|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
DC, SS |
2016-10-28 10:20 |
Shiga |
Hikone Kinro-Fukushi Kaikan Bldg. |
Software Reuse Detection Focusing on Text in Binary Code Satoshi Watanabe, Akito Monden (Okayama U.), Haruaki Tamada (Kyoto Sangyo U.), Yuichiro Kanzaki (NIT, Kumamoto College) SS2016-31 DC2016-33 |
[more] |
SS2016-31 DC2016-33 pp.79-84 |
SS |
2005-12-19 15:15 |
Kochi |
Kochi Women's University |
Obfuscating Cipher Programs against Primary Attacking Tasks Hiroki Yamauchi, Yuichiro Kanzaki, Akito Monden, Masahide Nakamura, Ken-ichi Matsumoto (NAIST) |
In this paper, we propose a cracker-centric approach to give a realistic guideline for applying software obfuscation met... [more] |
SS2005-59 pp.25-30 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|