메뉴 건너뛰기




Volumn 3200, Issue , 2004, Pages 208-223

Threading Software Watermarks

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SOFTWARE; ARTIFICIAL INTELLIGENCE; COMPUTER SCIENCE; COMPUTERS;

EID: 35048884150     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-30114-1_15     Document Type: Article
Times cited : (50)

References (23)
  • 1
    • 35048889482 scopus 로고    scopus 로고
    • Ross J. Anderson, editor. Cambridge, U.K. May Springer-Verlag. Lecture Notes in Computer Science
    • Ross J. Anderson, editor. Tamper Resistant Software: An Implementation, Cambridge, U.K. May 1996. Springer-Verlag. Lecture Notes in Computer Science, Vol. 1174.
    • (1996) Tamper Resistant Software: An Implementation , vol.1174
  • 3
    • 0004046658 scopus 로고    scopus 로고
    • A taxonomy of obfuscating transformations
    • Department of Computer Science, University of Auckland, July
    • Christian Collberg, Clark Thomborson, and Douglas Low. A taxonomy of obfuscating transformations. Technical Report 148, Department of Computer Science, University of Auckland, July 1997.
    • (1997) Technical Report 148
    • Collberg, C.1    Thomborson, C.2    Low, D.3
  • 9
    • 35048831817 scopus 로고    scopus 로고
    • Keith Holmes. Computer software protection. US Patent number 5,287,407, Assignee: International Business Machine, February 1994.
    • Keith Holmes. Computer software protection. US Patent number 5,287,407, Assignee: International Business Machine, February 1994.
  • 11
    • 1842441772 scopus 로고
    • Authorship analysis: Identifying the author of a program
    • Computer Science Deparment, Purdue University
    • Ivan Krsul. Authorship analysis: Identifying the author of a program. Technical Report CSD-TR-94-030, Computer Science Deparment, Purdue University, 1994.
    • (1994) Technical Report CSD-TR-94-030
    • Krsul, I.1
  • 13
    • 79951730606 scopus 로고    scopus 로고
    • A watermarking method for computer programs (in Japanese)
    • Institute of Electronics, Information and Communication Engineers, January
    • Akito Monden, Hajimu Iida, et al. A watermarking method for computer programs (in Japanese). In Proceedings of the 1998 Symposium on Cryptography and Information Security, SCIS'98. Institute of Electronics, Information and Communication Engineers, January 1998.
    • (1998) Proceedings of the 1998 Symposium on Cryptography and Information Security, SCIS'98.
    • Monden, A.1    Iida, H.2
  • 17
    • 35048862975 scopus 로고    scopus 로고
    • Rafail Ostrovsky and Oded Goldreich. Comprehensive software system protection. US Patent number 5,123,045, June 16 1992
    • Rafail Ostrovsky and Oded Goldreich. Comprehensive software system protection. US Patent number 5,123,045, June 16 1992.
  • 18
    • 35048885075 scopus 로고    scopus 로고
    • Ousterhout. Why threads are a bad idea (for most purposes). Invited Talk at 1996
    • Slides avaliable at
    • John K. Ousterhout. Why threads are a bad idea (for most purposes). Invited Talk at 1996 Usenix Technical Conference, 1996. Slides avaliable at http://www.sunlabs.com/~ouster/.
    • (1996) Usenix Technical Conference
    • John, K.1
  • 20
    • 0003197918 scopus 로고    scopus 로고
    • Protecting mobile agents against malicious hosts
    • Springer-Verlag, Lecture Notes in Computer Science 1419.
    • Tomas Sander and Chrisitan F. Tschudin. Protecting mobile agents against malicious hosts. In Mobile Agents and Security, pages 44-60, 1998. Springer-Verlag, Lecture Notes in Computer Science 1419.
    • (1998) Mobile Agents and Security , pp. 44-60
    • Sander, T.1    Tschudin, C.F.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.