-
1
-
-
0012033928
-
-
revision 0.81, Aug.
-
4C Entity, "Content Protection System Architecture," revision 0.81, available http://www.4centity.com/data/tech/cpsa/cpsa081.pdf, Aug. 2001.
-
(2001)
Content Protection System Architecture
-
-
-
2
-
-
0025230154
-
Secure circuit evaluation: A protocol based on hiding information from an oracle
-
M. Abadi and J. Feigenbaum, "Secure Circuit Evaluation: A Protocol Based on Hiding Information from an Oracle," J. Cryptology, vol. 2, no. 1, pp. 1-12, 1990.
-
(1990)
J. Cryptology
, vol.2
, Issue.1
, pp. 1-12
-
-
Abadi, M.1
Feigenbaum, J.2
-
4
-
-
0012066282
-
-
Atari Games Corp. and Tengen, Inc. v. Nintendo of America Inc. and Nintendo Co., Ltd., United States Court of Appeals for the Federal Circuit, Sept. 1992
-
Atari Games Corp. and Tengen, Inc. v. Nintendo of America Inc. and Nintendo Co., Ltd., United States Court of Appeals for the Federal Circuit, Sept. 1992.
-
-
-
-
5
-
-
84955621400
-
Tamper resistant software: An implementation
-
R.J. Anderson, ed., May
-
D. Aucsmith, "Tamper Resistant Software: An Implementation," Information Hiding, First Int'l Workshop, R.J. Anderson, ed., pp. 317-333, May 1996.
-
(1996)
Information Hiding, First Int'l Workshop
, pp. 317-333
-
-
Aucsmith, D.1
-
6
-
-
0012064474
-
-
US patent 5,892,899, Assignee: Intel Corporation
-
D. Aucsmith and G. Graunke, "Tamper Resistant Methods and Apparatus," US patent 5,892,899, Assignee: Intel Corporation, 1999.
-
(1999)
Tamper Resistant Methods and Apparatus
-
-
Aucsmith, D.1
Graunke, G.2
-
7
-
-
0011188089
-
On the (im)possibility of obfuscating programs (extended abstract)
-
J. Kilian, ed.
-
B. Barak, O. Goldreich, R. Impagliazzo, S. Rudich, A. Sahai, S. Vadhan, and K. Yang, "On the (Im)possibility of Obfuscating Programs (Extended Abstract)," Advances in Cryptology-CRYPTO 2001, J. Kilian, ed., 2001.
-
(2001)
Advances in Cryptology-CRYPTO 2001
-
-
Barak, B.1
Goldreich, O.2
Impagliazzo, R.3
Rudich, S.4
Sahai, A.5
Vadhan, S.6
Yang, K.7
-
8
-
-
0012096118
-
Computing functions of a shared secret
-
A. Beimel, M. Burmester, Y. Desmedt, and E. Kushilevitz, "Computing Functions of a Shared Secret," SIAM J. Discrete Math., vol. 13, no. 3, pp. 324-345, 2000.
-
(2000)
SIAM J. Discrete Math.
, vol.13
, Issue.3
, pp. 324-345
-
-
Beimel, A.1
Burmester, M.2
Desmedt, Y.3
Kushilevitz, E.4
-
9
-
-
0030384775
-
Techniques for data hiding
-
W. Bender, D. Gruhl, N. Morimoto, and A. Lu, "Techniques for Data Hiding," IBM Systems J., vol. 35, nos. 3 & 4, pp. 313-336, 1996.
-
(1996)
IBM Systems J.
, vol.35
, Issue.3-4
, pp. 313-336
-
-
Bender, W.1
Gruhl, D.2
Morimoto, N.3
Lu, A.4
-
10
-
-
0012034275
-
Checking secure interactions of smart card applets
-
P. Bieber, J. Cazin, P. Girard, J.L. Lanet, V. Wiels, and G. Zanon, "Checking Secure Interactions of Smart Card Applets," Proc. Sixth European Symp. Research in Computer Security (ESORICS), 2000.
-
(2000)
Proc. Sixth European Symp. Research in Computer Security (ESORICS)
-
-
Bieber, P.1
Cazin, J.2
Girard, P.3
Lanet, J.L.4
Wiels, V.5
Zanon, G.6
-
12
-
-
84964537271
-
Program result checking: A new approach to making programs more reliable
-
S. Carlsson, A. Lingas, and R.G. Karlsson, eds., July
-
M. Blum, "Program Result Checking: A New Approach to Making Programs More Reliable," Proc. 20th Int'l Colloquium Automata, Languages, and Programming, S. Carlsson, A. Lingas, and R.G. Karlsson, eds., pp. 1-14, July 1993.
