Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,052,316 papers from all fields of science
Search
Sign In
Create Free Account
Security through obscurity
Known as:
Security by obscurity
, Security through obfuscation
, Security through obsurity
Expand
In security engineering, security through obscurity (or security by obscurity) is the reliance on the secrecy of the design or implementation as the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
41 relations
AACS encryption key controversy
Code talker
Cryptosystem
DREAD (risk assessment model)
Expand
Broader (1)
Cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Researchers probe security through obscurity
C. Edwards
CACM
2014
Corpus ID: 12674514
Obfuscation protects code by making it so impenetrable that access to it won't help a hacker understand how it works.
Review
2009
Review
2009
The YOHKOH survey of partially occulted flares in hard X-rays
M. Tomczak
2009
Corpus ID: 17638449
Context. Modern solar X-ray imagers do not completely resolve the problem of deriving detailed diagnostics of faint hard X-ray…
Expand
2008
2008
Oscar Wilde and Modern Culture
J. Bristow
2008
Corpus ID: 190539964
Oscar Wilde and Modern Culture: The Making of a Legend explores the meteoric rise, sudden fall, and legendary resurgence of an…
Expand
2007
2007
Implications of Action Theories to Lean Construction Applications
B. Senior
2007
Corpus ID: 8896630
Two models of Action Theory offer fundamentally different views of the merits and appropriate use of plans. While the…
Expand
Highly Cited
2005
Highly Cited
2005
Network applications of cascaded passive code translation for WDM-compatible spectrally phase-encoded optical CDMA
Ronald C. Menendez
,
P. Toliver
,
+5 authors
S. Etemad
Journal of Lightwave Technology
2005
Corpus ID: 15308922
Recently, there has been a renewed interest in optical code-division multiple access (OCDMA) due to its potential for offering…
Expand
2001
2001
The Dear Self
H. Frankfurt
2001
Corpus ID: 142061255
Harry Frankfurt 1. At the beginning of the Second Section of his treatise entitled Foundations of the Metaphysics of Morals…
Expand
2000
2000
Conquest of the four quarters: Traditional accounts of the life of Śaṅkara
J. Bader
2000
Corpus ID: 38513903
Some seven hundred years after Sankara wrote the learned commentaries that established his reputation as one of the foremost…
Expand
Highly Cited
1987
Highly Cited
1987
Byzantium's Role in the Formation of Early Medieval Civilization: Approaches and Problems
M. McCormick
1987
Corpus ID: 2880225
Until recently, Europe from the collapse of Roman power in the fifth century to the Carolingian achievement in the ninth—the…
Expand
1985
1985
A Reconsideration of Ovid's Fasti
Christopher Martin
1985
Corpus ID: 191019606
We have come a long way from Michael Verinus's fifteenth-century estimate of Ovid's Fasti as "illius diuini uatis liber…
Expand
Highly Cited
1978
Highly Cited
1978
Ethological categories of behaviour and some consequences of their conflation
A. C. Purton
Animal Behaviour
1978
Corpus ID: 53202782
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE