-
1
-
-
85039344955
-
"Computer and Video Game Software Sales Reach Record $7.3 Billion in 2004"
-
(Jan.)
-
"Computer and Video Game Software Sales Reach Record $7.3 Billion in 2004," Entertainment Software Association (ESA) (Jan. 2005), http://www.theesa.com/archives/2005/02/computer_and_vi.php.
-
(2005)
Entertainment Software Association (ESA)
-
-
-
2
-
-
85039351338
-
"2005 Special 301 Report on Global Copyright Protection and Enforcement"
-
(Feb. 10)
-
"2005 Special 301 Report on Global Copyright Protection and Enforcement," International Intellectual Property Alliance (IIPA) (Feb. 10, 2005), http://www.iipa.com/special301.html.
-
(2005)
International Intellectual Property Alliance (IIPA)
-
-
-
3
-
-
33746610961
-
"Self-Validating Branch-Based Software Watermarking"
-
Lecture Notes in Computer Science Springer-Verlag Inc., New York
-
G. Myles and H. Jin, "Self-Validating Branch-Based Software Watermarking," in Information Hiding, 7th International Workshop, Lecture Notes in Computer Science 3727, Springer-Verlag Inc., New York (2005), pp. 342-356.
-
(2005)
Information Hiding, 7th International Workshop
, vol.3727
, pp. 342-356
-
-
Myles, G.1
Jin, H.2
-
4
-
-
0021494484
-
"Hardware Protection Against Software Piracy"
-
T. Maude and D. Maude, "Hardware Protection Against Software Piracy," Communications of the ACM 27 (9), 950-959, 1984.
-
(1984)
Communications of the ACM
, vol.27
, Issue.9
, pp. 950-959
-
-
Maude, T.1
Maude, D.2
-
5
-
-
0034445599
-
"Architectural Support for Copy and Tamper Resistant Software"
-
ACM, New York
-
D. Lie, C. Thekkath, M. Mitchell, P. Lincoln, D. Bohen, J. Mitchell, and M. Horowitz, "Architectural Support for Copy and Tamper Resistant Software," in Proceedings of the Ninth International Conference on Architectural Support for Programming Languages and Operating Systems, ACM, New York (2000), pp. 168-177.
-
(2000)
Proceedings of the Ninth International Conference on Architectural Support for Programming Languages and Operating Systems
, pp. 168-177
-
-
Lie, D.1
Thekkath, C.2
Mitchell, M.3
Lincoln, P.4
Bohen, D.5
Mitchell, J.6
Horowitz, M.7
-
6
-
-
85039353362
-
-
Trusted Computing Group Home, Trusted Computing Group
-
Trusted Computing Group Home, Trusted Computing Group, http://www.trustedcomputinggroup.org/home.
-
-
-
-
7
-
-
85039343136
-
"More on Xbox Live Bans"
-
Joystiq, Weblogs Inc., (November 14)
-
S. Parsons, "More on Xbox Live Bans," Joystiq, Weblogs Inc., (November 14, 2004), http://www.joystiq.com/entry/6673569691391113/.
-
(2004)
-
-
Parsons, S.1
-
8
-
-
0012065211
-
"Operating System Protection through Program Evolution"
-
F. B. Cohen, "Operating System Protection through Program Evolution," http://all.net/books/IP/evolve.html, 1992.
-
(1992)
-
-
Cohen, F.B.1
-
10
-
-
0004046658
-
"A Taxonomy of Obfuscation Transformations"
-
Technical Report 148, Department of Computer Science, University of Auckland (July)
-
C. Collberg, C. Thomborson, and D. Low, "A Taxonomy of Obfuscation Transformations," Technical Report 148, Department of Computer Science, University of Auckland (July 1997).
-
(1997)
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
11
-
-
0031649930
-
"Manufacturing Cheap, Resilient, and Stealthy Opaque Constructs"
-
ACM, New York
-
C. Collberg, C. Thomborson, and D. Low, "Manufacturing Cheap, Resilient, and Stealthy Opaque Constructs," in Proceedings of the ACM Symposium on Principles of Programming Languages, ACM, New York (1998), pp. 184-196.
-
(1998)
Proceedings of the ACM Symposium on Principles of Programming Languages
, pp. 184-196
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
12
-
-
0031620963
-
"Breaking Abstractions and Unstructuring Data Structures"
-
IEEE, New York
-
C. Collberg, C. Thomborson, and D. Low, "Breaking Abstractions and Unstructuring Data Structures," IEEE International Conference on Computer Languages, IEEE, New York (1998), pp. 28-38.
