Login / Signup
Using Indistinguishability Obfuscation via UCEs.
Christina Brzuska
Arno Mittelbach
Published in:
ASIACRYPT (2) (2014)
Keyphrases
</>
reverse engineering
database views
static analysis
encryption scheme
control flow
malware detection
t norm
evolutionary algorithm
process model
data transformation
data flow
data mining
artificial neural networks
video sequences
multi agent
bayesian networks
database systems
case study
learning algorithm