메뉴 건너뛰기




Volumn 45, Issue 1, 2006, Pages 119-143

Content protection for games

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME; CRYPTOGRAPHY; DIGITAL WATERMARKING; SOFTWARE ENGINEERING;

EID: 33646545653     PISSN: 00188670     EISSN: 00188670     Source Type: Journal    
DOI: 10.1147/sj.451.0119     Document Type: Review
Times cited : (10)

References (50)
  • 1
    • 85039344955 scopus 로고    scopus 로고
    • "Computer and Video Game Software Sales Reach Record $7.3 Billion in 2004"
    • (Jan.)
    • "Computer and Video Game Software Sales Reach Record $7.3 Billion in 2004," Entertainment Software Association (ESA) (Jan. 2005), http://www.theesa.com/archives/2005/02/computer_and_vi.php.
    • (2005) Entertainment Software Association (ESA)
  • 2
    • 85039351338 scopus 로고    scopus 로고
    • "2005 Special 301 Report on Global Copyright Protection and Enforcement"
    • (Feb. 10)
    • "2005 Special 301 Report on Global Copyright Protection and Enforcement," International Intellectual Property Alliance (IIPA) (Feb. 10, 2005), http://www.iipa.com/special301.html.
    • (2005) International Intellectual Property Alliance (IIPA)
  • 3
    • 33746610961 scopus 로고    scopus 로고
    • "Self-Validating Branch-Based Software Watermarking"
    • Lecture Notes in Computer Science Springer-Verlag Inc., New York
    • G. Myles and H. Jin, "Self-Validating Branch-Based Software Watermarking," in Information Hiding, 7th International Workshop, Lecture Notes in Computer Science 3727, Springer-Verlag Inc., New York (2005), pp. 342-356.
    • (2005) Information Hiding, 7th International Workshop , vol.3727 , pp. 342-356
    • Myles, G.1    Jin, H.2
  • 4
    • 0021494484 scopus 로고
    • "Hardware Protection Against Software Piracy"
    • T. Maude and D. Maude, "Hardware Protection Against Software Piracy," Communications of the ACM 27 (9), 950-959, 1984.
    • (1984) Communications of the ACM , vol.27 , Issue.9 , pp. 950-959
    • Maude, T.1    Maude, D.2
  • 6
    • 85039353362 scopus 로고    scopus 로고
    • Trusted Computing Group Home, Trusted Computing Group
    • Trusted Computing Group Home, Trusted Computing Group, http://www.trustedcomputinggroup.org/home.
  • 7
    • 85039343136 scopus 로고    scopus 로고
    • "More on Xbox Live Bans"
    • Joystiq, Weblogs Inc., (November 14)
    • S. Parsons, "More on Xbox Live Bans," Joystiq, Weblogs Inc., (November 14, 2004), http://www.joystiq.com/entry/6673569691391113/.
    • (2004)
    • Parsons, S.1
  • 8
    • 0012065211 scopus 로고
    • "Operating System Protection through Program Evolution"
    • F. B. Cohen, "Operating System Protection through Program Evolution," http://all.net/books/IP/evolve.html, 1992.
    • (1992)
    • Cohen, F.B.1
  • 10
    • 0004046658 scopus 로고    scopus 로고
    • "A Taxonomy of Obfuscation Transformations"
    • Technical Report 148, Department of Computer Science, University of Auckland (July)
    • C. Collberg, C. Thomborson, and D. Low, "A Taxonomy of Obfuscation Transformations," Technical Report 148, Department of Computer Science, University of Auckland (July 1997).
    • (1997)
    • Collberg, C.1    Thomborson, C.2    Low, D.3
  • 13
    • 0001943763 scopus 로고    scopus 로고
    • "Time Limited Blackbox Security: Protecting Mobile Agents from Malicious Hosts"
    • Lecture Notes in Computer Science Springer-Verlag Inc., New York
    • F. Hohl, "Time Limited Blackbox Security: Protecting Mobile Agents from Malicious Hosts," Mobile Agents and Security, Lecture Notes in Computer Science 1419, Springer-Verlag Inc., New York (1998), pp. 92-113.
    • (1998) Mobile Agents and Security , vol.1419 , pp. 92-113
    • Hohl, F.1
  • 14
    • 0004172766 scopus 로고    scopus 로고
    • "A Security Architecture for Survivability Mechanisms"
    • Ph.D. Thesis, University of Virginia, School of Engineering and Applied Science (Oct)
    • C. Wang, "A Security Architecture for Survivability Mechanisms," Ph.D. Thesis, University of Virginia, School of Engineering and Applied Science (Oct 2000).
    • (2000)
    • Wang, C.1
  • 15
    • 0012037951 scopus 로고    scopus 로고
    • "Software Tamper Resistance: Obstructing Static Analysis of Programs"
    • Technical Report CS-2000-12, University of Virginia, Dec
    • C. Wang, J. Hill, J. C. Knight, and J. W. Davidson, "Software Tamper Resistance: Obstructing Static Analysis of Programs," Technical Report CS-2000-12, University of Virginia, Dec. 2000.