-
(1998)
IEEE International Conference on Computer Languages
, pp. 28-38
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
13
-
-
0001943763
-
"Time Limited Blackbox Security: Protecting Mobile Agents from Malicious Hosts"
-
Lecture Notes in Computer Science Springer-Verlag Inc., New York
-
F. Hohl, "Time Limited Blackbox Security: Protecting Mobile Agents from Malicious Hosts," Mobile Agents and Security, Lecture Notes in Computer Science 1419, Springer-Verlag Inc., New York (1998), pp. 92-113.
-
(1998)
Mobile Agents and Security
, vol.1419
, pp. 92-113
-
-
Hohl, F.1
-
14
-
-
0004172766
-
"A Security Architecture for Survivability Mechanisms"
-
Ph.D. Thesis, University of Virginia, School of Engineering and Applied Science (Oct)
-
C. Wang, "A Security Architecture for Survivability Mechanisms," Ph.D. Thesis, University of Virginia, School of Engineering and Applied Science (Oct 2000).
-
(2000)
-
-
Wang, C.1
-
15
-
-
0012037951
-
"Software Tamper Resistance: Obstructing Static Analysis of Programs"
-
Technical Report CS-2000-12, University of Virginia, Dec
-
C. Wang, J. Hill, J. C. Knight, and J. W. Davidson, "Software Tamper Resistance: Obstructing Static Analysis of Programs," Technical Report CS-2000-12, University of Virginia, Dec. 2000.
-
(2000)
-
-
Wang, C.1
Hill, J.2
Knight, J.C.3
Davidson, J.W.4
-
16
-
-
0035789216
-
"Protection of Software-Based Survivability Mechanisms"
-
IEEE Computer Society
-
C. Wang, J. Hill, J. C. Knight, and J. W. Davidson, "Protection of Software-Based Survivability Mechanisms," in Proceedings of the 2001 International Conference on Dependable Systems and Networks, IEEE Computer Society (2001), pp. 193-202.
-
(2001)
Proceedings of the 2001 International Conference on Dependable Systems and Networks
, pp. 193-202
-
-
Wang, C.1
Hill, J.2
Knight, J.C.3
Davidson, J.W.4
-
18
-
-
84955621400
-
"Tamper Resistant Software; An Implementation"
-
Lecture Notes in Computer Science Springer-Verlag Inc., New York
-
D. Aucsmith, "Tamper Resistant Software; An Implementation," in Information Hiding, First International Workshop, Lecture Notes in Computer Science 1174, Springer-Verlag Inc., New York (1996), pp. 317-333.
-
(1996)
Information Hiding, First International Workshop
, vol.1174
, pp. 317-333
-
-
Aucsmith, D.1
-
19
-
-
0003197918
-
"Protecting Mobile Agents Against Malicious Hosts"
-
Notes in Computer Science Springer-Verlag Inc., New York
-
T. Sander and C. F. Tschudin, "Protecting Mobile Agents Against Malicious Hosts," Mobile Agents and Security, Lecture Notes in Computer Science 1419, Springer-Verlag Inc., New York (1998), pp. 44-60.
-
(1998)
Mobile Agents and Security Lecture
, vol.1419
, pp. 44-60
-
-
Sander, T.1
Tschudin, C.F.2
-
20
-
-
33646580509
-
Tamper Resistant Methods and Apparatus
-
Assignee: Intel Corporation
-
D. Aucsmith and G. Graunke, Tamper Resistant Methods and Apparatus, U.S. Patent 5,892,899, Assignee: Intel Corporation, 1999.
-
(1999)
U.S. Patent 5,892,899
-
-
Aucsmith, D.1
Graunke, G.2
-
21
-
-
84959058990
-
"Protecting Software Code By Guards"
-
Lecture Notes in Computer Science Springer-Verlag Inc., New York
-
H. Chang and M. Atallah, "Protecting Software Code By Guards," in Proceedings of the ACM Workshop on Security and Privacy in Digital Rights Management, Lecture Notes in Computer Science 2320, Springer-Verlag Inc., New York (2001), pp. 160-171.
