Inproceedings,

Two Control Computation Transformation Methods for Obfuscating Java Soft Software.

, and .
Web Technologies, Applications, and Services, page 48-52. IASTED/ACTA Press, (2005)

Meta data

Tags

Users

  • @dblp

Comments and Reviews