-
1
-
-
0001943763
-
Time limited blackbox security: Protecting mobile agents from malicious hosts
-
Vigna, G., ed.: Mobile Agents Security. Springer-Verlag
-
Hohl, F.: Time limited blackbox security: Protecting mobile agents from malicious hosts. In Vigna, G., ed.: Mobile Agents Security. Volume 1419 of Lecture Notes in Computer Science. Springer-Verlag (1998) 92-113
-
(1998)
Lecture Notes in Computer Science
, vol.1419
, pp. 92-113
-
-
Hohl, F.1
-
2
-
-
0004046658
-
-
Technical Report 148, Department of Computer Science, the University of Auckland, Auckland, New Zealand
-
Collberg, C., Thomborson, C., Low, D.: A taxonomy of obfuscating transformations. Technical Report 148, Department of Computer Science, the University of Auckland, Auckland, New Zealand (1997)
-
(1997)
A Taxonomy of Obfuscating Transformations
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
3
-
-
84955621400
-
Tamper resistant software: An implementation
-
Anderson, R.J., ed.: Information Hiding: First International Workshop. Springer-Verlag
-
Aucsmith, D.: Tamper resistant software: An implementation. In Anderson, R.J., ed.: Information Hiding: First International Workshop. Volume 1174 of Lecture Notes in Computer Science., Springer-Verlag (1996) 317-333
-
(1996)
Lecture Notes in Computer Science
, vol.1174
, pp. 317-333
-
-
Aucsmith, D.1
-
5
-
-
0041475743
-
Software obfuscation on a theoretical basis and its implementation
-
Ogiso, T., Sakabe, Y., Soshi, M., Miyaji, A.: Software obfuscation on a theoretical basis and its implementation. IEICE Transactions on Fundamentals E86-A (2003) 176-186
-
(2003)
IEICE Transactions on Fundamentals E86-A
, pp. 176-186
-
-
Ogiso, T.1
Sakabe, Y.2
Soshi, M.3
Miyaji, A.4
-
6
-
-
0012037951
-
-
Technical Report CS-2000-12, Department of Computer Science, University of Virginia
-
Wang, C., Hill, J., Knight, J., Davidson, J.: Software tamper resistance: Obstructing static analysis of programs. Technical Report CS-2000-12, Department of Computer Science, University of Virginia (2000)
-
(2000)
Software Tamper Resistance: Obstructing Static Analysis of Programs
-
-
Wang, C.1
Hill, J.2
Knight, J.3
Davidson, J.4
-
7
-
-
0035362869
-
Complexity of points-to analysis of Java in the presence of exceptions
-
Chatterjee, R., Ryder, B.G., Landi, W.: Complexity of points-to analysis of Java in the presence of exceptions. IEEE Transactions on Software Engineering 27 (2001) 481-512
-
(2001)
IEEE Transactions on Software Engineering
, vol.27
, pp. 481-512
-
-
Chatterjee, R.1
Ryder, B.G.2
Landi, W.3
-
9
-
-
0003197918
-
Protecting mobile agents against malicious hosts
-
Vign, G., ed.: Mobile Agents and Security. Springer-Verlag
-
Sander, T., Tschudin, C.F.: Protecting mobile agents against malicious hosts. In Vign, G., ed.: Mobile Agents and Security. Volume 1419 of Lecture Notes in Computer Science. Springer-Verlag (1998) 44-60
-
(1998)
Lecture Notes in Computer Science
, vol.1419
, pp. 44-60
-
-
Sander, T.1
Tschudin, C.F.2
-
10
-
-
84958968002
-
Secure transactions with mobile agents in hostile environments
-
Information Security and Privacy: Fifth Australasian Conference on Information Security and Privacy, ACISP 2000. Springer-Verlag
-
Kotzanikolaou, P., Burmester, M., Chrissikopoulos, V.: Secure transactions with mobile agents in hostile environments. In: Information Security and Privacy: Fifth Australasian Conference on Information Security and Privacy, ACISP 2000. Volume 1841 of Lecture Notes in Computer Science., Springer-Verlag (2000) 289-297
-
(2000)
Lecture Notes in Computer Science
, vol.1841
, pp. 289-297
-
-
Kotzanikolaou, P.1
Burmester, M.2
Chrissikopoulos, V.3
|