From post

An Approach to the Obfuscation of Control-Flow of Sequential Computer Programs.

, , , и . ISC, том 2200 из Lecture Notes in Computer Science, стр. 144-155. Springer, (2001)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A White-Box DES Implementation for DRM Applications., , , и . Digital Rights Management Workshop, том 2696 из Lecture Notes in Computer Science, стр. 1-15. Springer, (2002)White-Box Cryptography and an AES Implementation., , , и . Selected Areas in Cryptography, том 2595 из Lecture Notes in Computer Science, стр. 250-270. Springer, (2002)Prototyping a New Identity Authentication Framework for IP Telephony., , , и . SECURWARE, стр. 47-52. IEEE Computer Society, (2008)Authenticated names., , и . NSPW, стр. 23-32. ACM, (2007)An Approach to the Obfuscation of Control-Flow of Sequential Computer Programs., , , и . ISC, том 2200 из Lecture Notes in Computer Science, стр. 144-155. Springer, (2001)