expository writing, unintentional obfuscation usually occurs in draft documents, at the beginning of composition; such obfuscation is illuminated with critical... 7 KB (825 words) - 18:12, 18 March 2024 |
development, obfuscation is the act of creating source or machine code that is difficult for humans or computers to understand. Like obfuscation in natural... 15 KB (1,522 words) - 14:24, 27 March 2024 |
hardware obfuscation modifies the design in such a away that the resulting architecture becomes un-obvious to an adversary. Hardware Obfuscation can be... 8 KB (1,115 words) - 18:46, 30 January 2022 |
indistinguishability obfuscation (abbreviated IO or iO) is a type of software obfuscation with the defining property that obfuscating any two programs that... 20 KB (2,086 words) - 20:01, 21 April 2024 |
a circle of obfuscated values where the center reveals the individual's exact location. One should also consider the level of obfuscation required in... 3 KB (381 words) - 09:26, 13 January 2024 |
The Obfuscated Perl Contest was a competition for programmers of Perl which was held annually between 1996 and 2000. Entrants to the competition aimed... 2 KB (253 words) - 18:02, 15 March 2023 |
cryptography, black-box obfuscation was a proposed cryptographic primitive which would allow a computer program to be obfuscated in a way such that it was... 7 KB (979 words) - 15:10, 24 November 2022 |
BitTorrent protocol encryption (redirect from Protocol obfuscation) Vuze. PHE was implemented in old versions of BitComet. Similar protocol obfuscation is supported in up-to-date versions of some other (non-BitTorrent) systems... 18 KB (1,722 words) - 20:14, 23 April 2024 |
Adversarial stylometry (redirect from Authorship obfuscation) imitation typically succeeds at masking more characteristics than obfuscation. Automated obfuscation may require large amounts of training data written by the... 32 KB (3,782 words) - 07:34, 20 April 2024 |
Security through obscurity (redirect from Security by obfuscation) to know Obfuscation (software) Presumed security Secure by design AACS encryption key controversy Zero-day (computing) Code talker Obfuscation Zwicky,... 14 KB (1,399 words) - 04:49, 5 April 2024 |