-
1
-
-
85176669226
-
-
D. Aucsmith Information Hiding May/June 1986 Tamper resistant software
-
(1986)
-
-
Aucsmith, D.1
-
4
-
-
0004046658
-
A taxonomy of obfuscating transformations
-
C. Collberg C. Thomborson D. Low A taxonomy of obfuscating transformations July 1997 148 Department of Computer Science, University of Auckland http://www.cs.auckland. ac.nz/~collberg/Research/Publications/ CollbergThomborsonLow97a/index.html
-
(1997)
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
5
-
-
79953682092
-
Manufacturing cheap, resilient, and stealthy opaque constructs
-
CA
-
C. Collberg C. Thomborson D. Low Manufacturing cheap, resilient, and stealthy opaque constructs SIGPLAN-SIGACT POPL'98 SIGPLAN-SIGACT POPL'98 San Diego CA 1998-January http://www.cs.auckland. ac.nz/~collberg/Research/Publications/ CollbergThomborsonLow98a/index.html
-
(1998)
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
6
-
-
85176695286
-
-
University of Washington
-
J. Dean Whole-Program Optimization of Object-Oriented Languages 1996 University of Washington
-
(1996)
-
-
Dean, J.1
-
7
-
-
33746067793
-
Software protection: Myth or reality?
-
J. R. Gosler Software protection: Myth or reality? CRYPTO'85 — Advances in Cryptology 140 157 CRYPTO'85 — Advances in Cryptology 1985-August
-
(1985)
, pp. 140-157
-
-
Gosler, J.R.1
-
8
-
-
0003518498
-
The Java Language Specification
-
Addison-Wesley
-
J. Gosling B. Joy G. Steele The Java Language Specification 1996 Addison-Wesley
-
(1996)
-
-
Gosling, J.1
Joy, B.2
Steele, G.3
-
9
-
-
84976759457
-
A complexity measure based on nesting level
-
W. A. Harrison K. I. Magel A complexity measure based on nesting level SIGPLAN Notices 16 3 63 74 1981
-
(1981)
SIGPLAN Notices
, vol.16
, Issue.3
, pp. 63-74
-
-
Harrison, W.A.1
Magel, K.I.2
-
12
-
-
85176686917
-
-
Apple's QuickTime lawsuit May-June 1995 http://www. macworld.com/pages/june.95/News.848.html and may.95/News.705.html
-
(1995)
-
-
-
15
-
-
0027334778
-
Creating abstract superclasses by refactoring
-
W. F. Opdyke R. E. Johnson Creating abstract superclasses by refactoring Proceedings of the 21st Annual Conference on Computer Science 66 73 Proceedings of the 21st Annual Conference on Computer Science New York USA 1993-February
-
(1993)
, pp. 66-73
-
-
Opdyke, W.F.1
Johnson, R.E.2
-
16
-
-
85176667622
-
Optimizing ANSI C with superoperators
-
T. Proebsting Optimizing ANSI C with superoperators POPL'96 POPL'96 1996-January
-
(1996)
-
-
Proebsting, T.1
-
17
-
-
0025238177
-
Reverse-engineering someone else's software: Is it legal?
-
P. Samuelson Reverse-engineering someone else's software: Is it legal? IEEE Software 90 96 January 1990
-
(1990)
IEEE Software
, pp. 90-96
-
-
Samuelson, P.1
-
18
-
-
0001532436
-
On the notion of inheritance
-
A. Taivalsaari On the notion of inheritance ACM Computing Surveys 28 3 438 479 September 1996
-
(1996)
ACM Computing Surveys
, vol.28
, Issue.3
, pp. 438-479
-
-
Taivalsaari, A.1
-
19
-
-
85176670684
-
-
R. Tolksdorf Programming languages for the Java virtual machine 1997 http://grunge.cs.tu-berlin. de/~tolk/vmlanguages.html
-
(1997)
-
-
Tolksdorf, R.1
-
20
-
-
85176679847
-
-
H. P. Van Vliet Crema — The Java obfuscator January 1996 http: //web.inter.nl.net/users/H.P.van.Vliet
-
(1996)
-
-
Van Vliet, H.P.1
-
21
-
-
85176677481
-
-
U. G. Wilhelm Cryptographically protected objects 1997 http://lsewww.epfl.ch/~wilhelm/CryPO. html
-
(1997)
-
-
Wilhelm, U.G.1
|