共 50 条
- [21] Security Analysis of Logic Obfuscation 2012 49TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2012, : 83 - 89
- [22] Assessing the Usability of End-User Security Software TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, 2010, 6264 : 177 - 189
- [23] Assessing Security Risks of Software Supply Chains Using Software Bill of Materials 2024 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ANALYSIS, EVOLUTION AND REENGINEERING-COMPANION, SANER-C 2024, 2024, : 134 - 140
- [24] Properties for Security Measures of Software Products APPLIED MATHEMATICS & INFORMATION SCIENCES, 2007, 1 (02): : 129 - 156
- [25] Indistinguishability Obfuscation from Circular Security STOC '21: PROCEEDINGS OF THE 53RD ANNUAL ACM SIGACT SYMPOSIUM ON THEORY OF COMPUTING, 2021, : 736 - 749
- [26] Applications of homomorphic functions to software obfuscation INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 3917 : 152 - 153
- [28] Algorithmic Information Theory for Obfuscation Security 2015 12TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS (ICETE), VOL 4, 2015, : 76 - 87
- [29] A Dynamic Obfuscation Framework for Security and Utility 2022 13TH ACM/IEEE INTERNATIONAL CONFERENCE ON CYBER-PHYSICAL SYSTEMS (ICCPS 2022), 2022, : 236 - 246