Search Results - (( variable extractions encryption algorithm ) OR ( java application reoptimize algorithm ))
Search alternatives:
- application reoptimize »
- java application »
- variable »
- extractions »
-
1
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique contains three approaches; first approach is string encryption. The string encryption is about adding a mathematical equation with arrays and loops to the strings in the code to hide the meaning. …”
Get full text
Get full text
Thesis
