Login / Signup

Secure and advanced unpacking using computer emulation.

Sébastien Josse
Published in: J. Comput. Virol. (2007)
Keyphrases
  • authentication scheme
  • user authentication
  • security analysis
  • real time
  • computer systems
  • key management
  • databases
  • real world
  • e learning
  • computer architecture
  • computer programming