-
1
-
-
0012096121
-
Method and System for Generating and Auditing a Signature for a Computer Program
-
US Patent No. 5,559,884. Assignee: Microsoft Corporation. 1996
-
R.L. Davidson, Myhrvold. N. Method and System for Generating and Auditing a Signature for a Computer Program. US Patent No. 5,559,884. Assignee: Microsoft Corporation. 1996.
-
-
-
Davidson, R.L.1
Myhrvold, N.2
-
2
-
-
61649098547
-
-
Monden. A, Iida. H, Matsumoto. K, Inoue. K. and Torii. K. A Practical Method for Watermarking Java Programs. 24th Computer Software and Applications Conference, Taipei, Taiwan. 2000
-
Monden. A., Iida. H., Matsumoto. K., Inoue. K. and Torii. K. A Practical Method for Watermarking Java Programs. 24th Computer Software and Applications Conference, Taipei, Taiwan. 2000.
-
-
-
-
3
-
-
4544234052
-
A Graph Theoretic Approach to software watermarking
-
Pittsburgh, PA, USA
-
R. Venkatesan, V. Vazirani, and S. Sinha. A Graph Theoretic Approach to software watermarking, the 4th International Information Hiding Workshop, Pittsburgh, PA, USA. 2001.
-
(2001)
the 4th International Information Hiding Workshop
-
-
Venkatesan, R.1
Vazirani, V.2
Sinha, S.3
-
4
-
-
61649120030
-
-
th Information Hiding Workshop, pp. 87-102. 2001.
-
th Information Hiding Workshop, pp. 87-102. 2001.
-
-
-
-
5
-
-
32044458998
-
Securing Java through Software Watermarking
-
Irenland, pp
-
D. Curran, N. Hurley and M. Cinneide. Securing Java through Software Watermarking, PPPJ 2003, Kilkenny City, Irenland, pp. 145-148.
-
Kilkenny City
, vol.PPPJ 2003
, pp. 145-148
-
-
Curran, D.1
Hurley, N.2
Cinneide, M.3
-
7
-
-
35048884150
-
Threading software watermarks
-
Fridrich J, ed, Heidelberg: Springer-Verlag
-
Nagra J, Thomborson C. Threading software watermarks. In: Fridrich J, ed. Proc. of the 6th Workshop on Information Hiding. Berlin, Heidelberg: Springer-Verlag, 2004, pp. 208-223.
-
(2004)
Proc. of the 6th Workshop on Information Hiding. Berlin
, pp. 208-223
-
-
Nagra, J.1
Thomborson, C.2
-
8
-
-
4544235744
-
-
C. Collberg, E. Carter, S. Debray, A. Huntwork, J. Kececioglu, C. Linn and M. Stepp. Dynamic path-based software watermarking, ACM SIGPLAN Notices, Proceedings of the ACM SIGPLAN 2004 conference on Programming language design and implementation, 39, Iss. 6.
-
C. Collberg, E. Carter, S. Debray, A. Huntwork, J. Kececioglu, C. Linn and M. Stepp. Dynamic path-based software watermarking, ACM SIGPLAN Notices, Proceedings of the ACM SIGPLAN 2004 conference on Programming language design and implementation, Vol. 39, Iss. 6.
-
-
-
-
9
-
-
33749411875
-
-
Zheng Yuan, QiaoyanWen, Wenling Wu, Qing Zhang. An ID-Based Watermarking Scheme for Java Programs, EUC Workshops 2006, LNCS 4097, pp. 848-857.
-
Zheng Yuan, QiaoyanWen, Wenling Wu, Qing Zhang. An ID-Based Watermarking Scheme for Java Programs, EUC Workshops 2006, LNCS 4097, pp. 848-857.
-
-
-
-
10
-
-
33751071546
-
Tamper resistant software encoding,
-
US patent 6594761, pp. 1-32. 2003
-
Chow, et al, Tamper resistant software encoding, US patent 6594761, pp. 1-32. 2003.
-
-
-
Chow1
-
11
-
-
24944582622
-
A functional taxonomy for software watermarking
-
C. Collberg, J. Nagra, and C Thomborson. A functional taxonomy for software watermarking, Proc. 25th Australian Computer Science Conference 2002, vol 4, pp. 177-186.
-
Proc. 25th Australian Computer Science Conference 2002
, vol.4
, pp. 177-186
-
-
Collberg, C.1
Nagra, J.2
Thomborson, C.3
-
12
-
-
24944556273
-
An abstract interpretation-based framework for software watermarking
-
P. Cousot and R. Cousot. An abstract interpretation-based framework for software watermarking, Principles of Programming Languages 2003, pp. 311-324.
-
(2003)
Principles of Programming Languages
, pp. 311-324
-
-
Cousot, P.1
Cousot, R.2
|