Author:
Xiao Da,Bai Shouying,Wu Qian,Cui Baojiang
Publisher
Springer International Publishing
Reference15 articles.
1. Yuan, Z., Wen, Q., Mao, M.: Constructing opaque predicates for java programs. In: 2006 International Conference on Computational Intelligence and Security, pp. 895–898 (2006)
2. Schulz, P.: Code Protection in Android. Insititute of Computer Science, Rheinische Friedrich-Wilhelms-Universitgt Bonn, Germany, vol. 110 (2012)
3. Liem, C., Gu, Y.X., Johnson, H.A.: Compiler-based infrastructure for software-protection. In: The Workshop on Programming Languages & Analysis for Security, pp. 33–44 (2008)
4. Shan, L., Emmanuel, S.: Mobile agent protection with self-modifying code. J. Signal Process. Syst. 65(01), 105–116 (2011)
5. Garg, S., Gentry, C., Halevi, S., et al.: Candidate indistinguishability obfuscation and functional encryption for all circuits. In: Foundations of Computer Science Annual Symposium, vol. 311, no. 02, pp. 40–49 (2013)