-
(2001)
Proceedings of the ACM Workshop on Security and Privacy in Digital Rights Management
, vol.2320
, pp. 160-171
-
-
Chang, H.1
Atallah, M.2
-
22
-
-
84959055142
-
"Dynamic Self-Checking Techniques for Improved Tamper Resistance"
-
Lecture Notes in Computer Science Springer-Verlag Inc., New York
-
B. Horne, L. Matheson, C. Sheehan, and R. Tarjan, "Dynamic Self-Checking Techniques for Improved Tamper Resistance," in Proceedings of the ACM Workshop on Security and Privacy in Digital Rights Management, Lecture Notes in Computer Science 2320, Springer-Verlag Inc., New York (2001), pp. 141-159.
-
(2001)
Proceedings of the ACM Workshop on Security and Privacy in Digital Rights Management
, vol.2320
, pp. 141-159
-
-
Horne, B.1
Matheson, L.2
Sheehan, C.3
Tarjan, R.4
-
23
-
-
0036704573
-
"Watermarking, Tamper-Proofing, and Obfuscation - Tools for Software Protection"
-
August
-
C. Collberg and C. Thomborson, "Watermarking, Tamper-Proofing, and Obfuscation - Tools for Software Protection," IEEE Transactions on Software Engineering 28, No. 8, 735-746, August, 2002.
-
(2002)
IEEE Transactions on Software Engineering
, vol.28
, Issue.8
, pp. 735-746
-
-
Collberg, C.1
Thomborson, C.2
-
24
-
-
85039360005
-
-
Steam
-
Steam, http://www.steampowered.com.
-
-
-
-
25
-
-
0010902349
-
"Program Identification"
-
The British Computer Society Monographs in Informatics, Cambridge University Press, Second Edition
-
D. Grover, "Program Identification," The Protection of Computer Software: Its Technology and Applications, The British Computer Society Monographs in Informatics, Cambridge University Press, Second Edition, 1992.
-
(1992)
The Protection of Computer Software: Its Technology and Applications
-
-
Grover, D.1
-
26
-
-
0012069651
-
Computer Software Protection
-
Assignee: International Business Machines Corporation, Feb
-
K. Holmes, Computer Software Protection, U.S. Patent 5,287,407, Assignee: International Business Machines Corporation, Feb. 1994.
-
(1994)
U.S. Patent 5,287,407
-
-
Holmes, K.1
-
27
-
-
0012062321
-
-
Assignee: Autodesk, Inc., Feb
-
P. R. Samson, Apparatus and Method for Serializing and Validating Copies of Computer Software, U.S. Patent 5,287,408, Assignee: Autodesk, Inc., Feb. 1994.
-
(1994)
Apparatus and Method for Serializing and Validating Copies of Computer Software, U.S. Patent 5,287,408
-
-
Samson, P.R.1
-
28
-
-
0012099867
-
Method for Stega-Cipher Protection of Computer Code
-
Assignee: The Dice Company, Jan
-
S. A. Moszowitz and M. Cooperman, Method for Stega-Cipher Protection of Computer Code, U.S. Patent 5,745,569, Assignee: The Dice Company, Jan. 1996.
-
(1996)
U.S. Patent 5,745,569
-
-
Moszowitz, S.A.1
Cooperman, M.2
-
29
-
-
33645785768
-
Method and System for Generating and Auditing a Signature for a Computer Program
-
Assignee: Microsoft Corporation, Sept
-
R. L. Davidson and N. Myhrvold, Method and System for Generating and Auditing a Signature for a Computer Program, U.S. Patent 5,559,884, Assignee: Microsoft Corporation, Sept 1996.
-
(1996)
U.S. Patent 5,559,884
-
-
Davidson, R.L.1
Myhrvold, N.2
-
31
-
-
84947933018
-
"Hiding Signatures in Graph Coloring Solutions"
-
Lecture Notes in Computer Science Springer-Verlag Inc., New York
-
G. Qu and M. Potkonjak, "Hiding Signatures in Graph Coloring Solutions," in Information Hiding, Third International Workshop, Lecture Notes in Computer Science 1768, Springer-Verlag Inc., New York (1999), pp. 348-367.
-
(1999)
Information Hiding, Third International Workshop
, vol.1768
, pp. 348-367
-
-
Qu, G.1
Potkonjak, M.2
-
32
-
-
84947921326
-
"Robust Object Watermarking: Application to Code"
-
Lecture Notes in Computer Science Springer-Verlag Inc., New York
-
J. P. Stern, G. Hachez, F. Koeune, and J. J. Quisquater, "Robust Object Watermarking: Application to Code," Information Hiding, 3rd International Workshop, Lecture Notes in Computer Science 1768, Springer-Verlag Inc., New York (1999), pp. 368-378.
-
(1999)
Information Hiding, 3rd International Workshop
, vol.1768
, pp. 368-378
-
-
Stern, J.P.1
Hachez, G.2
Koeune, F.3
Quisquater, J.J.4
-
33
-
-
0034504466
-
"A Practical Method for Watermarking Java Programs"
-
IEEE Computer Society
-
A. Monden, H. Iida, K. Matsumoto, K. Inoue, and K. Torii, "A Practical Method for Watermarking Java Programs," in Proceedings of the 24th Computer Science and Applications Conference, IEEE Computer Society, 2000, pp. 191-197.
-
(2000)
Proceedings of the 24th Computer Science and Applications Conference
, pp. 191-197
-
-
Monden, A.1
Iida, H.2
Matsumoto, K.3
Inoue, K.4
Torii, K.5
-
34
-
-
84947285817
-
"A Graph Theoretic Approach to Software Watermarking"
-
Lecture Notes in Computer Science Springer-Verlag Inc., New York
-
R. Venkatesan, V. Vazirani, and S. Sinha, "A Graph Theoretic Approach to Software Watermarking," Information Hiding, 4th International Workshop, Lecture Notes in Computer Science 2127, Springer-Verlag Inc., New York (2001), pp. 157-168.
-
(2001)
Information Hiding, 4th International Workshop
, vol.2127
, pp. 157-168
-
-
Venkatesan, R.1
Vazirani, V.2
Sinha, S.3
-
37
-
-
4544235744
-
"Dynamic Path-Based Software Watermarking"
-
C. Collberg, E. Carter, S. Debry, A. Huntwork, J. Kececioglu, C. Linn, and M. Stepp, "Dynamic Path-Based Software Watermarking," in Proceedings of the SIGPLAN Conference on Programming Language Design and Implementation (2004), pp. 107-118.
-
(2004)
Proceedings of the SIGPLAN Conference on Programming Language Design and Implementation
, pp. 107-118
-
-
Collberg, C.1
Carter, E.2
Debry, S.3
Huntwork, A.4
Kececioglu, J.5
Linn, C.6
Stepp, M.7
-
38
-
-
35048884150
-
"Threading Software Watermarks"
-
Lecture Notes in Computer Science Springer-Verlag Inc., New York
-
J. Nagra and C. Thomborson, "Threading Software Watermarks," Information Hiding, 6th International Workshop, Lecture Notes in Computer Science 3200, Springer-Verlag Inc., New York (2004), pp. 208-233.
-
(2004)
Information Hiding, 6th International Workshop
, vol.3200
, pp. 208-233
-
-
Nagra, J.1
Thomborson, C.2
-
39
-
-
24944582622
-
"A Functional Taxonomy for Software Watermarking"
-
Australian Computer Society Inc
-
J. Nagra, C. Thomborson, and C. Collberg, "A Functional Taxonomy for Software Watermarking," in Proceedings of the Twenty-Fifth Australasian Computer Science Conference, Australian Computer Society Inc. (2002), pp. 177-186.
-
(2002)
Proceedings of the Twenty-Fifth Australasian Computer Science Conference
, pp. 177-186
-
-
Nagra, J.1
Thomborson, C.2
Collberg, C.3
-
40
-
-
0345421842
-
Tamper Resistant Methods and Apparatus
-
Assignee: Intel Corporation, March 20
-
J. M. Nardone, R. P. Mangold, J. L. Pfotenhauer, K. L. Shippy, D. W. Aucsmith, R. L. Maliszewski, and G. L. Graunke, Tamper Resistant Methods and Apparatus, U.S. Patent 6,205,550, Assignee: Intel Corporation, March 20, 2001.
-
(2001)
U.S. Patent 6,205,550
-
-
Nardone, J.M.1
Mangold, R.P.2
Pfotenhauer, J.L.3
Shippy, K.L.4
Aucsmith, D.W.5
Maliszewski, R.L.6
Graunke, G.L.7
-
41
-
-
0021467937
-
"Storing a Sparse Table with O(1) Worst Case Access Time"
-
(July)
-
M. L. Fredman, J. Komlos, and E. Szemeredi, "Storing a Sparse Table with O(1) Worst Case Access Time," Journal of the ACM 31, No. 3, 538-544 (July 1984).
-
(1984)
Journal of the ACM
, vol.31
, Issue.3
, pp. 538-544
-
-
Fredman, M.L.1
Komlos, J.2
Szemeredi, E.3
-
42
-
-
0008519763
-
"Data Structures"
-
J. van Leeuwen, Editor, MIT Press, Cambridge, MA
-
K. Mehlhorn and A. K. Tsakalidis, "Data Structures," in Handbook of Theoretical Computer Science, Volume A: Algorithms and Complexity (A), J. van Leeuwen, Editor, pp. 301-341, MIT Press, Cambridge, MA (1990).
-
(1990)
Handbook of Theoretical Computer Science, Volume A: Algorithms and Complexity (A)
, pp. 301-341
-
-
Mehlhorn, K.1
Tsakalidis, A.K.2
-
43
-
-
85039353326
-
-
SPEC CPU2000
-
SPEC CPU2000, http://www.spec.org/cpu2000/, 2001.
-
(2001)
-
-
-
44
-
-
84979291225
-
"Broadcast Encryption"
-
Lecture Notes in Computer Science Springer-Verlag Inc., New York
-
A. Fiat and M. Naor, "Broadcast Encryption," in Advances in Cryptology (Crypto 93), Lecture Notes in Computer Science 773, Springer-Verlag Inc., New York (1994), pp. 480-491.
-
(1994)
Advances in Cryptology (Crypto 93)
, vol.773
, pp. 480-491
-
-
Fiat, A.1
Naor, M.2
-
45
-
-
0003978251
-
"Key Management for Multicast: Issues and Architectures"
-
RFC 2627 (informational), The Internet Society (July)
-
D. M. Wallner, E. J. Harder, and R. C. Agee, "Key Management for Multicast: Issues and Architectures," RFC 2627 (informational), The Internet Society (July 1999).
-
(1999)
-
-
Wallner, D.M.1
Harder, E.J.2
Agee, R.C.3
-
46
-
-
0032178082
-
"Secure Group Communications Using Key Graphs"
-
ACM, New York
-
C. K. Wong, M. Gouda, and S. Lam, "Secure Group Communications Using Key Graphs," in Proceedings of the ACM SIGCOMM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, ACM, New York (1998), pp. 68-79.
-
(1998)
Proceedings of the ACM SIGCOMM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication
, pp. 68-79
-
-
Wong, C.K.1
Gouda, M.2
Lam, S.3
-
47
-
-
84880852861
-
"Revocation and Tracing Routines for Stateless Receivers"
-
Lecture Notes in Computer Science Springer-Verlag Inc., New York
-
D. Naor, M. Naor, and J. Lotspiech, "Revocation and Tracing Routines for Stateless Receivers," Advances in Cryptology (Crypto 2001), Lecture Notes in Computer Science 2139, Springer-Verlag Inc., New York (2001), pp. 41-62.
-
(2001)
Advances in Cryptology (Crypto 2001)
, vol.2139
, pp. 41-62
-
-
Naor, D.1
Naor, M.2
Lotspiech, J.3
-
48
-
-
85039343826
-
-
Publications and Current Versions, 4C Entity, Intel Corporation, IBM, Matsushita Electric Industrial Co., Toshiba Corporation
-
Publications and Current Versions, 4C Entity, Intel Corporation, IBM, Matsushita Electric Industrial Co., Toshiba Corporation, http://www.4centity.com/docs/versions.html.
-
-
-
-
49
-
-
0035474385
-
"Protecting Digital Content Within the Home"
-
For additional background, (Oct)
-
For additional background, see C. Brendan and B. Traw, "Protecting Digital Content Within the Home," Computer 34, No. 10, 42-47 (Oct 2001).
-
(2001)
Computer
, vol.34
, Issue.10
, pp. 42-47
-
-
Brendan, C.1
Traw, B.2
-
50
-
-
85039356954
-
"Content Protection for Recordable Media Specification - Network Download Book"
-
Intel, IBM, MEI, Toshiba
-
"Content Protection for Recordable Media Specification - Network Download Book," Intel, IBM, MEI, Toshiba (2004), http://www.4centity.com/licensing/adopter/CPRM-Download-090.pdf.
-
(2004)
-
-
|