-
1
-
-
33746610961
-
-
Myles, G., Jin, H.: Self-validating branch-based software watermarking. In: Barni, M., Herrera-Joancomartí, J., Katzenbeisser, S., Perez-González, F. (eds.) IH 2005. LNCS,3727, pp. 342-356. Springer, Heidelberg (2005)
-
Myles, G., Jin, H.: Self-validating branch-based software watermarking. In: Barni, M., Herrera-Joancomartí, J., Katzenbeisser, S., Perez-González, F. (eds.) IH 2005. LNCS,vol. 3727, pp. 342-356. Springer, Heidelberg (2005)
-
-
-
-
2
-
-
84926306857
-
Is it an agent,or just a program?: A taxonomy for autonomous agents
-
London,UK, pp, Springer, Heidelberg
-
Franklin, S., Graesser, A.: Is it an agent,or just a program?: A taxonomy for autonomous agents. In: ECAI 1996: Proceedings of the Workshop on Intelligent Agents III,Agent Theories, Architectures,and Languages, London,UK, pp. 21-35. Springer, Heidelberg (1997)
-
(1997)
ECAI 1996: Proceedings of the Workshop on Intelligent Agents III,Agent Theories, Architectures,and Languages
, pp. 21-35
-
-
Franklin, S.1
Graesser, A.2
-
3
-
-
10944243481
-
On the limits of software watermarking
-
Technical Report 164, Department of Computer Science,The University of Auckland August
-
Collberg, C., Thomborson, C.: On the limits of software watermarking. Technical Report 164, Department of Computer Science,The University of Auckland (August 1998)
-
(1998)
-
-
Collberg, C.1
Thomborson, C.2
-
4
-
-
70349351257
-
Software watermarking: Models and dynamic embeddings (January 1999)5. Wagner, N.R.: Fingerprinting
-
Washington,DC,USA, p, IEEE Computer Society, Los Alamitos
-
Collberg, C., Thomborson, C.: Software watermarking: Models and dynamic embeddings (January 1999)5. Wagner, N.R.: Fingerprinting. In: SP 1983: Proceedings of the 1983 IEEE Symposium on Security and Privacy, Washington,DC,USA, p. 18. IEEE Computer Society, Los Alamitos(1983)
-
(1983)
SP 1983: Proceedings of the 1983 IEEE Symposium on Security and Privacy
, pp. 18
-
-
Collberg, C.1
Thomborson, C.2
-
6
-
-
0001943763
-
Time limited blackbox security: Protecting mobile agents from malicious hosts
-
Vigna, G, ed, Mobile Agents and Security, Springer, Heidelberg
-
Hohl, F.: Time limited blackbox security: Protecting mobile agents from malicious hosts. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 92-113. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1419
, pp. 92-113
-
-
Hohl, F.1
-
7
-
-
84883895384
-
A protocol for detecting malicious hosts based on limiting the execution time of mobile agents
-
Esparza, O., Soriano, M., Munoz, J.L., Forne, J.: A protocol for detecting malicious hosts based on limiting the execution time of mobile agents. In: Proceedings. Eighth IEEE International Symposium on Computers and Communication (ISCC 2003), vol. 1, pp. 251-256 (2003)
-
(2003)
Proceedings. Eighth IEEE International Symposium on Computers and Communication (ISCC
, vol.1
, pp. 251-256
-
-
Esparza, O.1
Soriano, M.2
Munoz, J.L.3
Forne, J.4
|