    • (2000)
    • Wang, C.1    Hill, J.2    Knight, J.C.3    Davidson, J.W.4
  • 18
    • 84955621400 scopus 로고    scopus 로고
    • "Tamper Resistant Software; An Implementation"
    • Lecture Notes in Computer Science Springer-Verlag Inc., New York
    • D. Aucsmith, "Tamper Resistant Software; An Implementation," in Information Hiding, First International Workshop, Lecture Notes in Computer Science 1174, Springer-Verlag Inc., New York (1996), pp. 317-333.
    • (1996) Information Hiding, First International Workshop , vol.1174 , pp. 317-333
    • Aucsmith, D.1
  • 19
    • 0003197918 scopus 로고    scopus 로고
    • "Protecting Mobile Agents Against Malicious Hosts"
    • Notes in Computer Science Springer-Verlag Inc., New York
    • T. Sander and C. F. Tschudin, "Protecting Mobile Agents Against Malicious Hosts," Mobile Agents and Security, Lecture Notes in Computer Science 1419, Springer-Verlag Inc., New York (1998), pp. 44-60.
    • (1998) Mobile Agents and Security Lecture , vol.1419 , pp. 44-60
    • Sander, T.1    Tschudin, C.F.2
  • 20
    • 33646580509 scopus 로고    scopus 로고
    • Tamper Resistant Methods and Apparatus
    • Assignee: Intel Corporation
    • D. Aucsmith and G. Graunke, Tamper Resistant Methods and Apparatus, U.S. Patent 5,892,899, Assignee: Intel Corporation, 1999.
    • (1999) U.S. Patent 5,892,899
    • Aucsmith, D.1    Graunke, G.2
  • 23
    • 0036704573 scopus 로고    scopus 로고
    • "Watermarking, Tamper-Proofing, and Obfuscation - Tools for Software Protection"
    • August
    • C. Collberg and C. Thomborson, "Watermarking, Tamper-Proofing, and Obfuscation - Tools for Software Protection," IEEE Transactions on Software Engineering 28, No. 8, 735-746, August, 2002.
    • (2002) IEEE Transactions on Software Engineering , vol.28 , Issue.8 , pp. 735-746
    • Collberg, C.1    Thomborson, C.2
  • 24
    • 85039360005 scopus 로고    scopus 로고
    • Steam
    • Steam, http://www.steampowered.com.
  • 25
    • 0010902349 scopus 로고
    • "Program Identification"
    • The British Computer Society Monographs in Informatics, Cambridge University Press, Second Edition
    • D. Grover, "Program Identification," The Protection of Computer Software: Its Technology and Applications, The British Computer Society Monographs in Informatics, Cambridge University Press, Second Edition, 1992.
    • (1992) The Protection of Computer Software: Its Technology and Applications
    • Grover, D.1
  • 26
    • 0012069651 scopus 로고
    • Computer Software Protection
    • Assignee: International Business Machines Corporation, Feb
    • K. Holmes, Computer Software Protection, U.S. Patent 5,287,407, Assignee: International Business Machines Corporation, Feb. 1994.
    • (1994) U.S. Patent 5,287,407
    • Holmes, K.1
  • 28
    • 0012099867 scopus 로고    scopus 로고
    • Method for Stega-Cipher Protection of Computer Code
    • Assignee: The Dice Company, Jan
    • S. A. Moszowitz and M. Cooperman, Method for Stega-Cipher Protection of Computer Code, U.S. Patent 5,745,569, Assignee: The Dice Company, Jan. 1996.
    • (1996) U.S. Patent 5,745,569
    • Moszowitz, S.A.1    Cooperman, M.2
  • 29
    • 33645785768 scopus 로고    scopus 로고
    • Method and System for Generating and Auditing a Signature for a Computer Program
    • Assignee: Microsoft Corporation, Sept
    • R. L. Davidson and N. Myhrvold, Method and System for Generating and Auditing a Signature for a Computer Program, U.S. Patent 5,559,884, Assignee: Microsoft Corporation, Sept 1996.
    • (1996) U.S. Patent 5,559,884
    • Davidson, R.L.1    Myhrvold, N.2
  • 31
    • 84947933018 scopus 로고    scopus 로고
    • "Hiding Signatures in Graph Coloring Solutions"
    • Lecture Notes in Computer Science Springer-Verlag Inc., New York
    • G. Qu and M. Potkonjak, "Hiding Signatures in Graph Coloring Solutions," in Information Hiding, Third International Workshop, Lecture Notes in Computer Science 1768, Springer-Verlag Inc., New York (1999), pp. 348-367.
    • (1999) Information Hiding, Third International Workshop , vol.1768 , pp. 348-367
    • Qu, G.1    Potkonjak, M.2
  • 32
    • 84947921326 scopus 로고    scopus 로고
    • "Robust Object Watermarking: Application to Code"
    • Lecture Notes in Computer Science Springer-Verlag Inc., New York
    • J. P. Stern, G. Hachez, F. Koeune, and J. J. Quisquater, "Robust Object Watermarking: Application to Code," Information Hiding, 3rd International Workshop, Lecture Notes in Computer Science 1768, Springer-Verlag Inc., New York (1999), pp. 368-378.
    • (1999) Information Hiding, 3rd International Workshop , vol.1768 , pp. 368-378
    • Stern, J.P.1    Hachez, G.2    Koeune, F.3    Quisquater, J.J.4
  • 34
    • 84947285817 scopus 로고    scopus 로고
    • "A Graph Theoretic Approach to Software Watermarking"
    • Lecture Notes in Computer Science Springer-Verlag Inc., New York
    • R. Venkatesan, V. Vazirani, and S. Sinha, "A Graph Theoretic Approach to Software Watermarking," Information Hiding, 4th International Workshop, Lecture Notes in Computer Science 2127, Springer-Verlag Inc., New York (2001), pp. 157-168.
    • (2001) Information Hiding, 4th International Workshop , vol.2127 , pp. 157-168
    • Venkatesan, R.1    Vazirani, V.2    Sinha, S.3
  • 38
    • 35048884150 scopus 로고    scopus 로고
    • "Threading Software Watermarks"
    • Lecture Notes in Computer Science Springer-Verlag Inc., New York
    • J. Nagra and C. Thomborson, "Threading Software Watermarks," Information Hiding, 6th International Workshop, Lecture Notes in Computer Science 3200, Springer-Verlag Inc., New York (2004), pp. 208-233.
    • (2004) Information Hiding, 6th International Workshop , vol.3200 , pp. 208-233
    • Nagra, J.1    Thomborson, C.2
  • 41
    • 0021467937 scopus 로고
    • "Storing a Sparse Table with O(1) Worst Case Access Time"
    • (July)
    • M. L. Fredman, J. Komlos, and E. Szemeredi, "Storing a Sparse Table with O(1) Worst Case Access Time," Journal of the ACM 31, No. 3, 538-544 (July 1984).
    • (1984) Journal of the ACM , vol.31 , Issue.3 , pp. 538-544
    • Fredman, M.L.1    Komlos, J.2    Szemeredi, E.3
  • 43
    • 85039353326 scopus 로고    scopus 로고
    • SPEC CPU2000
    • SPEC CPU2000, http://www.spec.org/cpu2000/, 2001.
    • (2001)
  • 44
    • 84979291225 scopus 로고
    • "Broadcast Encryption"
    • Lecture Notes in Computer Science Springer-Verlag Inc., New York
    • A. Fiat and M. Naor, "Broadcast Encryption," in Advances in Cryptology (Crypto 93), Lecture Notes in Computer Science 773, Springer-Verlag Inc., New York (1994), pp. 480-491.
    • (1994) Advances in Cryptology (Crypto 93) , vol.773 , pp. 480-491
    • Fiat, A.1    Naor, M.2
  • 45
    • 0003978251 scopus 로고    scopus 로고
    • "Key Management for Multicast: Issues and Architectures"
    • RFC 2627 (informational), The Internet Society (July)
    • D. M. Wallner, E. J. Harder, and R. C. Agee, "Key Management for Multicast: Issues and Architectures," RFC 2627 (informational), The Internet Society (July 1999).
    • (1999)
    • Wallner, D.M.1    Harder, E.J.2    Agee, R.C.3
  • 47
    • 84880852861 scopus 로고    scopus 로고
    • "Revocation and Tracing Routines for Stateless Receivers"
    • Lecture Notes in Computer Science Springer-Verlag Inc., New York
    • D. Naor, M. Naor, and J. Lotspiech, "Revocation and Tracing Routines for Stateless Receivers," Advances in Cryptology (Crypto 2001), Lecture Notes in Computer Science 2139, Springer-Verlag Inc., New York (2001), pp. 41-62.
    • (2001) Advances in Cryptology (Crypto 2001) , vol.2139 , pp. 41-62
    • Naor, D.1    Naor, M.2    Lotspiech, J.3
  • 48
    • 85039343826 scopus 로고    scopus 로고
    • Publications and Current Versions, 4C Entity, Intel Corporation, IBM, Matsushita Electric Industrial Co., Toshiba Corporation
    • Publications and Current Versions, 4C Entity, Intel Corporation, IBM, Matsushita Electric Industrial Co., Toshiba Corporation, http://www.4centity.com/docs/versions.html.
  • 49
    • 0035474385 scopus 로고    scopus 로고
    • "Protecting Digital Content Within the Home"
    • For additional background, (Oct)
    • For additional background, see C. Brendan and B. Traw, "Protecting Digital Content Within the Home," Computer 34, No. 10, 42-47 (Oct 2001).
    • (2001) Computer , vol.34 , Issue.10 , pp. 42-47
    • Brendan, C.1    Traw, B.2
  • 50
    • 85039356954 scopus 로고    scopus 로고
    • "Content Protection for Recordable Media Specification - Network Download Book"
    • Intel, IBM, MEI, Toshiba
    • "Content Protection for Recordable Media Specification - Network Download Book," Intel, IBM, MEI, Toshiba (2004), http://www.4centity.com/licensing/adopter/CPRM-Download-090.pdf.
    • (2004)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.