Stephen Drape : Publications
-
[1]
Intellectual Property Protection using Obfuscation
Stephen Drape
No. RR−10−02. March, 2010.
Details about Intellectual Property Protection using Obfuscation | BibTeX data for Intellectual Property Protection using Obfuscation | Download (pdf) of Intellectual Property Protection using Obfuscation
-
[2]
Creating transformations for matrix obfuscation
Stephen Drape and Irina Voiculescu
In Proceedings of SAS 2009. August, 2009.
Details about Creating transformations for matrix obfuscation | BibTeX data for Creating transformations for matrix obfuscation | Download (pdf) of Creating transformations for matrix obfuscation | DOI (10.1007/978-3-642-03237-0_19)
-
[3]
The Use of Matrices in Obfuscation
Stephen Drape and Irina Voiculescu
No. RR−08−12. Oxford University Computing Laboratory. December, 2008.
Details about The Use of Matrices in Obfuscation | BibTeX data for The Use of Matrices in Obfuscation | Download (pdf) of The Use of Matrices in Obfuscation
-
[4]
Metrics−based Evaluation of Slicing Obfuscations
Anirban Majumdar‚ Stephen Drape and Clark Thomborson
In Proceeding of the Third International Symposium on Information Assurance and Security. Pages 472–477. IEEE Computer Society. August, 2007.
Details about Metrics−based Evaluation of Slicing Obfuscations | BibTeX data for Metrics−based Evaluation of Slicing Obfuscations | DOI (10.1109/IAS.2007.50)
-
[5]
The Suitability of Different Binary Tree Obfuscations
Stephen Drape
No. 310. CDMTCS‚ The University of Auckland. Auckland‚ New Zealand. June, 2007.
Details about The Suitability of Different Binary Tree Obfuscations | BibTeX data for The Suitability of Different Binary Tree Obfuscations | Download (pdf) of The Suitability of Different Binary Tree Obfuscations
-
[6]
Design and Evaluation of Slicing Obfuscations
Stephen Drape and Anirban Majumdar
No. 311. CDMTCS‚ The University of Auckland. Auckland‚ New Zealand. June, 2007.
Details about Design and Evaluation of Slicing Obfuscations | BibTeX data for Design and Evaluation of Slicing Obfuscations | Download (pdf) of Design and Evaluation of Slicing Obfuscations
-
[7]
Generalising the Array Split Obfuscation
Stephen Drape
In Information Sciences. Vol. 177. No. 1. Pages 202–219. January, 2007.
Details about Generalising the Array Split Obfuscation | BibTeX data for Generalising the Array Split Obfuscation | DOI (10.1016/j.ins.2006.03.012)
-
[8]
Slicing Obfuscations: Design‚ Correctness and Evaluation
Anirban Majumdar‚ Stephen Drape and Clark Thomborson
In DRM '07: Proceedings of the 2007 ACM workshop on Digital Rights Management. Pages 70–81. ACM Press. 2007.
Details about Slicing Obfuscations: Design‚ Correctness and Evaluation | BibTeX data for Slicing Obfuscations: Design‚ Correctness and Evaluation | DOI (/10.1145/1314276.1314290)
-
[9]
Specifying Imperative Data Obfuscations
Stephen Drape‚ Clark Thomborson and Anirban Majumdar
In Proceeding of the 10th Information Security Conference (ISC 07). Vol. 4779 of Lecture Notes in Computer Science. Pages 299–314. Springer. 2007.
Details about Specifying Imperative Data Obfuscations | BibTeX data for Specifying Imperative Data Obfuscations | DOI (10.1007/978-3-540-75496-1_20)
-
[10]
Slicing Aided Design of Obfuscating Transforms
Stephen Drape‚ Anirban Majumdar and Clark Thomborson
In Proceedings of the 6th International Computing and Information Systems Conference (ICIS 2007). Pages 1019–1024. Melbourne‚ Australia. 2007. IEEE Computer Society.
Details about Slicing Aided Design of Obfuscating Transforms | BibTeX data for Slicing Aided Design of Obfuscating Transforms | DOI (10.1109/ICIS.2007.167)
-
[11]
A Survey of Control−Flow Obfuscations.
Anirban Majumdar‚ Clark D. Thomborson and Stephen Drape
In Information Systems Security‚ Second International Conference‚ ICISS 2006‚ Kolkata‚ India. Pages 353−356. December, 2006.
Details about A Survey of Control−Flow Obfuscations. | BibTeX data for A Survey of Control−Flow Obfuscations. | DOI (10.1007/11961635_26)
-
[12]
An Obfuscation for Binary Trees
Stephen Drape
In TENCON 2006: 2006 IEEE Region 10 Conference. November, 2006.
Details about An Obfuscation for Binary Trees | BibTeX data for An Obfuscation for Binary Trees | DOI (10.1109/TENCON.2006.343985)
-
[13]
Using Haskell to Model Tree Obfuscations
Stephen Drape
No. RR−04−17. Oxford University Computing Laboratory. July, 2004.
Details about Using Haskell to Model Tree Obfuscations | BibTeX data for Using Haskell to Model Tree Obfuscations | Download (ps) of Using Haskell to Model Tree Obfuscations
-
[14]
The Matrix Obfuscated
Stephen Drape
No. RR−04−12. Oxford University Computing Laboratory. June, 2004.
Details about The Matrix Obfuscated | BibTeX data for The Matrix Obfuscated | Download (ps) of The Matrix Obfuscated
-
[15]
Obfuscating Set Representations
Stephen Drape
No. RR−04−09. Oxford University Computing Laboratory. May, 2004.
Details about Obfuscating Set Representations | BibTeX data for Obfuscating Set Representations | Download (ps) of Obfuscating Set Representations
-
[16]
Obfuscation of Abstract Data−Types
Stephen Drape
PhD Thesis , type= DPhil Thesis. Oxford University Computing Laboratory. 2004.
Details about Obfuscation of Abstract Data−Types | BibTeX data for Obfuscation of Abstract Data−Types | Download (pdf) of Obfuscation of Abstract Data−Types
-
[17]
Problem Pages 11−16
Barbara Cullingworth and Steve Drape
The Mathematical Association. 2003.
Details about Problem Pages 11−16 | BibTeX data for Problem Pages 11−16
-
[18]
Problem Pages 14−19
Charlie Stripp and Steve Drape
The Mathematical Association. 2002.
Details about Problem Pages 14−19 | BibTeX data for Problem Pages 14−19
-
[19]
Transforming the .NET Intermediate Language Using Path Logic Programming
Stephen Drape‚ Oege de Moor and Ganesh Sittampalam
In Principles and Practice of Declarative Programming. Pages 133–144. ACM Press. 2002.
Details about Transforming the .NET Intermediate Language Using Path Logic Programming | BibTeX data for Transforming the .NET Intermediate Language Using Path Logic Programming
-
[20]
Functional Cryptography
Stephen Drape
Master's Thesis 2001.
Details about Functional Cryptography | BibTeX data for Functional Cryptography | Download (pdf) of Functional Cryptography