-
1
-
-
33746041806
-
Software tamper resistance through dynamic program monitoring
-
August
-
B. Blietz and A. Tyagi. Software Tamper Resistance through Dynamic Program Monitoring. Lecture Notes in Computer Science, volume 3919, pages 146-163, August 2006.
-
(2006)
Lecture Notes in Computer Science
, vol.3919
, pp. 146-163
-
-
Blietz, B.1
Tyagi, A.2
-
2
-
-
41549128971
-
Towards tamper resistant code encryption: Practice and experience
-
March
-
J. Cappaert, B. Preneel, B. Anckaert, M. Madou, and K. D. Bosschere. Towards Tamper Resistant Code Encryption: Practice and Experience. Lecture Notes in Computer Science, volume 4991, pages 86-100, March 2008.
-
(2008)
Lecture Notes in Computer Science
, vol.4991
, pp. 86-100
-
-
Cappaert, J.1
Preneel, B.2
Anckaert, B.3
Madou, M.4
Bosschere, K.D.5
-
3
-
-
0003319320
-
Voice over IP performance monitoring
-
April
-
R. G. Cole and J. H. Rosenbluth. Voice over IP Performance Monitoring. ACM SIGCOMM, volume 31, pages 9-24, April 2001.
-
(2001)
ACM SIGCOMM
, vol.31
, pp. 9-24
-
-
Cole, R.G.1
Rosenbluth, J.H.2
-
4
-
-
0031649930
-
Manufacturing cheap resilient, and stealthy opaque constructs
-
January
-
C. Collberg, C. Thomborson, and D. Low. Manufacturing Cheap, Resilient, and Stealthy Opaque Constructs. Proc. of the 25th ACM SIG LAN-SIGACT Symposium on Principles of Programming Languages, pages 184-196, January 1998.
-
(1998)
Proc. of the 25th ACM SIG LAN-SIGACT Symposium on Principles of Programming Languages
, pp. 184-196
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
8
-
-
84959055142
-
Dynamic self-checking techniques for improved tamper resistance
-
January
-
B. Horne, L. R. Matheson, C. Sheehan, and R. E. Tarjan. Dynamic Self-Checking Techniques for Improved Tamper Resistance. Lecture Notes in Computer Science, volume 2320, pages 141-159, January 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2320
, pp. 141-159
-
-
Horne, B.1
Matheson, L.R.2
Sheehan, C.3
Tarjan, R.E.4
-
11
-
-
35248830740
-
Attacking an obfuscated cipher by injecting faults
-
October
-
M. Jacob, D. Boneh, and E. Felten. Attacking an Obfuscated Cipher by Injecting Faults. Lecture Notes in Computer Science, volume 2696, pages 16-31, October 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2696
, pp. 16-31
-
-
Jacob, M.1
Boneh, D.2
Felten, E.3
-
12
-
-
33645998409
-
Towards better software tamper resistance
-
August
-
H. Jin, G. Myles, and J. Lotspiech. Towards Better Software Tamper Resistance. Information Security, volume 3650/2005, pages 417-430, August 2005.
-
(2005)
Information Security Volume
, vol.3650
, Issue.2005
, pp. 417-430
-
-
Jin, H.1
Myles, G.2
Lotspiech, J.3
-
16
-
-
27544459460
-
Tamper-resistant software system based on a finite state machine
-
January
-
A. Monden, A. Monsifrot, and C. Thomborson. Tamper- Resistant Software System Based on a Finite State Machine. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, volume 88-A, pages 112-122, January 2005.
-
(2005)
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
, vol.88 A
, pp. 112-122
-
-
Monden, A.1
Monsifrot, A.2
Thomborson, C.3
-
19
-
-
70449658540
-
-
SPEC CPU 2006. http://www.spec.org/cpu2006/.
-
(2006)
-
-
-
20
-
-
70449633891
-
-
http://hraunfoss.fcc.gov/edocs public/attachmatch/fcc-05-57a1.doc
-
US FCC's Cognitive Radio Report and Order. http://hraunfoss.fcc.gov/edocs public/attachmatch/fcc-05-57a1.doc.
-
US FCC's Cognitive Radio Report and Order
-
-
|