-
(1993)
Proc. 20th Int'l Colloquium Automata, Languages, and Programming
, pp. 1-14
-
-
Blum, M.1
-
13
-
-
0029214558
-
Designing programs that check their work
-
Jan.
-
M. Blum and S. Kannan, "Designing Programs that Check Their Work," J. ACM, vol. 42, no. 1, pp. 269-291, Jan. 1995.
-
(1995)
J. ACM
, vol.42
, Issue.1
, pp. 269-291
-
-
Blum, M.1
Kannan, S.2
-
15
-
-
0035425512
-
Protecting and managing electronic content with a digital battery
-
Aug.
-
T.A. Budd, "Protecting and Managing Electronic Content with a Digital Battery," Computer, vol. 34, no. 8, pp. 2-8, Aug. 2001.
-
(2001)
Computer
, vol.34
, Issue.8
, pp. 2-8
-
-
Budd, T.A.1
-
16
-
-
0012037450
-
Computer software protection against piracy in Taiwan
-
L.K. Chen, "Computer Software Protection against Piracy in Taiwan,' J. Asian Law, vol. 8, no. 1, 1994, http://www.columbia.edu/cu/asiaweb/v8n1chen.htm.
-
(1994)
J. Asian Law
, vol.8
, Issue.1
-
-
Chen, L.K.1
-
17
-
-
0002380598
-
Security issues in mobile code systems
-
D.M. Chess, "Security Issues in Mobile Code Systems," Mobile Agents and Security, pp. 1-8, 1998.
-
(1998)
Mobile Agents and Security
, pp. 1-8
-
-
Chess, D.M.1
-
18
-
-
0023294949
-
Computer viruses-theory and experiments
-
F. Cohen, "Computer Viruses-Theory and Experiments," IFIP-TC11, Computers and Security, pp. 22-35, 1987.
-
(1987)
IFIP-TC11, Computers and Security
, pp. 22-35
-
-
Cohen, F.1
-
22
-
-
0032691819
-
Software watermarking: Models and dynamic embeddings
-
Jan.
-
C. Collberg and C. Thomborson, "Software Watermarking: Models and Dynamic Embeddings," Principles of Programming Languages (POPL '99), Jan. 1999, http://www.cs.auckland.ac.nz/collberg/Research/nz/̃collberg/Research/Public ations/CollbergThomborson99a/index.html.
-
(1999)
Principles of Programming Languages (POPL '99)
-
-
Collberg, C.1
Thomborson, C.2
-
23
-
-
0004046658
-
-
Technical Report 148, Dept. of Computer Science, Univ. of Auckland, July
-
C. Collberg, C. Thomborson, and D. Low, "A Taxonomy of Obfuscating Transformations," Technical Report 148, Dept. of Computer Science, Univ. of Auckland, July 1997, http://www.cs.auckland.ac.nz/̃collberg/Research/Publications/CollbergThombo rsonLow97a.
-
(1997)
A Taxonomy of Obfuscating Transformations
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
25
-
-
0031649930
-
Manufacturing cheap, resilient, and stealthy opaque constructs
-
Jan.
-
C. Collberg, C. Thomborson, and D. Low, "Manufacturing Cheap, Resilient, and Stealthy Opaque Constructs," Proc. Symp. Principles of Programming Languages (POPL '98), Jan. 1998. http://www.cs.auckland.ac.nz/collberg/Research/Publications/CollbergThomborsonLo w98a/.
-
(1998)
Proc. Symp. Principles of Programming Languages (POPL '98)
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
26
-
-
0012064475
-
-
Compaq, "FreePort Express," http://www.support.compaq.com/amt/freeport/.
-
FreePort Express
-
-
-
28
-
-
0012096121
-
-
US Patent 5,559,884, Assignee: Microsoft Corporation, Sept.
-
R.L. Davidson and N. Myhrvold, "Method and System for Generating and Auditing a Signature for a Computer Program," US Patent 5,559,884, Assignee: Microsoft Corporation, Sept. 1996.
-
(1996)
Method and System for Generating and Auditing a Signature for a Computer Program
-
-
Davidson, R.L.1
Myhrvold, N.2
-
30
-
-
0031640285
-
Spot-checkers
-
May
-
F. Ergün, S. Kannan, S.R. Kumar, R. Rubinfeld, and M. Vishwanathan, "Spot-Checkers," Proc. 30th Ann. ACM Symp. Theory of Computing (STOC '98), pp. 259-268, May 1998.
-
(1998)
Proc. 30th Ann. ACM Symp. Theory of Computing (STOC '98)
, pp. 259-268
-
-
Ergün, F.1
Kannan, S.2
Kumar, S.R.3
Rubinfeld, R.4
Vishwanathan, M.5
-
31
-
-
0012070232
-
-
Ernie, Mar., Usenet:comp. misc
-
Ernie, "Disk Copy Protection," Mar. 1997, Usenet:comp. misc, http://groups.google.com/groups?selm=33256CC1.7EE040mitre.org.
-
(1997)
Disk Copy Protection
-
-
-
32
-
-
0030149547
-
Software protection and simulation on oblivious RAMs
-
O. Goldreich and R. Ostrovsky, "Software Protection and Simulation on Oblivious RAMs," J. ACM, vol. 43, no. 3, pp. 431-473, 1996.
-
(1996)
J. ACM
, vol.43
, Issue.3
, pp. 431-473
-
-
Goldreich, O.1
Ostrovsky, R.2
-
33
-
-
0002481588
-
Global software piracy: You can't get blood out of turnip
-
Sept.
-
R.D. Gopal and G.L. Sanders, "Global Software Piracy: You Can't Get Blood Out of Turnip," Comm. ACM, vol. 43, no. 9, pp. 83-89, Sept. 2000.
-
(2000)
Comm. ACM
, vol.43
, Issue.9
, pp. 83-89
-
-
Gopal, R.D.1
Sanders, G.L.2
-
34
-
-
84885405991
-
Software protection: Myth or reality?
-
Aug.
-
J.R. Gosler, "Software Protection: Myth or Reality? CRYPTO'85-Advances in Cryptology, pp. 140-157, Aug. 1985.
-
(1985)
CRYPTO'85-Advances in Cryptology
, pp. 140-157
-
-
Gosler, J.R.1
-
35
-
-
0010902349
-
Program identification
-
The British Computer Soc. Monographs in Informatics, Cambridge Univ. Press, second ed.
-
D. Grover, "Program Identification," The Protection of Computer Software: Its Technology and Applications, The British Computer Soc. Monographs in Informatics, Cambridge Univ. Press, second ed., 1992.
-
(1992)
The Protection of Computer Software: Its Technology and Applications
-
-
Grover, D.1
-
36
-
-
84937414062
-
-
AsiaCrypt 2000
-
S. Hada, "Zero-Knowledge and Code Obfuscation," AsiaCrypt 2000, pp. 443-457, 2000, http://link.springer.de/link/service/series/0558/papers/1976/19760443.pdf.
-
(2000)
Zero-Knowledge and Code Obfuscation
, pp. 443-457
-
-
Hada, S.1
-
37
-
-
0023456849
-
Public protection of software
-
Nov.
-
A. Herzberg and S.S. Pinter, "Public Protection of Software," ACM Trans. Computer Systems, vol. 5, no. 4, pp. 371-393, Nov. 1987.
-
(1987)
ACM Trans. Computer Systems
, vol.5
, Issue.4
, pp. 371-393
-
-
Herzberg, A.1
Pinter, S.S.2
-
38
-
-
0001943763
-
Time limited blackbox security: Protecting mobile agents from malicious hosts
-
Mobile Agents and Security, Springer-Verlag
-
F. Hohl, "Time Limited Blackbox Security: Protecting Mobile Agents from Malicious Hosts," Mobile Agents and Security, pp. 92-113, vol. 1419, Lecture Notes in Computer Science, Springer-Verlag, 1998.
-
(1998)
Lecture Notes in Computer Science
, vol.1419
, pp. 92-113
-
-
Hohl, F.1
-
39
-
-
0033706501
-
A framework to protect mobile agents by using reference states
-
F. Hohi, "A Framework to Protect Mobile Agents by Using Reference States," Proc. 20th Int'l Conf. Distributed Computing Systems, pp. 410-417, 2000.
-
(2000)
Proc. 20th Int'l Conf. Distributed Computing Systems
, pp. 410-417
-
-
Hohi, F.1
-
40
-
-
0012069651
-
-
US Patent 5,287,407, Assignee: International Business Machines, Feb.
