Login / Signup
Using Indistinguishability Obfuscation via UCEs.
Christina Brzuska
Arno Mittelbach
Published in:
IACR Cryptol. ePrint Arch. (2014)
Keyphrases
</>
reverse engineering
database views
control flow
encryption scheme
static analysis
data transformation
malware detection
data sets
equivalence relation
source code
expert systems
data structure
case study
knowledge base
decision making
artificial intelligence
learning algorithm
databases