[Lecture Notes in Computer Science] Information Security Volume 2200 || An Approach to the Obfuscation of Control-Flow of Sequential Computer Programs
โ Scribed by Davida, George I.; Frankel, Yair
- Book ID
- 120180915
- Publisher
- Springer Berlin Heidelberg
- Year
- 2001
- Weight
- 187 KB
- Category
- Article
- ISBN
- 354045439X
No coin nor oath required. For personal study only.
๐ SIMILAR VOLUMES
This book constitutes the refereed proceedings of the 31st International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2012, held in Magdeburg, Germany, in September 2012. The 33 revised full papers presented were carefully reviewed and selected from more than 70 submissions. Th
This Book Constitutes The Proceedings Of The International Conference On Trusted Systems, Held In Beijing, China, In December 2010.the 23 Contributed Papers Presented Together With Nine Invited Talks From A Workshop, Titled Asian Lounge On Trust, Security And Privacy Were Carefully Selected From 66
The five volume set LNCS 7663, LNCS 7664, LNCS 7665, LNCS 7666 and LNCS 7667 constitutes the proceedings of the 19th International Conference on Neural Information Processing, ICONIP 2012, held in Doha, Qatar, in November 2012. The 423 regular session papers presented were carefully reviewed and sel