Login / Signup
Secure and advanced unpacking using computer emulation.
Sébastien Josse
Published in:
J. Comput. Virol. (2007)
Keyphrases
</>
authentication scheme
user authentication
security analysis
real time
computer systems
key management
databases
real world
e learning
computer architecture
computer programming