Seller: Brook Bookstore On Demand, Napoli, NA, Italy
£ 41.97
Convert currencyQuantity: Over 20 available
Add to basketCondition: new.
Seller: Ria Christie Collections, Uxbridge, United Kingdom
£ 43.15
Convert currencyQuantity: Over 20 available
Add to basketCondition: New. In.
Seller: PBShop.store UK, Fairford, GLOS, United Kingdom
PAP. Condition: New. New Book. Shipped from UK. Established seller since 2000.
Seller: California Books, Miami, FL, U.S.A.
£ 46.79
Convert currencyQuantity: Over 20 available
Add to basketCondition: New.
Seller: Brook Bookstore On Demand, Napoli, NA, Italy
£ 55.20
Convert currencyQuantity: Over 20 available
Add to basketCondition: new.
Published by Association of Computing Machinery,U.S., New York, 2025
ISBN 13: 9798400713668
Language: English
Seller: CitiRetail, Stevenage, United Kingdom
Paperback. Condition: new. Paperback. Software obfuscation is used in cryptography to transform source code to make it unintelligible without altering what it computes. As a software security mechanism, it is essential that software obfuscation have a firm mathematical foundation. The research described in this book, for which the author won the ACM Dissertation Award, establishes the feasibility of mathematically rigorous software obfuscation from well-studied hardness conjectures. The mathematical object that the author constructs, indistinguishability obfuscation, is considered a theoretical "master tool" in the context of cryptography: not only in helping to achieve long-desired cryptographic goals such as functional encryption, but also in expanding the scope of the field of cryptography itself. For example, indistinguishability obfuscation aids in goals related to software security that were previously entirely in the domain of software engineering. Software obfuscation is used in cryptography to transform source code to make it unintelligible without altering what it computes. The research described in this book, for which the author won the ACM Dissertation Award, establishes the feasibility of mathematically rigorous software obfuscation from well-studied hardness conjectures. Shipping may be from our UK warehouse or from our Australian or US warehouses, depending on stock availability.
Seller: Ria Christie Collections, Uxbridge, United Kingdom
£ 56.80
Convert currencyQuantity: Over 20 available
Add to basketCondition: New. In.
Seller: PBShop.store UK, Fairford, GLOS, United Kingdom
HRD. Condition: New. New Book. Shipped from UK. Established seller since 2000.
Published by Association of Computing Machinery,U.S., US, 2025
ISBN 13: 9798400713668
Language: English
Seller: Rarewaves.com UK, London, United Kingdom
£ 58.14
Convert currencyQuantity: Over 20 available
Add to basketPaperback. Condition: New. Software obfuscation is used in cryptography to transform source code to make it unintelligible without altering what it computes. As a software security mechanism, it is essential that software obfuscation have a firm mathematical foundation. The research described in this book, for which the author won the ACM Dissertation Award, establishes the feasibility of mathematically rigorous software obfuscation from well-studied hardness conjectures. The mathematical object that the author constructs, indistinguishability obfuscation, is considered a theoretical "master tool" in the context of cryptography: not only in helping to achieve long-desired cryptographic goals such as functional encryption, but also in expanding the scope of the field of cryptography itself. For example, indistinguishability obfuscation aids in goals related to software security that were previously entirely in the domain of software engineering.
Seller: California Books, Miami, FL, U.S.A.
£ 62.13
Convert currencyQuantity: Over 20 available
Add to basketCondition: New.
Published by Association of Computing Machinery,U.S., New York, 2025
ISBN 13: 9798400713651
Language: English
Seller: CitiRetail, Stevenage, United Kingdom
Hardcover. Condition: new. Hardcover. Software obfuscation is used in cryptography to transform source code to make it unintelligible without altering what it computes. As a software security mechanism, it is essential that software obfuscation have a firm mathematical foundation. The research described in this book, for which the author won the ACM Dissertation Award, establishes the feasibility of mathematically rigorous software obfuscation from well-studied hardness conjectures. The mathematical object that the author constructs, indistinguishability obfuscation, is considered a theoretical "master tool" in the context of cryptography: not only in helping to achieve long-desired cryptographic goals such as functional encryption, but also in expanding the scope of the field of cryptography itself. For example, indistinguishability obfuscation aids in goals related to software security that were previously entirely in the domain of software engineering. Software obfuscation is used in cryptography to transform source code to make it unintelligible without altering what it computes. The research described in this book, for which the author won the ACM Dissertation Award, establishes the feasibility of mathematically rigorous software obfuscation from well-studied hardness conjectures. Shipping may be from our UK warehouse or from our Australian or US warehouses, depending on stock availability.
