{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T08:12:48Z","timestamp":1743149568567,"version":"3.40.3"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319302218"},{"type":"electronic","value":"9783319302225"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-30222-5_12","type":"book-chapter","created":{"date-parts":[[2016,3,1]],"date-time":"2016-03-01T03:45:11Z","timestamp":1456803911000},"page":"245-269","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Theoretical Foundation for Code Obfuscation Security: A Kolmogorov Complexity Approach"],"prefix":"10.1007","author":[{"given":"Rabih","family":"Mohsen","sequence":"first","affiliation":[]},{"given":"Alexandre Miranda","family":"Pinto","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,3,1]]},"reference":[{"issue":"2","key":"12_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2160158.2160159","volume":"59","author":"B Barak","year":"2012","unstructured":"Barak, B., Goldreich, O., Impagliazzo, R., Rudich, S., Sahai, A., Vadhan, S., Yang, K.: On the (im)possibility of obfuscating programs. J. ACM 59(2), 1\u201348 (2012). \n                    http:\/\/doi.acm.org\/10.1145\/2160158.2160159","journal-title":"J. ACM"},{"key":"12_CR2","first-page":"69","volume":"2001","author":"B Barak","year":"2001","unstructured":"Barak, B., Goldreich, O., Impagliazzo, R., Rudich, S., Sahai, A., Vadhan, S.P., Yang, K.: On the (im)possibility of obfuscating programs. IACR Cryptology ePrint Arch. 2001, 69 (2001)","journal-title":"IACR Cryptology ePrint Arch."},{"key":"12_CR3","unstructured":"Collberg, C., Thomborson, C., Low, D.: A Taxonomy of Obfuscating Transformations (1997). \n                    https:\/\/researchspace.auckland.ac.nz\/handle\/2292\/3491"},{"key":"12_CR4","first-page":"1477","volume":"15","author":"P G\u00e1cs","year":"1974","unstructured":"G\u00e1cs, P.: On the symmetry of algorithmic information. Soviet Math. Dokl 15, 1477\u20131480 (1974)","journal-title":"Soviet Math. Dokl"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Garg, S., Raykova, M., Gentry, C., Sahai, A., Halevi, S., Waters, B.: Candidate indistinguishability obfuscation and functional encryption for all circuits. In: FOCS (2013)","DOI":"10.1109\/FOCS.2013.13"},{"key":"12_CR6","unstructured":"Gauvrit, N., Zenil, H., Delahaye, J.P.: Assessing cognitive randomness: A kolmogorov complexity approach. CoRR abs\/1106.3059 (2011)"},{"key":"12_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1007\/978-3-540-70936-7_11","volume-title":"Theory of Cryptography","author":"S Goldwasser","year":"2007","unstructured":"Goldwasser, S., Rothblum, G.N.: On best-possible obfuscation. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 194\u2013213. Springer, Heidelberg (2007)"},{"key":"12_CR8","unstructured":"Jbara, A., Feitelson, D.G.: On the effect of code regularity on comprehension. In: Proceedings of the 22nd International Conference on Program Comprehension, ICpPC 2014, pp. 189\u2013200. ACM, New York (2014). \n                    http:\/\/doi.acm.org\/10.1145\/2597008.2597140"},{"issue":"1","key":"12_CR9","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1109\/18.481775","volume":"42","author":"JC Kieffer","year":"1996","unstructured":"Kieffer, J.C., Yang, E.H.: Sequential codes, lossless compression of individual sequences, and kolmogorov complexity. IEEE Trans. Inf. Theor. 42(1), 29\u201339 (1996)","journal-title":"IEEE Trans. Inf. Theor."},{"key":"12_CR10","unstructured":"Lathrop, J.I.: Compression depth and the behavior of cellular automata. Complex Systems (1997)"},{"key":"12_CR11","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-49820-1","volume-title":"An Introduction to Kolmogorov Complexity and Its Applications","author":"M Li","year":"2008","unstructured":"Li, M., Vitnyi, P.M.: An Introduction to Kolmogorov Complexity and Its Applications, 3rd edn. Springer Publishing Company, Incorporated (2008)","edition":"3"},{"issue":"4","key":"12_CR12","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1109\/TSE.1976.233837","volume":"2","author":"TJ McCabe","year":"1976","unstructured":"McCabe, T.J.: A complexity measure. IEEE Trans. Softw. Eng. 2(4), 308\u2013320 (1976)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"12_CR13","unstructured":"Shen, A.: Axiomatic description of the entropy notion for finite objects. VIII All-USSR Conference (Logika i metodologija nauki), Vilnjus, pp. 104\u2013105 (1982). \n                    http:\/\/www.lirmm.fr\/ashen\/mathtext\/1982\/vilnus.pdf\n                    \n                  . The paper in Russian"}],"container-title":["Communications in Computer and Information Science","E-Business and Telecommunications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-30222-5_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T12:42:09Z","timestamp":1559392929000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-30222-5_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319302218","9783319302225"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-30222-5_12","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"1 March 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}