메뉴 건너뛰기




Volumn 1, Issue , 2004, Pages 636-641

Flexible software protection using hardware/software codesign techniques

Author keywords

[No Author keywords available]

Indexed keywords

EMBEDDED PROCESSORS; HIGH-RISK SYSTEMS; SOFTWARE PROTECTION; SOFTWARE SYSTEMS; COMPILER TECHNIQUES; HARDWARE/SOFTWARE CO-DESIGN; HARDWARE/SOFTWARE CODESIGN METHODOLOGIES; PERFORMANCE PENALTIES; SOFTWARE APPROACH;

EID: 3042660410     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/DATE.2004.1268916     Document Type: Conference Paper
Times cited : (11)

References (13)
  • 2
    • 3042683432 scopus 로고    scopus 로고
    • Message authentication using hash functions: The HMAC construction
    • Spring
    • M. Bellare, R. Canetti, and H. Krawczyk. Message authentication using hash functions: the HMAC construction. RSA Laboratories' CryptoBytes, 2(1), Spring 1996.
    • (1996) RSA Laboratories' CryptoBytes , vol.2 , Issue.1
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 4
    • 0004046658 scopus 로고    scopus 로고
    • A taxonomy of obfuscating transformations
    • Department of Computer Science, The University of Auckland, July
    • C. Collberg, C. Thomborson, and D. Low. A taxonomy of obfuscating transformations. Technical Report 148, Department of Computer Science, The University of Auckland, July 1997.
    • (1997) Technical Report , vol.148
    • Collberg, C.1    Thomborson, C.2    Low, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.