Obscuring Mobile Agents by Source Code Obfuscation

Security and performance are most essential and prime challenges for networking phenomenon. Computation on the remote host is generally done through links. Thus security is needed when the code is on the way to the destination host. A program travelling over the link is extremely venerable to be forged for malfunctioning. On the other hand Software's are commonly distributed with all information in the code itself, for example java byte codes. Byte codes are easy to reverse engineer. Any rival company may get the algorithms and techniques used in the product. Therefore a protection is needed to keep information secret.

Provided by: International Journal of Computer Applications Topic: Mobility Date Added: Jan 2013 Format: PDF

Download Now

Find By Topic