메뉴 건너뛰기




Volumn 5508 LNCS, Issue , 2009, Pages 287-294

Protection of mobile agents execution using a modified self-validating branch-based software watermarking with external sentinel

Author keywords

[No Author keywords available]

Indexed keywords

CRITICAL INFRASTRUCTURE; DIGITAL SIGNATURE; MALICIOUS HOST; SOFTWARE ENTITIES; SOFTWARE WATERMARKING; TRUSTED HOST;

EID: 70349312703     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-03552-4_26     Document Type: Conference Paper
Times cited : (2)

References (7)
  • 1
    • 33746610961 scopus 로고    scopus 로고
    • Myles, G., Jin, H.: Self-validating branch-based software watermarking. In: Barni, M., Herrera-Joancomartí, J., Katzenbeisser, S., Perez-González, F. (eds.) IH 2005. LNCS,3727, pp. 342-356. Springer, Heidelberg (2005)
    • Myles, G., Jin, H.: Self-validating branch-based software watermarking. In: Barni, M., Herrera-Joancomartí, J., Katzenbeisser, S., Perez-González, F. (eds.) IH 2005. LNCS,vol. 3727, pp. 342-356. Springer, Heidelberg (2005)
  • 3
    • 10944243481 scopus 로고    scopus 로고
    • On the limits of software watermarking
    • Technical Report 164, Department of Computer Science,The University of Auckland August
    • Collberg, C., Thomborson, C.: On the limits of software watermarking. Technical Report 164, Department of Computer Science,The University of Auckland (August 1998)
    • (1998)
    • Collberg, C.1    Thomborson, C.2
  • 4
    • 70349351257 scopus 로고
    • Software watermarking: Models and dynamic embeddings (January 1999)5. Wagner, N.R.: Fingerprinting
    • Washington,DC,USA, p, IEEE Computer Society, Los Alamitos
    • Collberg, C., Thomborson, C.: Software watermarking: Models and dynamic embeddings (January 1999)5. Wagner, N.R.: Fingerprinting. In: SP 1983: Proceedings of the 1983 IEEE Symposium on Security and Privacy, Washington,DC,USA, p. 18. IEEE Computer Society, Los Alamitos(1983)
    • (1983) SP 1983: Proceedings of the 1983 IEEE Symposium on Security and Privacy , pp. 18
    • Collberg, C.1    Thomborson, C.2
  • 6
    • 0001943763 scopus 로고    scopus 로고
    • Time limited blackbox security: Protecting mobile agents from malicious hosts
    • Vigna, G, ed, Mobile Agents and Security, Springer, Heidelberg
    • Hohl, F.: Time limited blackbox security: Protecting mobile agents from malicious hosts. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 92-113. Springer, Heidelberg (1998)
    • (1998) LNCS , vol.1419 , pp. 92-113
    • Hohl, F.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.