Výsledky vyhľadávania - acm: d.: software/d.2: software engineering/d.2.0: general/d.2.0.0: protection technicka

Upresniť hľadanie
  1. 1
  2. 2
  3. 3

    Zdroj: Siefers, Joseph, Gang Tan, and Greg Morissett. 2010. Robusta: Taming the native beast of the JVM. In proceedings of the 17th ACM Conference on Computer and Communications Security (CCS '10), October 4-8, 2010, Chicago, IL, 201-211. New York: Association for Computing Machinery.

    Popis súboru: application/pdf

    Relation: Proceedings of the ACM Conference on Computer and Communications Security (CCS)

  4. 4
  5. 5
  6. 6
  7. 7
  8. 8

    Zdroj: Barak, Boaz, Oded Goldreich, Russell Impagliazzo, Steven Rudich, Amit Sahai, Salil Vadhan, and Ke Yang. 2012. On the (Im)possibility of Obfuscating Programs. Journal of the ACM 59, no. 2: 1–48.

    Popis súboru: application/pdf

    Relation: Journal of the ACM

  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20