-
1
-
-
3042825654
-
Software Protection- Security's Last Stand
-
January/February
-
M.R. Stytz, J. A. Whittaker, "Software Protection- Security's Last Stand", IEEE Security and Privacy, January/February 2003, pp. 95-98.
-
(2003)
IEEE Security and Privacy
, pp. 95-98
-
-
Stytz, M.R.1
Whittaker, J.A.2
-
3
-
-
2342591623
-
Software Security for open source systems
-
February
-
C. Cowan, "Software Security for open source systems", IEEE Security & Privacy, February 2003
-
(2003)
IEEE Security & Privacy
-
-
Cowan, C.1
-
4
-
-
2342563769
-
Considering Defense in Depth for Software Applications
-
February
-
M.R Stytz, "Considering Defense in Depth for Software Applications", IEEE Security & Privacy, February 2004.
-
(2004)
IEEE Security & Privacy
-
-
Stytz, M.R.1
-
5
-
-
3042738504
-
Why Secure Applications are difficult to write
-
April
-
J.Whittaker, "Why Secure Applications are difficult to write", IEEE Security & Privacy, April 2003
-
(2003)
IEEE Security & Privacy
-
-
Whittaker, J.1
-
6
-
-
41149171445
-
-
Alliance
-
Business Software Alliance http://global.bsa.org/usa/press/newsreleases/ 2002-06-10.1129.phtml?CFID=4661&CFTOKEN=73044918
-
Business Software
-
-
-
8
-
-
0041916251
-
Watermarking, Tamper Proofing and Obfuscation - Tools for Software Protection
-
Technical Report, February
-
C.Collberg, C.Thomborson, "Watermarking, Tamper Proofing and Obfuscation - Tools for Software Protection", Technical Report, February 2000-03.
-
(2003)
-
-
Collberg, C.1
Thomborson, C.2
-
9
-
-
11144220098
-
Encryption, hashing, & obfuscation
-
April
-
P. Tyma, "Encryption, hashing, & obfuscation", ZD Net April 2003
-
(2003)
ZD Net
-
-
Tyma, P.1
-
11
-
-
0006604914
-
Java Control Flow Obfuscation
-
Thesis Report University of Auckland, June 3
-
D. Low, "Java Control Flow Obfuscation", Thesis Report University of Auckland, June 3 1998
-
(1998)
-
-
Low, D.1
-
12
-
-
11144229255
-
General Method of Program Code Obfuscation
-
PhD Dissertation, Wroclaw University of Technology, Institute of Engineering Cybernetics
-
G.Wrobliwski, "General Method of Program Code Obfuscation", PhD Dissertation, Wroclaw University of Technology, Institute of Engineering Cybernetics, 2002
-
(2002)
-
-
Wrobliwski, G.1
-
15
-
-
84860066696
-
-
Jobfuscator http://download.com.com/3000-2417-10205637.html
-
Jobfuscator
-
-
-
18
-
-
60749124246
-
Conquering calculus the easy road to understanding mathematics
-
W. J. Hane, "Conquering calculus the easy road to understanding mathematics", Peruses publishing, 1998
-
(1998)
Peruses publishing
-
-
Hane, W.J.1
-
19
-
-
60749113189
-
Teaching mathematics and its applications
-
Dec
-
K Ming Teo, "Teaching mathematics and its applications", International Journal of the IMA, Volume 21 Issue 4, Dec 2002
-
(2002)
International Journal of the IMA
, vol.21
, Issue.4
-
-
Ming Teo, K.1
-
20
-
-
60749118396
-
Advanced Calculus a Friendly Approach
-
W.A.J. Kosmala, "Advanced Calculus a Friendly Approach", Prentice Hall, 1998
-
(1998)
Prentice Hall
-
-
Kosmala, W.A.J.1
-
21
-
-
1242304439
-
Protecting Java Code via Code Obfuscation
-
Spring
-
D. Low, "Protecting Java Code via Code Obfuscation", ACM Crossroads Student Magazine, Spring 1998
-
(1998)
ACM Crossroads Student Magazine
-
-
Low, D.1
-
22
-
-
0003482564
-
Information Hiding Techniques for Steganography and Digital Watermarking
-
Artech House
-
S. Katzenbeisser, "Information Hiding Techniques for Steganography and Digital Watermarking", Boston Artech House, 2000
-
(2000)
Boston
-
-
Katzenbeisser, S.1
-
23
-
-
0004046658
-
Taxonomy of Obfuscation Transformations
-
Technical Report #148, July
-
C. Collberg, C. Thomborson and D. Low, "Taxonomy of Obfuscation Transformations", Technical Report #148, July 1997
-
(1997)
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
24
-
-
60749107016
-
Cryptography and Data Security Lecture notes
-
Department of Computer Science
-
L. Ertaul, "Cryptography and Data Security Lecture notes", CSU-Hayward Department of Computer Science, http://www.mcs.csuhayward. edu/~lertaul/CS6520CourseWI NTER2005.html
-
CSU-Hayward
-
-
Ertaul, L.1
-
25
-
-
60749113479
-
Making, Breaking Codes: An Introduction to Cryptology
-
Upper Saddle River, NJ
-
P. Garrett, "Making, Breaking Codes: An Introduction to Cryptology", Prentice Hall, Upper Saddle River, NJ, 2001
-
(2001)
Prentice Hall
-
-
Garrett, P.1
-
26
-
-
60749109014
-
Self-Protecting Mobile Agents obfuscation
-
01-036, November
-
L Badger, L Anna, D Kilpatrick, B Matt, A Reisse and T Vleck, "Self-Protecting Mobile Agents obfuscation", NAI Labs Report #01-036, November 2001
-
(2001)
NAI Labs Report
-
-
Badger, L.1
Anna, L.2
Kilpatrick, D.3
Matt, B.4
Reisse, A.5
Vleck, T.6
-
27
-
-
0034828870
-
Cryptographic security for mobile code
-
May
-
J. Algesheimer, C. Cachin, J. Camenisch, and G. Karjoth., "Cryptographic security for mobile code", IEEE Symposium on Security and Privacy, May 2001, pp. 2-11.
-
(2001)
IEEE Symposium on Security and Privacy
, pp. 2-11
-
-
Algesheimer, J.1
Cachin, C.2
Camenisch, J.3
Karjoth, G.4
-
28
-
-
60749100447
-
Manufacturing Cheap, Resilient, and Stealthy Opaque Constructs
-
May
-
C. Collberg, J. Thomborson, and D. Low, "Manufacturing Cheap, Resilient, and Stealthy Opaque Constructs", IEEE International Conference on Computer Languages, May 1998.
-
(1998)
IEEE International Conference on Computer Languages
-
-
Collberg, C.1
Thomborson, J.2
Low, D.3
-
29
-
-
85176685655
-
-
C. Collberg, P. Clark, Breaking abstractions and structuring data structures, IEEE Computer Language ICCL'98
-
C. Collberg, P. Clark, "Breaking abstractions and structuring data structures", IEEE Computer Language ICCL'98
-
-
-
-
30
-
-
10944251971
-
Data Obfuscation: Providing Anonymity and Desensitization of Usable Data Sets
-
Nov/Dec
-
D. E. Bakken, A. A. Franz, T. J. Palmer, R. Paramesvaran, D. M. Blough, "Data Obfuscation: Providing Anonymity and Desensitization of Usable Data Sets", IEEE Security & Privacy, Vol:2, No:6, Nov/Dec, 2004.
-
(2004)
IEEE Security & Privacy
, vol.2
, Issue.6
-
-
Bakken, D.E.1
Franz, A.A.2
Palmer, T.J.3
Paramesvaran, R.4
Blough, D.M.5
|