نتایج جستجو برای: obfuscation and vagueness

تعداد نتایج: 16827488  

Journal: :The Philosophical Quarterly 2012

Journal: :IACR Cryptology ePrint Archive 2015
Mei Wang Zheng Yuan Xiao Feng

We proposed a new secure oblivious transfer protocol from indistinguishability obfuscation in this paper. Our main technical tool is the candidate indistinguishability obfuscation introduced in [1] and a dual-mode cryptosystem proposed in [2]. Following their steps, we presents a new k-out-of-l oblivious transfer protocol, its realization from DDH is described in this paper, in which we combine...

2005
Matt Duckham Lars Kulik

Current mobile computing systems can automatically sense and communicate detailed data about a person’s location. Location privacy is an urgent research issue because concerns about privacy are seen to be inhibiting the growth of mobile computing. This paper investigates a new technique for safeguarding location privacy, called obfuscation, which protects a person’s location privacy by degradin...

2010
Stephen Drape

In this technical report, we discuss the use of code obfuscation as means of protecting the intellectual property of software. An obfuscation is a behaviour preserving program transformation which aims to make a program harder to understand (which can mean it becomes unintelligible to automated program comprehension tools or that the result of program analyses become less useful to a human adve...

Journal: :Journal of Accounting and Economics 2021

Mutual funds hold 32% of the U.S. equity market and comprise 58% retirement savings, yet retail investors consistently make poor choices when selecting funds. Theory suggests are partially due to fund managers creating unnecessarily complex disclosures fee structures keep uninformed obfuscate performance. An empirical challenge in investigating this “strategic obfuscation” theory is isolating m...

Journal: :JoWUA 2015
Jonghwa Park Hyojung Kim Younsik Jeong Seong-je Cho Sangchul Han Minkyu Park

Code obfuscation is a technique to transform a program into an equivalent one that is harder to be reverse engineered and understood. On Android, well-known obfuscation techniques are shrinking, optimization, renaming, string encryption, control flow transformation, etc. On the other hand, adversaries may also maliciously use obfuscation techniques to hide pirated or stolen software. If pirated...

2005
Suma Venkatesh Levent Ertaul

Over the years, several software protection techniques have been developed to avoid global software piracy, which has increased over 40% and has caused $11 billion loss. Code Obfuscation is one of these techniques and it is very promising one. Code obfuscation is a form of software protection against unauthorized reverse-engineering. In this paper, we give information about available software o...

2010
David Barnett

On two standard views of vagueness, vagueness as to whether Harry is bald entails that nobody knows whether Harry is bald—either because vagueness is a type of missing truth, and so there is nothing to know, or because vagueness is a type of ignorance, and so even though there is a truth of the matter, nobody can know what that truth is. Vagueness as to whether Harry is bald does entail that no...

Journal: :International Mathematical Forum 2007

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید