expository writing, unintentional obfuscation usually occurs in draft documents, at the beginning of composition; such obfuscation is illuminated with critical... 7 KB (825 words) - 18:12, 18 March 2024 |
development, obfuscation is the act of creating source or machine code that is difficult for humans or computers to understand. Like obfuscation in natural... 15 KB (1,522 words) - 14:24, 27 March 2024 |
This type of obfuscation is also called 'Structural Obfuscation'. Another type of DSP Core Obfuscation method is called 'Functional Obfuscation' - It uses... 8 KB (1,115 words) - 18:46, 30 January 2022 |
indistinguishability obfuscation (abbreviated IO or iO) is a type of software obfuscation with the defining property that obfuscating any two programs that... 20 KB (2,086 words) - 20:01, 21 April 2024 |
The Obfuscated Perl Contest was a competition for programmers of Perl which was held annually between 1996 and 2000. Entrants to the competition aimed... 2 KB (253 words) - 18:02, 15 March 2023 |
cryptography, black-box obfuscation was a proposed cryptographic primitive which would allow a computer program to be obfuscated in a way such that it was... 7 KB (979 words) - 15:10, 24 November 2022 |
BitTorrent protocol encryption (redirect from Protocol obfuscation) Vuze. PHE was implemented in old versions of BitComet. Similar protocol obfuscation is supported in up-to-date versions of some other (non-BitTorrent) systems... 18 KB (1,722 words) - 20:14, 23 April 2024 |
Security through obscurity (redirect from Security by obfuscation) to know Obfuscation (software) Presumed security Secure by design AACS encryption key controversy Zero-day (computing) Code talker Obfuscation Zwicky,... 14 KB (1,399 words) - 04:49, 5 April 2024 |
Adversarial stylometry (redirect from Authorship obfuscation) imitation typically succeeds at masking more characteristics than obfuscation. Automated obfuscation may require large amounts of training data written by the... 32 KB (3,782 words) - 07:34, 20 April 2024 |
Address munging (redirect from Email address obfuscation) Content delivery network vendors, such as Cloudflare, offer email address obfuscation services to their clients. "Transparent name mangling" involves replacing... 9 KB (1,005 words) - 19:40, 14 December 2023 |