Login / Signup
When Does Functional Encryption Imply Obfuscation?
Sanjam Garg
Mohammad Mahmoody
Ameer Mohammed
Published in:
TCC (1) (2017)
Keyphrases
</>
reverse engineering
data sets
information systems
digital signature
functional analysis
database
neural network
artificial intelligence
wireless sensor networks
third party
static analysis
control flow
encryption algorithms
multimedia streaming