 0001 An In-Depth Analysis of the Code-Reuse Gadgets Introduced by Software Obfuscation. Search on Bibsonomy ACNS (3) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Adrian Swindle, Derrick McNealy, Giri P. Krishnan, Ramyaa Ramyaa Evaluation of Large Language Models on Code Obfuscation (Student Abstract). Search on Bibsonomy AAAI The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Eric Xing, Saranya Venkatraman, Thai Le, Dongwon Lee 0001 ALISON: Fast and Effective Stylometric Authorship Obfuscation. Search on Bibsonomy AAAI The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Kaartik Bhushan, Sai Lakshmi Bhavana Obbattu, Manoj Prabhakaran 0001, Rajeev Raghunath R3PO: Reach-Restricted Reactive Program Obfuscation and Its Applications. Search on Bibsonomy Public Key Cryptography (3) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Guglielmo Faggioli, Nicola Ferro 0001 Query Obfuscation for Information Retrieval Through Differential Privacy. Search on Bibsonomy ECIR (1) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Haimanti Chakraborty, Ranga Vemuri ROBUST: RTL OBfuscation USing Bi-functional Polymorphic OperaTors. Search on Bibsonomy VLSID The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
Displaying result #101 - #200 of 1965 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license