-
2
-
-
0041513205
-
Watermarking relational data: Framework, algorithms and analysis
-
Aug
-
R. Agrawal, P. Haas, and J. Kiernan. Watermarking relational data: framework, algorithms and analysis. The International Journal on Very Large Data Bases, 12(2), Aug 2003.
-
(2003)
The International Journal on Very Large Data Bases
, vol.12
, Issue.2
-
-
Agrawal, R.1
Haas, P.2
Kiernan, J.3
-
3
-
-
35248834521
-
Natural language watermarking and tamperproofing
-
Fifth Information Hiding Workshop, of
-
M. Atallah, V. Raskin, C. Hempelmann, M. Karahan, R. Sion, K. Triezenberg, and U. Topkara. Natural language watermarking and tamperproofing. In Fifth Information Hiding Workshop, volume 2578 of LNCS, pages 196-212, 2003.
-
(2003)
LNCS
, vol.2578
, pp. 196-212
-
-
Atallah, M.1
Raskin, V.2
Hempelmann, C.3
Karahan, M.4
Sion, R.5
Triezenberg, K.6
Topkara, U.7
-
4
-
-
34547283854
-
Uwstego: A general architecture for software watermarking
-
Technical Report TRO4-11, Aug. 31
-
C. Collberg, S. Jha, D. Tomko, and H. Wang. Uwstego: A general architecture for software watermarking. Technical Report TRO4-11, Aug. 31 2001.
-
(2001)
-
-
Collberg, C.1
Jha, S.2
Tomko, D.3
Wang, H.4
-
6
-
-
0036704573
-
Watermarking, tamper-proofing, and obfuscation - tools for software protection
-
Aug
-
C. Collberg and C. Thomborson. Watermarking, tamper-proofing, and obfuscation - tools for software protection. IEEE Transactions on Software Engineering, 28:735-746, Aug. 2002.
-
(2002)
IEEE Transactions on Software Engineering
, vol.28
, pp. 735-746
-
-
Collberg, C.1
Thomborson, C.2
-
7
-
-
0004046658
-
A taxonomy of obfuscating transformations
-
Tech. Report, No.148, Dept. of Computer Sciences, The University of Auckland
-
C. Collberg, C. Thomborson, and D. Low. A taxonomy of obfuscating transformations. In Tech. Report, No.148, Dept. of Computer Sciences, The University of Auckland, 1997.
-
(1997)
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
8
-
-
0031649930
-
Manufacturing cheap, resilient, and stealthy opaque constructs
-
C. Collberg, C. Thomborson, and D. Low. Manufacturing cheap, resilient, and stealthy opaque constructs. In POPL'98, pages 184-196, 1998.
-
(1998)
POPL'98
, pp. 184-196
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
9
-
-
34547364191
-
-
C. Collberg, C. Thomborson, and D. Low. On the limits of software watermarking. In Technical Report #164, Department of Computer Science, The University of Auckland, 1998.
-
C. Collberg, C. Thomborson, and D. Low. On the limits of software watermarking. In Technical Report #164, Department of Computer Science, The University of Auckland, 1998.
-
-
-
-
10
-
-
34547370890
-
-
D. Graver. The Protection of Computer Software, Its Technology and Applications. Cambridge University Press, 2 edition, 1997
-
D. Graver. The Protection of Computer Software - Its Technology and Applications. Cambridge University Press, 2 edition, 1997.
-
-
-
-
12
-
-
84937438364
-
Provably secure steganography
-
CRYPTO 2002, of
-
N. J. Hopper, J. Langford, and L. von Ahn. Provably secure steganography. In CRYPTO 2002, volume 2442 of LNCS, pages 77-92, 2002.
-
(2002)
LNCS
, vol.2442
, pp. 77-92
-
-
Hopper, N.J.1
Langford, J.2
von Ahn, L.3
-
13
-
-
21844455019
-
Further progress in watermark evaluation testbed (wet)
-
SPIE
-
H. C. Kim, E. T. Lin, O. Guitart, and E. J. Delp. Further progress in watermark evaluation testbed (wet). In Security, Steganography, and Watermarking of Multimedia Contents, volume 5681 of Proceedings of SPIE, pages 241-251. SPIE, 2005.
