نتایج جستجو برای: obfuscation and vagueness
تعداد نتایج: 16827488 فیلتر نتایج به سال:
This paper investigates the bodily signals of vagueness. After presenting the conceptual notion of vagueness by contrasting with uncertainty, approximation, confusion and ambiguity, the notion of “metadiscursive vagueness signal” is presented, a case of metadiscursive signals that convey “I am being vague”. Then a qualitative analysis of bodily signals of vagueness is presented, while singling ...
Vagueness and comparison are linked in different ways. Vague predicates typically support comparison; several influential semantic analyses of comparative constructions are based on prior accounts of vagueness; and a notion of comparison or similarity plays an important role in many accounts of vagueness. However, the subtlety and significance of the places where vagueness and comparison do not...
2 Vagueness, Uncertainty and Fuzzy Logic 2 2.1 Vagueness and Uncertainty . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 2.2 Vagueness and Fuzzy Sets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 2.3 What Is Fuzzy Logic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 2.4 Agenda of Fuzzy Logic . . . . . . . . . . . . . . . . . . . . . . . . . . . ....
Various kinds of software obfuscation methods have been proposed to protect security-sensitive information involved in software implementations. This paper proposes a cracker-centric approach to give a guideline for employing existing obfuscation methods to disrupt crackers’ actions.
The celebrated work of Barak et al. (Crypto’01) ruled out the possibility of virtual blackbox (VBB) obfuscation for general circuits. The recent work of Canetti, Kalai, and Paneth (TCC’15) extended this impossibility to the random oracle model as well assuming the existence of trapdoor permutations (TDPs). On the other hand, the works of Barak et al. (Crypto’14) and Brakerski-Rothblum (TCC’14) ...
Program obfuscation is a central primitive in cryptography, and has important real-world applications in protecting software from IP theft. However, well known results from the cryptographic literature have shown that software only virtual black box (VBB) obfuscation of general programs is impossible. In this paper we propose HOP, a system (with matching theoretic analysis) that achieves simula...
Code obfuscation is a set of program transformations that make program code and program execution difficult to analyze. First of all, obfuscation hinders manual inspection of program internals. By renaming variables and functions, and breaking down structures, it protects against reverse-engineering. It protects both storage and usage of keys, and it can hide certain properties such as a softwa...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید