Kenshi Furukawa

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
Information leak has been increasing, which imposes a great burden on IT business. Software protection and trusted computing are promising technologies to cope with malicious or illegal access to mission-critical servers. Code obfuscation and encryption are important techniques for software protection. In this paper, we present an obfuscated decipher(More)
  • 1