-
K. Holmes, "Computer Software Protection," US Patent 5,287,407, Assignee: International Business Machines, Feb. 1994.
-
(1994)
Computer Software Protection
-
-
Holmes, K.1
-
41
-
-
0030777732
-
Precise flow-insensitive may-alias analysis is NP-Hard
-
Jan.
-
S. Horwitz, "Precise Flow-Insensitive May-Alias Analysis is NP-Hard," TOPLAS, vol. 19, no. 1, pp. 1-6, Jan. 1997.
-
(1997)
TOPLAS
, vol.19
, Issue.1
, pp. 1-6
-
-
Horwitz, S.1
-
42
-
-
0003531721
-
-
PhD thesis, Dept. of Eng. and Public Policy, Carnegie-Mellon Univ., Apr.
-
J.D. Howard, "An Analysis of Security Incidents on the Internet, 1989-1995," PhD thesis, Dept. of Eng. and Public Policy, Carnegie-Mellon Univ., Apr. 1997.
-
(1997)
An Analysis of Security Incidents on the Internet, 1989-1995
-
-
Howard, J.D.1
-
43
-
-
0012064477
-
-
IBM, "Cryptolopes," http://www.ibm.com/software/security/cryptolope/.
-
Cryptolopes
-
-
-
45
-
-
0031996445
-
Computing practices: Exploring steganography: Seeing the unseen
-
Feb.
-
N.F. Johnson and S. Jajodia, "Computing Practices: Exploring Steganography: Seeing the Unseen," Computer, vol. 31, no. 2, pp. 26-34, Feb. 1998, http://www.isse.gmu.edu/njohnson/pub/r2026.pdf.
-
(1998)
Computer
, vol.31
, Issue.2
, pp. 26-34
-
-
Johnson, N.F.1
Jajodia, S.2
-
46
-
-
0031619176
-
Watermarking techniques for intellectual property protection
-
June
-
A.B. Kahng, J. Lach, W.H. Mangione-Smith, S. Mantik, I.L. Markov, M. Potkonjak, P. Tucker, H. Wang, and G. Wolfe, "Watermarking Techniques for Intellectual Property Protection," Proc. 35th ACM/IEEE DAC Design Automation Conf. (DAC '98), pp. 776-781, June 1999, http://www.cs.ucla.edu/gangqu/ipp/c79.ps.gz.
-
(1999)
Proc. 35th ACM/IEEE DAC Design Automation Conf. (DAC '98)
, pp. 776-781
-
-
Kahng, A.B.1
Lach, J.2
Mangione-Smith, W.H.3
Mantik, S.4
Markov, I.L.5
Potkonjak, M.6
Tucker, P.7
Wang, H.8
Wolfe, G.9
-
48
-
-
0028514027
-
A taxonomy of computer program security flaws
-
Sept.
-
C.E. Landwehr, A.R. Bull, J.P. McDermott, and W.S. Choi, "A Taxonomy of Computer Program Security Flaws," ACM Computing Surveys, vol. 26, no. 3, pp. 211-254, Sept. 1994.
-
(1994)
ACM Computing Surveys
, vol.26
, Issue.3
, pp. 211-254
-
-
Landwehr, C.E.1
Bull, A.R.2
McDermott, J.P.3
Choi, W.S.4
-
50
-
-
0034445599
-
Architectural support for copy and tamper resistant software
-
Nov.
-
D. Lie, C. Thekkath, M. Mitchell, P. Lincoln, D. Boneh, J. Mitchell, and M. Horowitz, "Architectural Support for Copy and Tamper Resistant Software," Architectural Support for Programming Languages and Operating Systems, pp. 168-177, Nov. 2000.
-
(2000)
Architectural Support for Programming Languages and Operating Systems
, pp. 168-177
-
-
Lie, D.1
Thekkath, C.2
Mitchell, M.3
Lincoln, P.4
Boneh, D.5
Mitchell, J.6
Horowitz, M.7
-
51
-
-
0012039173
-
Factors motivating software piracy: A longitudinal study
-
M. Limayem, M. Khalifa, and W.W. Chin, "Factors Motivating Software Piracy: A Longitudinal Study," Proc. 20th Int'l Conf. Information Systems, pp. 124-131, 1999.