-
(2005)
Security, Steganography, and Watermarking of Multimedia Contents, volume 5681 of Proceedings of SPIE
, pp. 241-251
-
-
Kim, H.C.1
Lin, E.T.2
Guitart, O.3
Delp, E.J.4
-
14
-
-
34547349397
-
Intelligence and security informatics
-
ISI 2006, of, May
-
S. Mehrotra, D. D. Zeng, H. Chen, B. M. Thuraisingham, and F.-Y. Wang. Intelligence and security informatics. In ISI 2006, volume 3975 of LNCS, May 2006.
-
(2006)
LNCS
, vol.3975
-
-
Mehrotra, S.1
Zeng, D.D.2
Chen, H.3
Thuraisingham, B.M.4
Wang, F.-Y.5
-
15
-
-
79951730606
-
A watermarking method for computer programs (in Japanese)
-
Institute of Electronics, Information and Communication Engineers, Jan
-
A. Monden, H. lida, et al. A watermarking method for computer programs (in Japanese). In Proceedings of the 1998 Symposium on Cryptography and Information Security, SCIS'98. Institute of Electronics, Information and Communication Engineers, Jan. 1998.
-
(1998)
Proceedings of the 1998 Symposium on Cryptography and Information Security, SCIS'98
-
-
Monden, A.1
lida, H.2
-
16
-
-
0037993169
-
Watermarking java programs
-
October
-
A. Monden, H. lida, K. ichi Matsumoto, K. Inoue, and K. Torii. Watermarking java programs. In International Symposium on Future Software-Technology '99, pages 119-124, October 1999.
-
(1999)
International Symposium on Future Software-Technology '99
, pp. 119-124
-
-
Monden, A.1
lida, H.2
ichi Matsumoto, K.3
Inoue, K.4
Torii, K.5
-
17
-
-
0035173458
-
Game-theoretic analysis of watermark detection
-
P. Moulin and A. Ivanovic. Game-theoretic analysis of watermark detection. In ICIP (8), pages 975-978, 2001.
-
(2001)
ICIP
, vol.8
, pp. 975-978
-
-
Moulin, P.1
Ivanovic, A.2
-
21
-
-
24944554182
-
Software watermarking through register allocation: Implementation, analysis, and attacks
-
G. Myles and C. Collberg. Software watermarking through register allocation: Implementation, analysis, and attacks. In LNCS 2971, pages 274-293, 2004.
-
(2004)
LNCS
, vol.2971
, pp. 274-293
-
-
Myles, G.1
Collberg, C.2
-
22
-
-
34547306974
-
Software watermarking via, opaque predicates: Implementation, analysis, and attacks
-
G. Myles and C. Collberg. Software watermarking via, opaque predicates: Implementation, analysis, and attacks. In ICECR-7, 2004.
-
(2004)
ICECR-7
-
-
Myles, G.1
Collberg, C.2
-
23
-
-
33746610961
-
Self-validating branch-based software watermarking
-
IH 2005, of, Springer Verlag
-
G. Myles and H. Jin. Self-validating branch-based software watermarking. In IH 2005, volume 3727 of LNCS, pages 342-356. Springer Verlag, 2005.
-
(2005)
LNCS
, vol.3727
, pp. 342-356
-
-
Myles, G.1
Jin, H.2
-
24
-
-
28844452176
-
Threading software watermarks
-
J. Nagra, and C. Thomborson. Threading software watermarks. In IH'04, 2004.
-
(2004)
IH'04
-
-
Nagra, J.1
Thomborson, C.2
-
25
-
-
24944582622
-
A functional taxonomy for software watermarking
-
M. J. Oudshoorn, editor, Melbourne, Australia, ACS
-
J. Nagra, C. Thomborson, and C. Collberg. A functional taxonomy for software watermarking. In M. J. Oudshoorn, editor, Twenty-Fifth Australasian Computer Science Conference (ACSC2002), Melbourne, Australia, 2002. ACS.
