Search Results

There are 12463 results for: content related to: Obfuscation for object-oriented programs: dismantling instance methods

  1. A search cost model of obfuscation

    The RAND Journal of Economics

    Volume 43, Issue 3, Fall 2012, Pages: 417–441, Glenn Ellison and Alexander Wolitzky

    Version of Record online : 16 OCT 2012, DOI: 10.1111/j.1756-2171.2012.00180.x

  2. How does code obfuscation impact energy usage?

    Journal of Software: Evolution and Process

    Volume 28, Issue 7, July 2016, Pages: 565–588, Cagri Sahin, Mian Wan, Philip Tornquist, Ryan McKenna, Zachary Pearson, William G. J. Halfond and James Clause

    Version of Record online : 6 JAN 2016, DOI: 10.1002/smr.1762

  3. Strategic Obfuscation and Consumer Protection Policy

    The Journal of Industrial Economics

    Volume 62, Issue 4, December 2014, Pages: 632–660, Yiquan Gu and Tobias Wenzel

    Version of Record online : 22 DEC 2014, DOI: 10.1111/joie.12060

  4. Designs, analyses, and optimizations for attribute-shuffling obfuscation to protect information from malicious cloud administrators

    Security and Communication Networks

    Volume 8, Issue 17, 25 November 2015, Pages: 3045–3066, Hiroshi Fujinoki

    Version of Record online : 25 MAR 2015, DOI: 10.1002/sec.1231

  5. Strategic obfuscation of production capacities

    Naval Research Logistics (NRL)

    Volume 61, Issue 3, April 2014, Pages: 244–267, Elizabeth J. Durango-Cohen and Liad Wagman

    Version of Record online : 2 APR 2014, DOI: 10.1002/nav.21581

  6. Consumer confusion, obfuscation and price regulation

    Scottish Journal of Political Economy

    Volume 64, Issue 2, May 2017, Pages: 169–190, Yiquan Gu and Tobias Wenzel

    Version of Record online : 10 OCT 2016, DOI: 10.1111/sjpe.12121

  7. Linguistic Complexity in Firm Disclosures: Obfuscation or Information?

    Journal of Accounting Research

    BRIAN J. BUSHEE, IAN D. GOW and DANIEL J. TAYLOR

    Version of Record online : 23 AUG 2017, DOI: 10.1111/1475-679X.12179

  8. JSOD: JavaScript obfuscation detector

    Security and Communication Networks

    Volume 8, Issue 6, April 2015, Pages: 1092–1107, Ismail Adel AL-Taharwa, Hahn-Ming Lee, Albert B. Jeng, Kuo-Ping Wu, Cheng-Seen Ho and Shyi-Ming Chen

    Version of Record online : 1 JUL 2014, DOI: 10.1002/sec.1064

  9. Obtaining K-obfuscation for profile privacy in social networks

    Security and Communication Networks

    Volume 7, Issue 9, September 2014, Pages: 1384–1398, Xiangyu Liu, Bin Wang, Xiaochun Yang, Meng Yu and Wanyu Zang

    Version of Record online : 17 JAN 2014, DOI: 10.1002/sec.871

  10. Strongly average-case secure obfuscation: achieving input privacy and circuit obscurity

    Security and Communication Networks

    Volume 9, Issue 12, August 2016, Pages: 1737–1747, Mingwu Zhang, Yi Mu, Jian Shen and Xinyi Huang

    Version of Record online : 10 FEB 2016, DOI: 10.1002/sec.1435

  11. Lattice-based obfuscation for re-encryption functions

    Security and Communication Networks

    Volume 8, Issue 9, June 2015, Pages: 1648–1658, Rong Cheng and Fangguo Zhang

    Version of Record online : 19 OCT 2014, DOI: 10.1002/sec.1112

  12. Server-based code obfuscation scheme for APK tamper detection

    Security and Communication Networks

    Volume 9, Issue 6, April 2016, Pages: 457–467, Yuxue Piao, Jin-Hyuk Jung and Jeong Hyun Yi

    Version of Record online : 10 MAR 2014, DOI: 10.1002/sec.936

  13. Obfuscation for multi-use re-encryption and its application in cloud computing

    Concurrency and Computation: Practice and Experience

    Volume 27, Issue 8, 10 June 2015, Pages: 2170–2190, Rong Cheng and Fangguo Zhang

    Version of Record online : 1 OCT 2014, DOI: 10.1002/cpe.3399

  14. A trust-based noise injection strategy for privacy protection in cloud

    Software: Practice and Experience

    Volume 42, Issue 4, April 2012, Pages: 431–445, Gaofeng Zhang, Yun Yang, Dong Yuan and Jinjun Chen

    Version of Record online : 21 AUG 2011, DOI: 10.1002/spe.1052

  15. Evaluating intrusion prevention systems with evasions

    International Journal of Communication Systems

    Mikko Särelä, Tomi Kyöstilä, Timo Kiravuo and Jukka Manner

    Version of Record online : 22 JUN 2017, DOI: 10.1002/dac.3339

  16. Metamorphic malware detection using base malware identification approach

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 1719–1733, Devendra Kumar Mahawer and A. Nagaraju

    Version of Record online : 6 NOV 2013, DOI: 10.1002/sec.869

  17. Holography: a behavior-based profiler for malware analysis

    Software: Practice and Experience

    Volume 42, Issue 9, September 2012, Pages: 1107–1136, Shih-Yao Dai, Yarochkin Fyodor, Ming-Wei Wu, Yennun Huang and Sy-Yen Kuo

    Version of Record online : 13 OCT 2011, DOI: 10.1002/spe.1115

  18. Strategic Re-framing as a Vote Winner: Why Vote-seeking Governments Pursue Unpopular Reforms

    Scandinavian Political Studies

    Volume 36, Issue 1, March 2013, Pages: 23–42, Christian Elmelund-Præstekær and Patrick Emmenegger

    Version of Record online : 3 OCT 2012, DOI: 10.1111/j.1467-9477.2012.00295.x

  19. Overconfidence in the Markets for Lemons

    The Scandinavian Journal of Economics

    Volume 118, Issue 2, April 2016, Pages: 354–371, Fabian Herweg and Daniel Müller

    Version of Record online : 19 OCT 2015, DOI: 10.1111/sjoe.12135

  20. Source—destination obfuscation in wireless ad hocnetworks

    Security and Communication Networks

    Volume 4, Issue 8, August 2011, Pages: 888–901, Thaier Hayajneh, Razvi Doomun, Prashant Krishnamurthy and David Tipper

    Version of Record online : 15 JUL 2010, DOI: 10.1002/sec.220