Sciweavers

935 search results - page 2 / 187
» A Framework for Obfuscated Interpretation
Sort
View
CCS
2007
ACM
13 years 11 months ago
Program obfuscation: a quantitative approach
Despite the recent advances in the theory underlying obfuscation, there still is a need to evaluate the quality of practical obfuscating transformations more quickly and easily. T...
Bertrand Anckaert, Matias Madou, Bjorn De Sutter, ...
JCS
2010
82views more  JCS 2010»
13 years 3 months ago
Independence from obfuscation: A semantic framework for diversity
Riccardo Pucella, Fred B. Schneider
IJNSEC
2008
150views more  IJNSEC 2008»
13 years 4 months ago
Tamper Resistant Software Through Intent Protection
One approach to protect distributed systems implemented with mobile code is through program obfuscation. Disguising program intent is a form of information hiding that facilitates...
Alec Yasinsac, J. Todd McDonald
PERVASIVE
2005
Springer
13 years 10 months ago
A Formal Model of Obfuscation and Negotiation for Location Privacy
Obfuscation concerns the practice of deliberately degrading the quality of information in some way, so as to protect the privacy of the individual to whom that information refers. ...
Matt Duckham, Lars Kulik
GRC
2007
IEEE
13 years 5 months ago
Privacy Preserving Collaborative Filtering Using Data Obfuscation
Collaborative filtering (CF) systems are being widely used in E-commerce applications to provide recommendations to users regarding products that might be of interest to them. Th...
Rupa Parameswaran, Douglas M. Blough