Top Message
Top Message
Back to Home Page  |  Settings   |  Sign In
Web Education
Viewing 1-2 of 2 total results
 Issues in WiFi Networks - 123seminarsonly.com
Journal of Mobile, Embedded and Distributed Systems, vol. I, no. 1, 2009 ISSN 2067 – 4074 Key Page 7 If the device sends a encrypted packet over WiFi using WEP in IEEE 802.11 secure architecture then the user insert a symmetric encryption key (the same as the one from
Detection of Obfuscation in Java Malware - ScienceDirect
Watermarking, tamper-proofing, and obfuscation - tools for software protection, In IEEE Transactions on Software Engineering, volume 28, pages 735–746, August 2002. 13. Florin BUZATU, “Methods for obfuscating Java programs†, Journal of Mobile, Embedded and Distributed Systems, vol. IV, no. 1, 2012 14.