๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

[Lecture Notes in Computer Science] Information Security Applications Volume 3786 || Software Protection Through Dynamic Code Mutation

โœ Scribed by Song, Joo-Seok; Kwon, Taekyoung; Yung, Moti


Book ID
115490989
Publisher
Springer Berlin Heidelberg
Year
2006
Weight
602 KB
Category
Article
ISBN
3540331530

No coin nor oath required. For personal study only.


๐Ÿ“œ SIMILAR VOLUMES


[Lecture Notes in Computer Science] Info
โœ Song, Joo-Seok; Kwon, Taekyoung; Yung, Moti ๐Ÿ“‚ Article ๐Ÿ“… 2006 ๐Ÿ› Springer Berlin Heidelberg ๐ŸŒ German โš– 564 KB

This Book Constitutes The Refereed Proceedings Of The 6th International Workshop On Information Security Applications, Wisa 2005, Held In Jeju Island, Korea, In August 2005. The 29 Revised Full Papers Presented Were Carefully Selected During Two Rounds Of Reviewing And Improvement From 168 Submissio

[Lecture Notes in Computer Science] Soft
โœ Oquendo, Flavio; Warboys, Brian C.; Morrison, Ron ๐Ÿ“‚ Article ๐Ÿ“… 2004 ๐Ÿ› Springer Berlin Heidelberg ๐ŸŒ English โš– 418 KB

The last decade has been one of great progress in the field of software architecture research and practice. Software architecture has emerged as an important subdis- pline of software engineering. A key aspect of the design of any software system is its architecture, i. e. the fundamental organizati

[Lecture Notes in Computer Science] Secu
โœ Sander, Tomas ๐Ÿ“‚ Article ๐Ÿ“… 2002 ๐Ÿ› Springer Berlin Heidelberg ๐ŸŒ German โš– 563 KB

The Acm Workshop On Security And Privacy In Digital Rights Management Is The ?rst Scienti?c Workshop With Refereed Proceedings Devoted Solely To This Topic. The Workshop Was Held In Conjunction With The Eighth Acm Conference On Computer And Communications Security (ccs-8) In Philadelphia, Usa On Nov