From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Foundation for Systems Security.. AISC, том 98 из CRPIT, стр. 3. Australian Computer Society, (2009)Manufacturing opaque predicates in distributed systems for code obfuscation., и . ACSC, том 48 из CRPIT, стр. 187-196. Australian Computer Society, (2006)Manufacturing Cheap, Resilient, and Stealthy Opaque Constructs., , и . POPL, стр. 184-196. ACM, (1998)Rectilinear Steiner Tree Minimization on a Workstation., , и . Computational Support for Discrete Mathematics, том 15 из DIMACS Series in Discrete Mathematics and Theoretical Computer Science, стр. 119-136. DIMACS/AMS, (1992)A Survey of Software Watermarking., , и . ISI, том 3495 из Lecture Notes in Computer Science, стр. 454-458. Springer, (2005)Securing Mobile Agents Control Flow Using Opaque Predicates., и . KES (3), том 3683 из Lecture Notes in Computer Science, стр. 1065-1071. Springer, (2005)Delay optimization of carry-skip adders and block carry-lookahead adders., , , и . IEEE Symposium on Computer Arithmetic, стр. 154-164. IEEE, (1991)Privacy patterns.. PST, стр. 656-663. IEEE, (2016)Axiomatic and Behavioural Trust.. TRUST, том 6101 из Lecture Notes in Computer Science, стр. 352-366. Springer, (2010)Graph-Based Approaches to Software Watermarking., , , и . WG, том 2880 из Lecture Notes in Computer Science, стр. 156-167. Springer, (2003)