-
1
-
-
0038476545
-
A Survey on Software Watermarking
-
Lihe Zhang, YiXian Yang, Xinxin Niu, and Shaozhang Niu, "A Survey on Software Watermarking," Journal of Software, vol. 14, pp. 268-277, 2003.
-
(2003)
Journal of Software
, vol.14
, pp. 268-277
-
-
Zhang, L.1
Yang, Y.2
Niu, X.3
Niu, S.4
-
2
-
-
0036704573
-
Watermarking, Tamper-Proofing, and Obfuscation Tools for Software Protection
-
Christian S. Collberg and Clark D. Thomborson, "Watermarking, Tamper-Proofing, and Obfuscation Tools for Software Protection," IEEE Transaction on Software Engineering, vol. 28, pp. 735-746, 2002.
-
(2002)
IEEE Transaction on Software Engineering
, vol.28
, pp. 735-746
-
-
Collberg, C.S.1
Thomborson, C.D.2
-
3
-
-
35048854764
-
Detecting Software Theft via Whole Program Path Birthmarks
-
Palo Alto CA, USA
-
Ginger Myles and Christian S. Collberg, "Detecting Software Theft via Whole Program Path Birthmarks," in 7th International Conference Information Security, Palo Alto CA, USA, 2004, pp. 404-415.
-
(2004)
7th International Conference Information Security
, pp. 404-415
-
-
Myles, G.1
Collberg, C.S.2
-
4
-
-
38349021089
-
Dynamic Software Birthmarks to Detect the Theft of Windows Applications
-
Xi'an China
-
Haruaki Tamada, Keiji Okamoto, Masahide Nakamura, Akito Monden, and Ken-ichi Matsumoto, "Dynamic Software Birthmarks to Detect the Theft of Windows Applications," in Symposium on Future Software Technology, Xi'an China, 2004.
-
(2004)
Symposium on Future Software Technology
-
-
Tamada, H.1
Okamoto, K.2
Nakamura, M.3
Monden, A.4
Matsumoto, K.-I.5
-
6
-
-
33644511880
-
-
Graduate School of Information Science Nara Institute of Science and Technology, Nara, Japan
-
Haruaki Tamada, Nakamura Masahide, Monden Akito, and Matsumoto Kenichi, "Detecting the theft of programs using birthmarks," Graduate School of Information Science Nara Institute of Science and Technology, Nara, Japan 2003.
-
(2003)
Detecting the theft of programs using birthmarks
-
-
Tamada, H.1
Masahide, N.2
Akito, M.3
Kenichi, M.4
-
7
-
-
26444481301
-
Design and evaluation of birthmarks for detecting theft of java programs
-
Haruaki Tamada, Masahide Nakamura, Akito Monden, and Kenichi Matsumoto, "Design and evaluation of birthmarks for detecting theft of java programs," in IASTED International Conference on Software Engineering, 2004, pp. 569-575.
-
(2004)
IASTED International Conference on Software Engineering
, pp. 569-575
-
-
Tamada, H.1
Nakamura, M.2
Monden, A.3
Matsumoto, K.4
-
8
-
-
33644528723
-
K-gram based software birthmarks
-
Santa Fe, New Mexico, USA
-
Ginger Myles and Christian S. Collberg, "K-gram based software birthmarks," in ACM Symposium on Applied Computing, Santa Fe, New Mexico, USA, 2005, pp. 314-318.
-
(2005)
ACM Symposium on Applied Computing
, pp. 314-318
-
-
Myles, G.1
Collberg, C.S.2
-
9
-
-
33745456200
-
Fileprints:Identifying File Tytes by n-gram Analysis
-
West Point, NewYork, USA
-
Wei-Jen Li, Ke Wang, Salvatore J. Stolfo, and Benjamin Herzog, "Fileprints:Identifying File Tytes by n-gram Analysis," in 6th IEEE Sytems, Man and Cybernetics Information Assurance Workshop, West Point, NewYork, USA, 2005, pp. 64-71.
-
(2005)
6th IEEE Sytems, Man and Cybernetics Information Assurance Workshop
, pp. 64-71
-
-
Li, W.-J.1
Wang, K.2
Stolfo, S.J.3
Herzog, B.4
-
10
-
-
84976810280
-
Copy detection mechanisms for digital documents
-
Sergey Brin, James Davis, and Hector Garcia-Molina, "Copy detection mechanisms for digital documents," in ACM SIGMOD international Conference on Management of Data, 1995, pp. 398-409.
-
(1995)
ACM SIGMOD international Conference on Management of Data
, pp. 398-409
-
-
Brin, S.1
Davis, J.2
Garcia-Molina, H.3
-
11
-
-
0031346696
-
On the resemblance and containment of documents
-
Andrei Z. Broder, "On the resemblance and containment of documents," in Compression and Complexity of Sequences, 1998, pp. 21-29.
-
(1998)
Compression and Complexity of Sequences
, pp. 21-29
-
-
Broder, A.Z.1
-
12
-
-
47749150566
-
Local algorithms for document fingerprinting
-
San Diego, California
-
Schleimer Saul, Wilkerson Daniel, and Aiken Alex, "Local algorithms for document fingerprinting," in ACM SIGMOD International Conference on Management of Data, San Diego, California, 2003.
-
(2003)
ACM SIGMOD International Conference on Management of Data
-
-
Saul, S.1
Daniel, W.2
Alex, A.3
-
13
-
-
0012096121
-
Method and system for generating and auditing a signature for a computer program: USA Patent: 5559884
-
Robert I. Davidson and Nathan Myhrvold. Method and system for generating and auditing a signature for a computer program: USA Patent: 5559884. 1996.9.24.
-
(1996)
, vol.9
, pp. 24
-
-
Davidson, R.I.1
Myhrvold, N.2
-
14
-
-
47749127238
-
Method of introducing digital signature into software: USA Patent: 2005/0262490 A1
-
Clark D. Thomborson and Jasvir Singh Nagra. Method of introducing digital signature into software: USA Patent: 2005/0262490 A1. 2005.10.24.
-
(2005)
, vol.10
, pp. 24
-
-
Thomborson, C.D.1
Singh Nagra, J.2
-
15
-
-
33744935812
-
Software Protection Through Dynamic Code Mutation
-
Jeju Island, Korea
-
Matias Madou, Bertrand Anckaert, Patrick Moseley, Saumya K. Debray, Bjorn De Sutter, and Koen De Bosschere, "Software Protection Through Dynamic Code Mutation," in 6th International Workshop on Information Security Applications, Jeju Island, Korea, 2005, pp. 194-206.
-
(2005)
6th International Workshop on Information Security Applications
, pp. 194-206
-
-
Madou, M.1
Anckaert, B.2
Moseley, P.3
Debray, S.K.4
Sutter, B.D.5
Bosschere, K.D.6
-
16
-
-
0036036136
-
Profile-Guided Code Compression
-
Berlin, Germany
-
Saumya Debray and William Evans, "Profile-Guided Code Compression," in ACM SIGPLAN Conference on Programming Language Design and Implementation, Berlin, Germany, 2002, pp. 95-105.
-
(2002)
ACM SIGPLAN Conference on Programming Language Design and Implementation
, pp. 95-105
-
-
Debray, S.1
Evans, W.2
|