-
(2002)
Twenty-Fifth Australasian Computer Science Conference (ACSC2002)
-
-
Nagra, J.1
Thomborson, C.2
Collberg, C.3
-
27
-
-
84949509764
-
Experience with software watermarking
-
IEEE
-
J. Palsberg, S. Krishnaswamy, K. Minseok, D. Ma, Q. Shao, and Y. Zhang. Experience with software watermarking. In ACSAC '00, pages 308-316. IEEE, 2000.
-
(2000)
ACSAC '00
, pp. 308-316
-
-
Palsberg, J.1
Krishnaswamy, S.2
Minseok, K.3
Ma, D.4
Shao, Q.5
Zhang, Y.6
-
28
-
-
34547358551
-
Copyright protection of object-oriented softwares
-
ICICS 2001, of
-
J. Pastuszak, D. Michalek, and J. Pieprzyk. Copyright protection of object-oriented softwares. In ICICS 2001, volume 2288 of LNCS, pages 186-199, 2002.
-
(2002)
LNCS
, vol.2288
, pp. 186-199
-
-
Pastuszak, J.1
Michalek, D.2
Pieprzyk, J.3
-
29
-
-
84948127739
-
Fingerprints for copyright software protection
-
M. Mambo and Y. Zheng, editors, Germany, Springer
-
J. Pieprzyk. Fingerprints for copyright software protection. In M. Mambo and Y. Zheng, editors, Proceedings of the Second International Workshop on Information Security, ISW'99 (LNCS 1729), pages 178-190, Germany, 1999. Springer.
-
(1999)
Proceedings of the Second International Workshop on Information Security, ISW'99 (LNCS 1729)
, pp. 178-190
-
-
Pieprzyk, J.1
-
31
-
-
1142307016
-
Hiding signatures in graph coloring solutions
-
G. Qu and M. Potkonjak. Hiding signatures in graph coloring solutions. In Information Hiding Workshop '99, pages 348-367, 1999.
-
(1999)
Information Hiding Workshop '99
, pp. 348-367
-
-
Qu, G.1
Potkonjak, M.2
-
32
-
-
2442618084
-
-
R. Sion, M. J. Atallah, and S. Prabhakar. wmdb.: Rights protection for numeric relational data. In ICDE, page 863. IEEE Computer Society, 2004.
-
R. Sion, M. J. Atallah, and S. Prabhakar. wmdb.: Rights protection for numeric relational data. In ICDE, page 863. IEEE Computer Society, 2004.
-
-
-
-
33
-
-
22944484464
-
Rights protection for categorical data
-
R. Sion, M. J. Atallah, and S. Prabhakar. Rights protection for categorical data. IEEE Trans. Knowl. Data Eng., 17(7):912-926, 2005.
-
(2005)
IEEE Trans. Knowl. Data Eng
, vol.17
, Issue.7
, pp. 912-926
-
-
Sion, R.1
Atallah, M.J.2
Prabhakar, S.3
-
34
-
-
10944220833
-
Rights protection for relational data
-
R. Sion, M. J. Atallah, and S. Prabhakar. Rights protection for relational data. IEEE Trans. Knowl. Data Eng., 16(12):1509-1525, 2005.
-
(2005)
IEEE Trans. Knowl. Data Eng
, vol.16
, Issue.12
, pp. 1509-1525
-
-
Sion, R.1
Atallah, M.J.2
Prabhakar, S.3
-
35
-
-
84947921326
-
Robust object watermarking: Application to code
-
J. Stern, G. Hachez, F. Koeune, and J.-J. Quisquater. Robust object watermarking: Application to code. In Information Hiding Workshop '99, pages 368-378, 1999.
-
(1999)
Information Hiding Workshop '99
, pp. 368-378
-
-
Stern, J.1
Hachez, G.2
Koeune, F.3
Quisquater, J.-J.4
-
37
-
-
21844446383
-
Natural language watermarking
-
SPIE
-
M. Topkara, C. M. Taskiran, and E. J. Delp. Natural language watermarking. In Security, Steganography, and Watermarking of Multimedia Contents, volume 5681 of Proceedings of SPIE, pages 441-452. SPIE, 2005.
