@dblp

Two Control Computation Transformation Methods for Obfuscating Java Soft Software.

, and . Web Technologies, Applications, and Services, page 48-52. IASTED/ACTA Press, (2005)

Description

dblp

Links and resources

Tags