메뉴 건너뛰기




Volumn , Issue , 2003, Pages 142-153

Obfuscation of design intent in object-oriented applications

Author keywords

Code Generation; Refactoring; Software Obfuscation

Indexed keywords

CODES (SYMBOLS); DIGITAL WATERMARKING; HTML; INTERNET; OPTIMIZATION; SECURITY OF DATA; SOFTWARE ENGINEERING;

EID: 18844377176     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/947380.947399     Document Type: Conference Paper
Times cited : (43)

References (18)
  • 8
    • 0036704573 scopus 로고    scopus 로고
    • Watermarking, tamper-proofing, and obfuscation - Tools for software protection
    • Aug.
    • C. S. Collberg and C. Thomborson. Watermarking, tamper-proofing, and obfuscation - tools for software protection. IEEE Transactions on Software Engineering, 28(8):735-746, Aug. 2002.
    • (2002) IEEE Transactions on Software Engineering , vol.28 , Issue.8 , pp. 735-746
    • Collberg, C.S.1    Thomborson, C.2
  • 10
    • 0004189634 scopus 로고
    • Addison-Wesley Publishing Company, Inc., Reading, Massachusetts, ISBN 0-201-63361-2
    • E. Gamma, R. Helm, R. Johnson, and J. Vlissides. Design Patterns. Addison-Wesley Publishing Company, Inc., Reading, Massachusetts, 1994. ISBN 0-201-63361-2.
    • (1994) Design Patterns
    • Gamma, E.1    Helm, R.2    Johnson, R.3    Vlissides, J.4
  • 17
    • 0033203879 scopus 로고    scopus 로고
    • Practical experience with an application extractor for Java
    • F. Tip, C. Laffra, P. F. Sweeney, and D. Streeter. Practical experience with an application extractor for Java. ACM SIGPLAN Notices, 34(10):292-305, 1999.
    • (1999) ACM SIGPLAN Notices , vol.34 , Issue.10 , pp. 292-305
    • Tip, F.1    Laffra, C.2    Sweeney, P.F.3    Streeter, D.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.