Published by Association of Computing Machinery,U.S., New York, 2025
ISBN 13: 9798400713668
Language: English
Seller: Grand Eagle Retail, Mason, OH, U.S.A.
£ 52.02
Convert currencyQuantity: 1 available
Add to basketPaperback. Condition: new. Paperback. Software obfuscation is used in cryptography to transform source code to make it unintelligible without altering what it computes. As a software security mechanism, it is essential that software obfuscation have a firm mathematical foundation. The research described in this book, for which the author won the ACM Dissertation Award, establishes the feasibility of mathematically rigorous software obfuscation from well-studied hardness conjectures. The mathematical object that the author constructs, indistinguishability obfuscation, is considered a theoretical "master tool" in the context of cryptography: not only in helping to achieve long-desired cryptographic goals such as functional encryption, but also in expanding the scope of the field of cryptography itself. For example, indistinguishability obfuscation aids in goals related to software security that were previously entirely in the domain of software engineering. Software obfuscation is used in cryptography to transform source code to make it unintelligible without altering what it computes. The research described in this book, for which the author won the ACM Dissertation Award, establishes the feasibility of mathematically rigorous software obfuscation from well-studied hardness conjectures. Shipping may be from multiple locations in the US or from the UK, depending on stock availability.
Published by Association of Computing Machinery,U.S., US, 2025
ISBN 13: 9798400713668
Language: English
Seller: Rarewaves.com USA, London, LONDO, United Kingdom
£ 67.38
Convert currencyQuantity: Over 20 available
Add to basketPaperback. Condition: New. Software obfuscation is used in cryptography to transform source code to make it unintelligible without altering what it computes. As a software security mechanism, it is essential that software obfuscation have a firm mathematical foundation. The research described in this book, for which the author won the ACM Dissertation Award, establishes the feasibility of mathematically rigorous software obfuscation from well-studied hardness conjectures. The mathematical object that the author constructs, indistinguishability obfuscation, is considered a theoretical "master tool" in the context of cryptography: not only in helping to achieve long-desired cryptographic goals such as functional encryption, but also in expanding the scope of the field of cryptography itself. For example, indistinguishability obfuscation aids in goals related to software security that were previously entirely in the domain of software engineering.
Published by Association of Computing Machinery,U.S., US, 2025
ISBN 13: 9798400713651
Language: English
Seller: Rarewaves.com UK, London, United Kingdom
£ 91.03
Convert currencyQuantity: Over 20 available
Add to basketHardback. Condition: New. Software obfuscation is used in cryptography to transform source code to make it unintelligible without altering what it computes. As a software security mechanism, it is essential that software obfuscation have a firm mathematical foundation. The research described in this book, for which the author won the ACM Dissertation Award, establishes the feasibility of mathematically rigorous software obfuscation from well-studied hardness conjectures. The mathematical object that the author constructs, indistinguishability obfuscation, is considered a theoretical "master tool" in the context of cryptography: not only in helping to achieve long-desired cryptographic goals such as functional encryption, but also in expanding the scope of the field of cryptography itself. For example, indistinguishability obfuscation aids in goals related to software security that were previously entirely in the domain of software engineering.
Published by Association of Computing Machinery,U.S., New York, 2025
ISBN 13: 9798400713651
Language: English
Seller: Grand Eagle Retail, Mason, OH, U.S.A.
£ 68.59
Convert currencyQuantity: 1 available
Add to basketHardcover. Condition: new. Hardcover. Software obfuscation is used in cryptography to transform source code to make it unintelligible without altering what it computes. As a software security mechanism, it is essential that software obfuscation have a firm mathematical foundation. The research described in this book, for which the author won the ACM Dissertation Award, establishes the feasibility of mathematically rigorous software obfuscation from well-studied hardness conjectures. The mathematical object that the author constructs, indistinguishability obfuscation, is considered a theoretical "master tool" in the context of cryptography: not only in helping to achieve long-desired cryptographic goals such as functional encryption, but also in expanding the scope of the field of cryptography itself. For example, indistinguishability obfuscation aids in goals related to software security that were previously entirely in the domain of software engineering. Software obfuscation is used in cryptography to transform source code to make it unintelligible without altering what it computes. The research described in this book, for which the author won the ACM Dissertation Award, establishes the feasibility of mathematically rigorous software obfuscation from well-studied hardness conjectures. Shipping may be from multiple locations in the US or from the UK, depending on stock availability.
Published by Association of Computing Machinery,U.S., New York, 2025
ISBN 13: 9798400713668
Language: English
Seller: AussieBookSeller, Truganina, VIC, Australia
£ 85.30
Convert currencyQuantity: 1 available
Add to basketPaperback. Condition: new. Paperback. Software obfuscation is used in cryptography to transform source code to make it unintelligible without altering what it computes. As a software security mechanism, it is essential that software obfuscation have a firm mathematical foundation. The research described in this book, for which the author won the ACM Dissertation Award, establishes the feasibility of mathematically rigorous software obfuscation from well-studied hardness conjectures. The mathematical object that the author constructs, indistinguishability obfuscation, is considered a theoretical "master tool" in the context of cryptography: not only in helping to achieve long-desired cryptographic goals such as functional encryption, but also in expanding the scope of the field of cryptography itself. For example, indistinguishability obfuscation aids in goals related to software security that were previously entirely in the domain of software engineering. Software obfuscation is used in cryptography to transform source code to make it unintelligible without altering what it computes. The research described in this book, for which the author won the ACM Dissertation Award, establishes the feasibility of mathematically rigorous software obfuscation from well-studied hardness conjectures. Shipping may be from our Sydney, NSW warehouse or from our UK or US warehouse, depending on stock availability.
Published by Association of Computing Machinery,U.S., US, 2025
ISBN 13: 9798400713651
Language: English
Seller: Rarewaves.com USA, London, LONDO, United Kingdom
£ 104.84
Convert currencyQuantity: Over 20 available
Add to basketHardback. Condition: New. Software obfuscation is used in cryptography to transform source code to make it unintelligible without altering what it computes. As a software security mechanism, it is essential that software obfuscation have a firm mathematical foundation. The research described in this book, for which the author won the ACM Dissertation Award, establishes the feasibility of mathematically rigorous software obfuscation from well-studied hardness conjectures. The mathematical object that the author constructs, indistinguishability obfuscation, is considered a theoretical "master tool" in the context of cryptography: not only in helping to achieve long-desired cryptographic goals such as functional encryption, but also in expanding the scope of the field of cryptography itself. For example, indistinguishability obfuscation aids in goals related to software security that were previously entirely in the domain of software engineering.
Published by Association of Computing Machinery,U.S., New York, 2025
ISBN 13: 9798400713651
Language: English
Seller: AussieBookSeller, Truganina, VIC, Australia
£ 109.58
Convert currencyQuantity: 1 available
Add to basketHardcover. Condition: new. Hardcover. Software obfuscation is used in cryptography to transform source code to make it unintelligible without altering what it computes. As a software security mechanism, it is essential that software obfuscation have a firm mathematical foundation. The research described in this book, for which the author won the ACM Dissertation Award, establishes the feasibility of mathematically rigorous software obfuscation from well-studied hardness conjectures. The mathematical object that the author constructs, indistinguishability obfuscation, is considered a theoretical "master tool" in the context of cryptography: not only in helping to achieve long-desired cryptographic goals such as functional encryption, but also in expanding the scope of the field of cryptography itself. For example, indistinguishability obfuscation aids in goals related to software security that were previously entirely in the domain of software engineering. Software obfuscation is used in cryptography to transform source code to make it unintelligible without altering what it computes. The research described in this book, for which the author won the ACM Dissertation Award, establishes the feasibility of mathematically rigorous software obfuscation from well-studied hardness conjectures. Shipping may be from our Sydney, NSW warehouse or from our UK or US warehouse, depending on stock availability.
Seller: AHA-BUCH GmbH, Einbeck, Germany
£ 45.64
Convert currencyQuantity: 2 available
Add to basketTaschenbuch. Condition: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - Software obfuscation is used in cryptography to transform source code to make it unintelligible without altering what it computes. The research described in this book, for which the author won the ACM Dissertation Award, establishes the feasibility of mathematically rigorous software obfuscation from well-studied hardness conjectures.
Seller: AHA-BUCH GmbH, Einbeck, Germany
£ 61.74
Convert currencyQuantity: 2 available
Add to basketBuch. Condition: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - Software obfuscation is used in cryptography to transform source code to make it unintelligible without altering what it computes. The research described in this book, for which the author won the ACM Dissertation Award, establishes the feasibility of mathematically rigorous software obfuscation from well-studied hardness conjectures.