-
(1999)
Proc. 20th Int'l Conf. Information Systems
, pp. 124-131
-
-
Limayem, M.1
Khalifa, M.2
Chin, W.W.3
-
52
-
-
0030676601
-
How to systematically classify computer security intrusions
-
U. Lindqvist and E. Jonsson, "How to Systematically Classify Computer Security Intrusions," Proc. 1997 IEEE Symp. Security and Privacy, pp. 154-163, 1997, http://www.ce.chalmers.se/staff/ulfl/pubs/sp97.
-
(1997)
Proc. 1997 IEEE Symp. Security and Privacy
, pp. 154-163
-
-
Lindqvist, U.1
Jonsson, E.2
-
53
-
-
0012099210
-
Omniware: A universal substrate for web programming
-
S. Lucco, R. Wahbe, and O. Sharp, "Omniware: A Universal Substrate for Web Programming," Proc. WWW4, 1995.
-
(1995)
Proc. WWW4
-
-
Lucco, S.1
Wahbe, R.2
Sharp, O.3
-
55
-
-
0012100966
-
-
may.95/News.705.html, May-June
-
Apple's QuickTime lawsuit, http://www.macworld.com/pages/june.95/News.848.htmil and may.95/News.705.html, May-June 1995.
-
(1995)
Apple's QuickTime lawsuit
-
-
-
56
-
-
0012092773
-
Controlling copyright infringements of intellectual property: The case of computer software
-
June, part 2
-
Y. Malhotra, "Controlling Copyright Infringements of Intellectual Property: The Case of Computer Software," J. Systems Management, part 1, vol. 45, no. 6, pp. 32-35, June 1994, part 2: no. 7, pp. 12-17, July 1994.
-
(1994)
J. Systems Management, part 1
, vol.45
, Issue.6
, pp. 32-35
-
-
Malhotra, Y.1
-
57
-
-
0012036005
-
-
July
-
Y. Malhotra, "Controlling Copyright Infringements of Intellectual Property: The Case of Computer Software," J. Systems Management, part 1, vol. 45, no. 6, pp. 32-35, June 1994, part 2: no. 7, pp. 12-17, July 1994.
-
(1994)
J. Systems Management, part 1
, Issue.7
, pp. 12-17
-
-
-
58
-
-
0012038524
-
Pursuing pirates (unauthorized software copying)
-
Aug.
-
J. Martin, "Pursuing Pirates (Unauthorized Software Copying)," Datamation, vol. 35, no. 15, pp. 41-42, Aug. 1989.
-
(1989)
Datamation
, vol.35
, Issue.15
, pp. 41-42
-
-
Martin, J.1
-
59
-
-
0021494484
-
Hardware protection against software piracy
-
Sept.
-
T. Maude and D. Maude, "Hardware Protection against Software Piracy," Comm. ACM, vol. 27, no. 9, pp. 950-959, Sept. 1984.
-
(1984)
Comm. ACM
, vol.27
, Issue.9
, pp. 950-959
-
-
Maude, T.1
Maude, D.2
-
60
-
-
0000675337
-
-
Technical Report 7, Inst. of Information Sci. & Electron, Tsukuba Univ., Japan, July
-
R. Mori and M. Kawahara, "Superdistribution: The Concept and the Architecture," Technical Report 7, Inst. of Information Sci. & Electron, Tsukuba Univ., Japan, July 1990, http://www.site.gmu.edu/bcox/ElectronicFrontier/MoriSuperdist.html.
-
(1990)
Superdistribution: The Concept and the Architecture
-
-
Mori, R.1
Kawahara, M.2
-
61
-
-
0012099867
-
-
US Patent 5,745,569, Assignee: The Dice Company, Jan.
-
S.A. Moskowitz and M. Cooperman, "Method for Stega-Cipher Protection of Computer Code," US Patent 5,745,569, Assignee: The Dice Company, Jan. 1996.
-
(1996)
Method for Stega-Cipher Protection of Computer Code
-
-
Moskowitz, S.A.1
Cooperman, M.2
-
62
-
-
84889051784
-
How to copyright a function?
-
Public Key Encryption '99, Hideki Imai, ed., Springer-Verlag
-
D. Naccache, A. Shamir, and J.P. Stern, "How to Copyright a Function?" Public Key Encryption '99, Hideki Imai, ed., Lecture Notes in Computer Science, Springer-Verlag, 1999.
-
(1999)
Lecture Notes in Computer Science
-
-
Naccache, D.1
Shamir, A.2
Stern, J.P.3
-
64
-
-
0012062320
-
-
NetSafe, Copyright
-
NetSafe, "EXE Guardian™," http://members.ozemail.com.au/netsafe/guardian_detailed_information.html, Copyright 1996.
-
(1996)
EXE Guardian™
-
-
-
66
-
-
84884036760
-
-
L.C. Noll, S. Cooper, P. Seebach, and L.A. Broukhis, "The International Obfuscated C Code Contest," http://www.ioccc.org/index.html, 2000.
-
(2000)
The International Obfuscated C Code Contest
-
-
Noll, L.C.1
Cooper, S.2
Seebach, P.3
Broukhis, L.A.4
-
70
-
-
0032306157
-
Analysis of watermarking techniques for graph coloring problem
-
Nov.
-
G. Qu and M. Potkonjak, "Analysis of Watermarking Techniques for Graph Coloring Problem," Proc. IEEE/ACM Int'l Conf. Computer Aided Design, pp. 190-193, Nov. 1998, http://www.cs.ucta.edu/gangqu/publication/gc.ps.gz.
-
(1998)
Proc. IEEE/ACM Int'l Conf. Computer Aided Design
, pp. 190-193
-
-
Qu, G.1
Potkonjak, M.2
-
71
-
-
0028510908
-
The undecidability of aliasing
-
Sept.
-
G. Ramalingam, "The Undecidability of Aliasing," ACM Trans. Programming Languages and Systems, vol. 16, no. 5, pp. 1467-1471, Sept. 1994.
-
(1994)
ACM Trans. Programming Languages and Systems
, vol.16
, Issue.5
, pp. 1467-1471
-
-
Ramalingam, G.1
-
73
-
-
0012037694
-
-
June
-
H. Rosner, "Steal this Software," The.Standard.com, June 2000. http://www.thestandard.com/article/article_print/1,1153,16039,00.html.
-
(2000)
Steal this Software
-
-
Rosner, H.1
-
74
-
-
0026869838
-
Batch checking with applications to linear functions
-
May
-
R. Rubinfeld, "Batch Checking with Applications to Linear Functions," Information Processing Letters, vol. 42, no. 2, pp. 77-80, May 1992.
-
(1992)
Information Processing Letters
, vol.42
, Issue.2
, pp. 77-80
-
-
Rubinfeld, R.1
-
75
-
-
0002858816
-
Designing checkers for programs that run in parallel
-
Apr.
-
R. Rubinfeld, "Designing Checkers for Programs that Run in Parallel," Algorithmica, vol. 15, no. 4, pp. 287-301, Apr. 1996.
-
(1996)
Algorithmica
, vol.15
, Issue.4
, pp. 287-301
-
-
Rubinfeld, R.1
-
76
-
-
0012062321
-
-
US Patent 5,287,408, Assignee: Autodesk, Inc., Feb.
-
P.R. Samson, "Apparatus and Method for Serializing and Validating Copies of Computer Software," US Patent 5,287,408, Assignee: Autodesk, Inc., Feb. 1994.
-
(1994)
Apparatus and Method for Serializing and Validating Copies of Computer Software
-
-
Samson, P.R.1
-
77
-
-
0025238177
-
Reverse-engineering someone Else's software: Is it legal?
-
Jan.
-
P. Samuelson, "Reverse-Engineering Someone Else's Software: Is It Legal?" IEEE Software, pp. 90-96, Jan. 1990.
-
(1990)
IEEE Software
, pp. 90-96
-
-
Samuelson, P.1
-
81
-
-
0012068216
-
Computer viruses as artificial life
-
E.H. Spafford, "Computer Viruses as Artificial Life," Artificial Life, vol. 1, no. 3, pp. 249-265, 1994.
-
(1994)
Artificial Life
, vol.1
, Issue.3
, pp. 249-265
-
-
Spafford, E.H.1
-
83
-
-
0004309411
-
-
technical report, Nat'l Inst. Standards and Technology, Dept. of Commerce, US Government, Sept.
-
M. Swanson and B. Guttman, "Generally Accepted Principles and Practices for Securing Information Technology Systems," technical report, Nat'l Inst. Standards and Technology, Dept. of Commerce, US Government, Sept. 1996, http://www.auerbach-publications.com/white-papers/nist-security-guidelines.pdf.
