نتایج جستجو برای: obfuscation and vagueness

تعداد نتایج: 16827488  

2011
Isabella Poggi Laura Vincze

This paper investigates the bodily signals of vagueness. After presenting the conceptual notion of vagueness by contrasting with uncertainty, approximation, confusion and ambiguity, the notion of “metadiscursive vagueness signal” is presented, a case of metadiscursive signals that convey “I am being vague”. Then a qualitative analysis of bodily signals of vagueness is presented, while singling ...

Journal: :Journal of Philosophical Logic 2011

2008
Christopher Kennedy

Vagueness and comparison are linked in different ways. Vague predicates typically support comparison; several influential semantic analyses of comparative constructions are based on prior accounts of vagueness; and a notion of comparison or similarity plays an important role in many accounts of vagueness. However, the subtlety and significance of the places where vagueness and comparison do not...

1999
VILÉM NOVÁK IRINA PERFILIEVA

2 Vagueness, Uncertainty and Fuzzy Logic 2 2.1 Vagueness and Uncertainty . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 2.2 Vagueness and Fuzzy Sets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 2.3 What Is Fuzzy Logic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 2.4 Agenda of Fuzzy Logic . . . . . . . . . . . . . . . . . . . . . . . . . . . ....

2006
Hiroki Yamauchi Yuichiro Kanzaki Akito Monden

Various kinds of software obfuscation methods have been proposed to protect security-sensitive information involved in software implementations. This paper proposes a cracker-centric approach to give a guideline for employing existing obfuscation methods to disrupt crackers’ actions.

Journal: :Journal of Hardware and Systems Security 2018

2016
Mohammad Mahmoody Ameer Mohammed Soheil Nematihaji

The celebrated work of Barak et al. (Crypto’01) ruled out the possibility of virtual blackbox (VBB) obfuscation for general circuits. The recent work of Canetti, Kalai, and Paneth (TCC’15) extended this impossibility to the random oracle model as well assuming the existence of trapdoor permutations (TDPs). On the other hand, the works of Barak et al. (Crypto’14) and Brakerski-Rothblum (TCC’14) ...

2017
Kartik Nayak Christopher W. Fletcher Ling Ren Nishanth Chandran Satyanarayana V. Lokam Elaine Shi Vipul Goyal

Program obfuscation is a central primitive in cryptography, and has important real-world applications in protecting software from IP theft. However, well known results from the cryptographic literature have shown that software only virtual black box (VBB) obfuscation of general programs is impossible. In this paper we propose HOP, a system (with matching theoretic analysis) that achieves simula...

2015
Ashish Anand

Code obfuscation is a set of program transformations that make program code and program execution difficult to analyze. First of all, obfuscation hinders manual inspection of program internals. By renaming variables and functions, and breaking down structures, it protects against reverse-engineering. It protects both storage and usage of keys, and it can hide certain properties such as a softwa...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید