-
1
-
-
33846012075
-
-
A. V. Aho, R. Sethi, and J. D. Ullman. Compilers:, Addison-Wesley
-
A. V. Aho, R. Sethi, and J. D. Ullman. Compilers: Principles, Techniques, and Tools. Addison-Wesley, 1986.
-
(1986)
Principles, Techniques, and Tools
-
-
-
2
-
-
79251578513
-
On the (Im)possibility of Obfuscating Programs
-
Proc. CRYPTO '02, Springer-Vorlag, August
-
B. Barak, O. Goldreich, R. Iinpagliazzo, S. Rudich, A. Shai, S. Vadhan, and K. Yang. On the (Im)possibility of Obfuscating Programs. In Proc. CRYPTO '02, LNCS(2139), pp. 1-18, Springer-Vorlag, August 2001.
-
(2001)
LNCS
, vol.2139
, pp. 1-18
-
-
Barak, B.1
Goldreich, O.2
Iinpagliazzo, R.3
Rudich, S.4
Shai, A.5
Vadhan, S.6
Yang, K.7
-
3
-
-
84974588386
-
Timed commitments (extended abstract)
-
Proc. CRYPTO '00, Springer-Verlag, August
-
D. Boneh and M. Naor. Timed commitments (extended abstract). In Proc. CRYPTO '00, LNCS(1880), pp. 236-254., Springer-Verlag, August 2000.
-
(1880)
LNCS
, pp. 236-254
-
-
Boneh, D.1
Naor, M.2
-
4
-
-
0001604533
-
Blind signatures for untraceable payments
-
Plenum Press, New York and London, August
-
D. Chaum. Blind signatures for untraceable payments. In Proc. CRYPTO '82, pp. 199-203. Plenum Press, New York and London, 1983, August 1982.
-
(1982)
Proc. CRYPTO '82
, pp. 199-203
-
-
Chaum, D.1
-
5
-
-
0036704573
-
Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection
-
Aug
-
C. Collberg and C. Thomborson. Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection. IEEE Trans. on Software Engineering, Vol. 28, No. 8, Aug. 2002.
-
(2002)
IEEE Trans. on Software Engineering
, vol.28
, Issue.8
-
-
Collberg, C.1
Thomborson, C.2
-
6
-
-
34247401111
-
-
C. Collberg, C. Thomborson and D. Low. A Taxonomy of Obfuscating Transformations. Technical Report #148, Dept. of Computer Science, University of Auckland, 1997.
-
C. Collberg, C. Thomborson and D. Low. A Taxonomy of Obfuscating Transformations. Technical Report #148, Dept. of Computer Science, University of Auckland, 1997.
-
-
-
-
7
-
-
34247391783
-
-
K. D. Cooper, T. J. Harvey and T. Waterman. Building a Control-Flow Graph from Scheduled. Assembly Code. Technical Report #TR02-399, Rice University, June 2002.
-
K. D. Cooper, T. J. Harvey and T. Waterman. Building a Control-Flow Graph from Scheduled. Assembly Code. Technical Report #TR02-399, Rice University, June 2002.
-
-
-
-
8
-
-
84943235829
-
Pricing via processing or combatting junk mail
-
Proc. CRYPTO '92, Springer-Verlag, August
-
C. Dwork and M. Naor. Pricing via processing or combatting junk mail. In Proc. CRYPTO '92, LNCS(740), pp. 139-147, Springer-Verlag, August 1992.
-
(1992)
LNCS
, vol.740
, pp. 139-147
-
-
Dwork, C.1
Naor, M.2
-
11
-
-
85028170979
-
Establishing the genuinity of remote computer systems
-
R. Kennell and L. Jamieson. Establishing the genuinity of remote computer systems. In 12th USENIX Security Symposium, pp. 295-310, 2003.
-
(2003)
12th USENIX Security Symposium
, pp. 295-310
-
-
Kennell, R.1
Jamieson, L.2
-
14
-
-
0003197918
-
Protecting mobile agents against malicious hosts
-
Mobile Agents and Security, Springer-Verlag
-
T. Sanders and C. Tschudin. Protecting mobile agents against malicious hosts. In Mobile Agents and Security, LNCS(1419), Springer-Verlag, 1998.
-
(1998)
LNCS
, vol.1419
-
-
Sanders, T.1
Tschudin, C.2
-
15
-
-
85084162788
-
-
U. Shankar, M. Chew and J.D. Tygar. Side effects are not sufficient to authenticate software. In In 13th USNIX Security Symposium, pp. 89-101, 2004.
-
U. Shankar, M. Chew and J.D. Tygar. Side effects are not sufficient to authenticate software. In In 13th USNIX Security Symposium, pp. 89-101, 2004.
-
-
-
-
16
-
-
3042738543
-
-
A. Seshadri, A. Perrig, L. van. Doom and P. Khosla, SWATT: SoftWare-Based ATTestation for Embedded Devices. In IEEE Symp. on Security and Privacy, 2004.
-
A. Seshadri, A. Perrig, L. van. Doom and P. Khosla, SWATT: SoftWare-Based ATTestation for Embedded Devices. In IEEE Symp. on Security and Privacy, 2004.
-
-
-
-
18
-
-
34247339956
-
-
Trusted Computing Group TCG
-
Trusted Computing Group (TCG). https://www.trustedcomputinggroup.org/, 2003.
-
(2003)
-
-
|