-
(1996)
Generally Accepted Principles and Practices for Securing Information Technology Systems
-
-
Swanson, M.1
Guttman, B.2
-
85
-
-
0033634469
-
Information security in multi-processor systems based on the χ86 architecture
-
Oct.
-
A. Torrubia and F.J. Mora, "Information Security in Multi-processor Systems Based on the χ86 Architecture," Computers and Security, vol. 19, no. 6, pp. 559-563, Oct. 2000.
-
(2000)
Computers and Security
, vol.19
, Issue.6
, pp. 559-563
-
-
Torrubia, A.1
Mora, F.J.2
-
86
-
-
0012066285
-
Defining terms in the intellectual property protection debate: Are the north and south arguing past each other when we say 'Property'? A Lockean, Confucian, and Islamic comparison
-
Winter
-
R.E. Vaughn, "Defining Terms in the Intellectual Property Protection Debate: Are the North and South Arguing Past Each Other When We Say 'Property'? A Lockean, Confucian, and Islamic Comparison," ILSA J. Comparative and Int'l Law, vol. 2, no. 2, p. 308, Winter 1996, http://www.nsulaw.nova.edu/student/organizations/ILSAJournal/2-2/Vaughan202-2.ht m.
-
(1996)
ILSA J. Comparative and Int'l Law
, vol.2
, Issue.2
, pp. 308
-
-
Vaughn, R.E.1
-
91
-
-
0012038527
-
-
US Patent 5,761,477, Assignee: Microsoft Corporation
-
R. Wahbe and S. Lucco, "Methods for Safe and Efficient Implementation of Virtual Machines," US Patent 5,761,477, Assignee: Microsoft Corporation, 1999.
-
(1999)
Methods for Safe and Efficient Implementation of Virtual Machines
-
-
Wahbe, R.1
Lucco, S.2
-
92
-
-
0027836576
-
Efficient software-based fault isolation
-
R. Wahbe, S. Lucco, T. Anderson, and S. Graham, "Efficient Software-Based Fault Isolation," Proc. Symp. System Principles (SOSP '93), pp. 203-216, 1993.
-
(1993)
Proc. Symp. System Principles (SOSP '93)
, pp. 203-216
-
-
Wahbe, R.1
Lucco, S.2
Anderson, T.3
Graham, S.4
-
93
-
-
0004172766
-
-
PhD thesis, Univ. of Virginia, School of Eng. and Applied Science, Oct.
-
C. Wang, "A Security Architecture for Survivability Mechanisms," PhD thesis, Univ. of Virginia, School of Eng. and Applied Science, Oct. 2000, www.cs.virginia.edu/survive/pub/wangthesis.pdf.
-
(2000)
A Security Architecture for Survivability Mechanisms
-
-
Wang, C.1
-
94
-
-
0012037951
-
-
Technical Report CS-2000-12, Univ. of Virginia, Dec.
-
C. Wang, J. Hill, J. Knight, and J. Davidson, "Software Tamper Resistance: Obstructing Static Analysis of Programs," Technical Report CS-2000-12, Univ. of Virginia, Dec. 2000.
-
(2000)
Software Tamper Resistance: Obstructing Static Analysis of Programs
-
-
Wang, C.1
Hill, J.2
Knight, J.3
Davidson, J.4
-
96
-
-
0031274275
-
Software reliability via run-time result-checking
-
Nov.
-
H. Wasserman and M. Blum, "Software Reliability via Run-Time Result-Checking," J. ACM, vol. 44, no. 6, pp. 826-849, Nov. 1997.
-
(1997)
J. ACM
, vol.44
, Issue.6
, pp. 826-849
-
-
Wasserman, H.1
Blum, M.2
-
97
-
-
0026954536
-
Int'l software piracy
-
Nov.
-
S.P. Weisband and S.E. Goodman, "Int'l Software Piracy," Computer, vol. 92, no. 11, pp. 87-90, Nov. 1992.
-
(1992)
Computer
, vol.92
, Issue.11
, pp. 87-90
-
-
Weisband, S.P.1
Goodman, S.E.2
-
98
-
-
0012090357
-
-
Copyright
-
CD Media World, "CD Protections," http://www.cdmediaworld.com/hardware/cdrom/cd_protections.shtml, Copyright 1998-2001.
-
(1998)
CD Protections
-
-
-
99
-
-
0012036007
-
-
Xerox
-
Xerox, "ContentGuard," http://www.contentguard.com.
-
-
-
|