Skip to search formSkip to main contentSkip to account menu

Security through obscurity

Known as: Security by obscurity, Security through obfuscation, Security through obsurity 
In security engineering, security through obscurity (or security by obscurity) is the reliance on the secrecy of the design or implementation as the… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Obfuscation protects code by making it so impenetrable that access to it won't help a hacker understand how it works. 
Review
2009
Review
2009
Context. Modern solar X-ray imagers do not completely resolve the problem of deriving detailed diagnostics of faint hard X-ray… 
2008
2008
Oscar Wilde and Modern Culture: The Making of a Legend explores the meteoric rise, sudden fall, and legendary resurgence of an… 
2007
2007
Two models of Action Theory offer fundamentally different views of the merits and appropriate use of plans. While the… 
Highly Cited
2005
Highly Cited
2005
Recently, there has been a renewed interest in optical code-division multiple access (OCDMA) due to its potential for offering… 
2001
2001
Harry Frankfurt 1. At the beginning of the Second Section of his treatise entitled Foundations of the Metaphysics of Morals… 
2000
2000
Some seven hundred years after Sankara wrote the learned commentaries that established his reputation as one of the foremost… 
Highly Cited
1987
Highly Cited
1987
Until recently, Europe from the collapse of Roman power in the fifth century to the Carolingian achievement in the ninth—the… 
1985
1985
We have come a long way from Michael Verinus's fifteenth-century estimate of Ovid's Fasti as "illius diuini uatis liber…