Sign in

Lattice-based obfuscation for re-encryption functions.

Rong ChengFangguo Zhang
Published in: Secur. Commun. Networks (2015)
Keyphrases
  • neural network
  • search engine
  • data transformation
  • real time
  • artificial intelligence
  • intrusion detection
  • basis functions
  • reverse engineering
  • static analysis
  • information hiding
  • cryptographic protocols