Login / Signup

System-Level Methods to Prevent Reverse-Engineering, Cloning, and Trojan Insertion.

Sylvain GuilleyJean-Luc DangerRobert NguyenPhilippe Nguyen
Published in: ICISTM (2012)
Keyphrases
  • reverse engineering
  • databases
  • significant improvement
  • database
  • software maintenance