"Two Control Computation Transformation Methods for Obfuscating Java Soft ..."

Hsiang-Yang Chen, Ting-Wei Hou (2005)

Details and statistics

DOI:

access: unavailable

type: Conference or Workshop Paper

metadata version: 2005-10-27

a service of  Schloss Dagstuhl - Leibniz Center for Informatics