Showing 21 - 40 results of 222 for search '"obfuscation"', query time: 0.05s Refine Results
  1. 21
  2. 22

    Indistinguishability Obfuscation from Functional Encryption by Bitansky, Nir, Vaikuntanathan, Vinod

    Published 2021
    “…Indistinguishability obfuscation (IO) is a tremendous notion, powerful enough to give rise to almost any known cryptographic object. …”
    Get full text
    Article
  3. 23
  4. 24

    Obfuscation, Learning, and the Evolution of Investor Sophistication by Carlin, Bruce Ian, Manso, Gustavo

    Published 2011
    “…Obfuscation decreases with competition among firms, since the information rents from obfuscation dissipate as each institution attracts a smaller market share.…”
    Get full text
    Article
  5. 25

    A Search Cost Model of Obfuscation by Ellison, Glenn, Wolitzky, Alexander Greenberg

    Published 2012
    “…Here, a signal-jamming mechanism can also lead to equilibrium obfuscation.…”
    Get full text
    Get full text
    Article
  6. 26

    Obfuscation techniques for Java source code by Nguyen, Dinh Phuc

    Published 2015
    “…Some of them can be listed out such as watermarking, embedding decryption keys in hardware, tamper-proofing, fingerprint code, virtual machine… Obfuscation is a very cheap and can be conducted at multiple levels of complexity and in multiple stages of a program. …”
    Get full text
    Get full text
    Student Research Paper
  7. 27
  8. 28

    The qualities of leadership: direction, communication, and obfuscation by Myatt, D, Dewan, T

    Published 2007
    “…Sometimes leaders attract more attention by obfuscating their messages. A concern for party unity mitigates this incentive; when activists emphasize following the party line, they learn more about their environment.…”
    Working paper
  9. 29

    The Qualities of Leadership: Direction, Communication, and Obfuscation. by Dewan, T, Myatt, D

    Published 2008
    “…However, power-hungry leaders who need an audience sometimes obfuscate their messages, but less so when their followers place more emphasis on conformity than on doing the right thing.…”
    Journal article
  10. 30

    Intellectual Property Protection using Obfuscation by Drape, S

    Published 2010
    “…In this technical report, we discuss the use of code obfuscation as means of protecting the intellectual property of software. …”
    Report
  11. 31

    The Qualities of Leadership: Direction, Communication, and Obfuscation by Dewan, T, Myatt, D

    Published 2007
    “…Sometimes leaders attract more attention by obfuscating their messages. A concern for party unity mitigates this incentive; when activists emphasize following the party line, they learn more about their environment.…”
    Working paper
  12. 32
  13. 33
  14. 34
  15. 35
  16. 36
  17. 37
  18. 38
  19. 39

    Obfuscating Conjunctions under Entropic Ring LWE by Brakerski, Zvika, Vaikuntanathan, Vinod, Wee, Hoeteck, Wichs, Daniel

    Published 2017
    “…We view this as a first step towards proving the security of additional multilinear map based constructions, and in particular program obfuscators, under standard assumptions. Our scheme satisfies virtual black box (VBB) security, meaning that the obfuscated program reveals nothing more than black-box access to f as an oracle, at least as long as (essentially) the conjunction is chosen from a distribution having sufficient entropy.…”
    Get full text
    Get full text
    Article
  20. 40