2018
DOI: 10.5120/ijca2018917137
|View full text |Cite
|
Sign up to set email alerts
|

Study for Best Data Obfuscation Techniques using Multi-Criteria Decision-Making Technique

Abstract: In this paper, we describe the formatting guidelines for IJCA Journal Submission Data obfuscation (or also known as masking of data) is the process of hiding real data with random characters or data i.e. the process of protecting sensitive data from thefts and hackers. Obfuscation is applied in order to secure data that is classified as personal identifiable data, personally or commercially sensitive data. Keeping the data valid for the use of test cycles. It must also appear consistent. The objective is to pr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 7 publications
0
1
0
Order By: Relevance
“…It changes the source file, which is a good point to protect the code. However, newer reverse engineering tools can change the flow of the software and even create new flows [6].…”
Section: Control Obfuscationmentioning
confidence: 99%
“…It changes the source file, which is a good point to protect the code. However, newer reverse engineering tools can change the flow of the software and even create new flows [6].…”
Section: Control Obfuscationmentioning
confidence: 99%