Sign in

Obfuscation for Evasive Functions.

Boaz BarakNir BitanskyRan CanettiYael Tauman KalaiOmer PanethAmit Sahai
Published in: TCC (2014)
Keyphrases
  • case study
  • computer systems
  • basis functions
  • real time
  • data sets
  • image processing
  • preprocessing
  • reverse engineering