-
2
-
-
35048846840
-
-
Sandmark
-
Sandmark, http://www.cs.arizona.edu/sandmark/.
-
-
-
-
4
-
-
35048837838
-
-
Zelix klassmaster
-
Zelix klassmaster. http://www.zelix.com/klassmaster/index.html.
-
-
-
-
6
-
-
0032070303
-
On the limits of steganography
-
May Special issue on copyright & privacy protection
-
Ross J. Anderson and Fabien A. P. Petitcolas. On the limits of steganography. IEEE Journal of Selected Areas in Communications, 16(4):474-481, May 1998. Special issue on copyright & privacy protection.
-
(1998)
IEEE Journal of Selected Areas in Communications
, vol.16
, Issue.4
, pp. 474-481
-
-
Anderson, R.J.1
Petitcolas, F.A.P.2
-
9
-
-
8344263880
-
Dynamic path-based software watermarking
-
C. Collberg, E. Carter, S. Debray, A. Huntwork, C. Linn, and M. Stepp. Dynamic path-based software watermarking. In ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 04), 2004.
-
(2004)
ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 04)
-
-
Collberg, C.1
Carter, E.2
Debray, S.3
Huntwork, A.4
Linn, C.5
Stepp, M.6
-
12
-
-
0004046658
-
A taxonomy of obfuscating transformations
-
Department of Computer Science, University of Auckland, July
-
Christian Collberg, Clark Thomborson, and Douglas Low. A taxonomy of obfuscating transformations. Technical Report 148, Department of Computer Science, University of Auckland, July 1997.
-
(1997)
Technical Report 148
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
13
-
-
0031649930
-
Manufacturing cheap, resilient, and stealthy opaque constructs
-
San Diego, CA, January
-
Christian Collberg, Clark Thomborson, and Douglas Low. Manufacturing cheap, resilient, and stealthy opaque constructs. In Principles of Programming Languages 1998, POPL'98, San Diego, CA, January 1998.
-
(1998)
Principles of Programming Languages 1998, POPL'98
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
17
-
-
0034504466
-
A practical method for watermarking Java programs
-
A. Monden, H. lida, K. Matsumoto, Katsuro Inoue, and Koji Torii. A practical method for watermarking Java programs. In compsac2000, 24th Computer Software and Applications Conference, 2000.
-
(2000)
Compsac2000, 24th Computer Software and Applications Conference
-
-
Monden, A.1
Lida, H.2
Matsumoto, K.3
Inoue, K.4
Torii, K.5
-
18
-
-
0000523223
-
Compression and explanation using hierarchical grammars
-
C. G. Nevill-Manning and I. H. Witten. Compression and explanation using hierarchical grammars. The Computer Journal, 40(2/3), 1997.
-
(1997)
The Computer Journal
, vol.40
, Issue.2-3
-
-
Nevill-Manning, C.G.1
Witten, I.H.2
-
20
-
-
84947933018
-
Hiding signatures in graph coloring solutions
-
Gang Qu and Miodrag Potkonjak. Hiding signatures in graph coloring solutions. In Information Hiding, pages 348-367, 1999.
-
(1999)
Information Hiding
, pp. 348-367
-
-
Qu, G.1
Potkonjak, M.2
-
22
-
-
84947921326
-
Robust object watermarking: Application to code
-
Julien P. Stern, Gael Hachez, Francois Koeune, and Jean-Jacques Quisquater. Robust object watermarking: Application to code. In Information Hiding, pages 368-378, 1999. http://citeseer.nj.nec.com/stern00robust.html.
-
(1999)
Information Hiding
, pp. 368-378
-
-
Stern, J.P.1
Hachez, G.2
Koeune, F.3
Quisquater, J.-J.4
-
23
-
-
33644511880
-
Detecting the theft of programs using birthmarks
-
Graduate School of Information Science, Nara Institute of Science and Technology, Nov
-
Haruaki Tamada, Masahide Nakamura, Akito Monden, and Kenichi Matsumoto. Detecting the theft of programs using birthmarks. Information Science Technical Report NAIST-IS-TR2003014 ISSN 0919-9527, Graduate School of Information Science, Nara Institute of Science and Technology, Nov 2003.
-
(2003)
Information Science Technical Report NAIST-IS-TR2003014 ISSN 0919-9527
-
-
Tamada, H.1
Nakamura, M.2
Monden, A.3
Matsumoto, K.4
-
24
-
-
26444481301
-
Design and evaluation of birthmarks for detecting theft of Java programs
-
Feb
-
Haruaki Tamada, Masahide Nakamura, Akito Monden, and Kenichi Matsumoto. Design and evaluation of birthmarks for detecting theft of Java programs. In Proc. IASTED International Conference, on Software Engineering (IASTED SE 2004), pages 569-575, Feb 2004.
-
(2004)
Proc. IASTED International Conference, on Software Engineering (IASTED SE 2004)
, pp. 569-575
-
-
Tamada, H.1
Nakamura, M.2
Monden, A.3
Matsumoto, K.4
-
25
-
-
4544234052
-
A graph theoretic approach to software watermarking
-
Pittsburgh, PA, April
-
Ramarathnam Venkatesan, Vijay Vazirani, and Saurabh Sinha. A graph theoretic approach to software watermarking. In 4th International Information Hiding Workshop, Pittsburgh, PA, April 2001.
-
(2001)
4th International Information Hiding Workshop
-
-
Venkatesan, R.1
Vazirani, V.2
Sinha, S.3
-
26
-
-
0025417991
-
Identification of program similarity in large populations
-
Geoff Whale. Identification of program similarity in large populations. Computer Journal, 33:140-146, 1990.
-
(1990)
Computer Journal
, vol.33
, pp. 140-146
-
-
Whale, G.1
-
27
-
-
0026826629
-
Detection of similarities in student programs: Yap'ing may be preferable to plague'ing
-
Micheal J. Wise. Detection of similarities in student programs: Yap'ing may be preferable to plague'ing. In 23rd SIGCSE Technical Symposium, pages 268-271, 1992.
-
(1992)
23rd SIGCSE Technical Symposium
, pp. 268-271
-
-
Wise, M.J.1
|