Abstract: This paper describes a new obfuscation method with two techniques by which both computational complexity can be controlled and semantic obfuscation can be achieved. The computational ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results