-
1
-
-
35048889482
-
-
Ross J. Anderson, editor. Cambridge, U.K. May Springer-Verlag. Lecture Notes in Computer Science
-
Ross J. Anderson, editor. Tamper Resistant Software: An Implementation, Cambridge, U.K. May 1996. Springer-Verlag. Lecture Notes in Computer Science, Vol. 1174.
-
(1996)
Tamper Resistant Software: An Implementation
, vol.1174
-
-
-
3
-
-
0004046658
-
A taxonomy of obfuscating transformations
-
Department of Computer Science, University of Auckland, July
-
Christian Collberg, Clark Thomborson, and Douglas Low. A taxonomy of obfuscating transformations. Technical Report 148, Department of Computer Science, University of Auckland, July 1997.
-
(1997)
Technical Report 148
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
4
-
-
0031649930
-
Manufacturing cheap, resilient, and stealthy opaque constructs. in
-
San Diego, CA (USA), January
-
Christian Collberg, Clark Thomborson, and Douglas Low. Manufacturing cheap, resilient, and stealthy opaque constructs. In Proc. 25th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages 1998, POPL'98, pages 184-196, San Diego, CA (USA), January 1998.
-
(1998)
Proc. 25th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages 1998, POPL'98
, pp. 184-196
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
9
-
-
35048831817
-
-
Keith Holmes. Computer software protection. US Patent number 5,287,407, Assignee: International Business Machine, February 1994.
-
Keith Holmes. Computer software protection. US Patent number 5,287,407, Assignee: International Business Machine, February 1994.
-
-
-
-
11
-
-
1842441772
-
Authorship analysis: Identifying the author of a program
-
Computer Science Deparment, Purdue University
-
Ivan Krsul. Authorship analysis: Identifying the author of a program. Technical Report CSD-TR-94-030, Computer Science Deparment, Purdue University, 1994.
-
(1994)
Technical Report CSD-TR-94-030
-
-
Krsul, I.1
-
13
-
-
79951730606
-
A watermarking method for computer programs (in Japanese)
-
Institute of Electronics, Information and Communication Engineers, January
-
Akito Monden, Hajimu Iida, et al. A watermarking method for computer programs (in Japanese). In Proceedings of the 1998 Symposium on Cryptography and Information Security, SCIS'98. Institute of Electronics, Information and Communication Engineers, January 1998.
-
(1998)
Proceedings of the 1998 Symposium on Cryptography and Information Security, SCIS'98.
-
-
Monden, A.1
Iida, H.2
-
16
-
-
0030685619
-
Pizza into Java: Translating theory into practice
-
ACM Press, New York (NY), USA
-
M. Odersky and P. Wadler. Pizza into Java: Translating theory into practice. In Proceedings of the 24th ACM Symposium on Principles of Programming Languages (POPL'97), Paris, France, pages 146-159. ACM Press, New York (NY), USA, 1997.
-
(1997)
Proceedings of the 24th ACM Symposium on Principles of Programming Languages (POPL'97), Paris, France
, pp. 146-159
-
-
Odersky, M.1
Wadler, P.2
-
17
-
-
35048862975
-
-
Rafail Ostrovsky and Oded Goldreich. Comprehensive software system protection. US Patent number 5,123,045, June 16 1992
-
Rafail Ostrovsky and Oded Goldreich. Comprehensive software system protection. US Patent number 5,123,045, June 16 1992.
-
-
-
-
18
-
-
35048885075
-
Ousterhout. Why threads are a bad idea (for most purposes). Invited Talk at 1996
-
Slides avaliable at
-
John K. Ousterhout. Why threads are a bad idea (for most purposes). Invited Talk at 1996 Usenix Technical Conference, 1996. Slides avaliable at http://www.sunlabs.com/~ouster/.
-
(1996)
Usenix Technical Conference
-
-
John, K.1
-
20
-
-
0003197918
-
Protecting mobile agents against malicious hosts
-
Springer-Verlag, Lecture Notes in Computer Science 1419.
-
Tomas Sander and Chrisitan F. Tschudin. Protecting mobile agents against malicious hosts. In Mobile Agents and Security, pages 44-60, 1998. Springer-Verlag, Lecture Notes in Computer Science 1419.
-
(1998)
Mobile Agents and Security
, pp. 44-60
-
-
Sander, T.1
Tschudin, C.F.2
-
22
-
-
84947921326
-
Robust object watermarking: Application to code
-
Andreas Pfitzmann, editor, Germany, 2000. Springer.
-
Julien P. Stern, Gael Hachez, Francois Koeune, and Jean-Jacques Quisquater. Robust object watermarking: Application to code. In Andreas Pfitzmann, editor, Information Hiding (Proceedings of the Third International Workshop, IH'99), LNCS 1768, Germany, 2000. Springer.
-
Information Hiding (Proceedings of the Third International Workshop, IH'99), LNCS 1768
-
-
Stern, J.P.1
Hachez, G.2
Koeune, F.3
Quisquater, J.-J.4
-
23
-
-
4544234052
-
A graph theoretic approach to software watermarking
-
Pittsburgh, PA, April
-
Ramarathnam Venkatesan, Vijay Vazirani, and Saurabh Sinha. A graph theoretic approach to software watermarking. In 4th International Information Hiding Workshop, Pittsburgh, PA, April 2001.
-
(2001)
4th International Information Hiding Workshop
-
-
Venkatesan, R.1
Vazirani, V.2
Sinha, S.3
|