-
(2005)
Security, Steganography, and Watermarking of Multimedia Contents, volume 5681 of Proceedings of SPIE
, pp. 441-452
-
-
Topkara, M.1
Taskiran, C.M.2
Delp, E.J.3
-
39
-
-
33746054154
-
Algorithms to watermark software through register allocation
-
DRMTICS 2005, of, October
-
W. Zhu and C. Thomborson. Algorithms to watermark software through register allocation. In DRMTICS 2005, volume 3919 of LNCS, pages 180-191, October 2005.
-
(2005)
LNCS
, vol.3919
, pp. 180-191
-
-
Zhu, W.1
Thomborson, C.2
-
40
-
-
24944512730
-
On the QP algorithm in software watermarking
-
IEEE ISI 2005, of, May
-
W. Zhu and C. Thomborson. On the QP algorithm in software watermarking. In IEEE ISI 2005, volume 3495 of LNCS, pages 646-647, May 2005.
-
(2005)
LNCS
, vol.3495
, pp. 646-647
-
-
Zhu, W.1
Thomborson, C.2
-
41
-
-
33745800075
-
A provable scheme for homomorphic obfuscationin in software security
-
Phoenix, USA, Nov
-
W. Zhu and C. Thomborson. A provable scheme for homomorphic obfuscationin in software security. In The IASTED International Conference on Communication. Network and Information Security, CNIS'05, pages 208-212, Phoenix, USA, Nov 2005.
-
(2005)
The IASTED International Conference on Communication. Network and Information Security, CNIS'05
, pp. 208-212
-
-
Zhu, W.1
Thomborson, C.2
-
42
-
-
24944463250
-
A survey of software watermarking
-
IEEE ISI 2005, of, May
-
W. Zhu, C. Thomborson, and F.-Y. Wang. A survey of software watermarking. In IEEE ISI 2005, volume 3495 of LNCS, pages 454-458, May 2005.
-
(2005)
LNCS
, vol.3495
, pp. 454-458
-
-
Zhu, W.1
Thomborson, C.2
Wang, F.-Y.3
-
43
-
-
33745796000
-
Application of homomorphic function to software obfuscation
-
WISI 2006, of, April
-
W. Zhu, C. Thomborson, and F.-Y. Wang. Application of homomorphic function to software obfuscation. In WISI 2006, volume 3917 of LNCS, pages 152-153, April 2006.
-
(2006)
LNCS
, vol.3917
, pp. 152-153
-
-
Zhu, W.1
Thomborson, C.2
Wang, F.-Y.3
-
44
-
-
33750917395
-
Obfuscate arrays by homomorphic functions
-
May
-
W. Zhu, C. Thomborson, and F.-Y. Wang. Obfuscate arrays by homomorphic functions. In Special Session on Data Security and Privacy in IEEE GrC 2006, to appear, pages 770-773, May 2006.
-
(2006)
Special Session on Data Security and Privacy in IEEE GrC 2006, to appear
, pp. 770-773
-
-
Zhu, W.1
Thomborson, C.2
Wang, F.-Y.3
-
45
-
-
33745884975
-
Covering based granular computing for conflict analysis
-
IEEE ISI 2006, of
-
W. Zhu and F.-Y. Wang. Covering based granular computing for conflict analysis. In IEEE ISI 2006, volume 3975 of LNCS, pages 566-571, 2006.
-
(2006)
LNCS
, vol.3975
, pp. 566-571
-
-
Zhu, W.1
Wang, F.-Y.2
-
46
-
-
34547374329
-
Extraction in software watermarking
-
to appear in, September, Geneva, Switzerland
-
W. Zhu and C. Thomborson. Extraction in software watermarking. In to appear in A CM Multimedia and Security Workshop, 26-27, September, 2006, Geneva, Switzerland, 2006.
-
(2006)
A CM Multimedia and Security Workshop
, pp. 26-27
-
-
Zhu, W.1
Thomborson, C.2
|