메뉴 건너뛰기




Volumn 28, Issue 2, 2011, Pages 24-27

Guest editors' introduction: Software protection

Author keywords

software protectionsecurityprivacy

Indexed keywords

BUILDING SYSTEMS; BUSINESS SURVIVAL; INDUSTRIAL SOFTWARE DEVELOPMENT; MEDICAL INFORMATICS; MILITARY DEFENSE; NATIONAL INFRASTRUCTURE; SOFTWARE PROTECTION; SOFTWARE PROTECTIONSECURITYPRIVACY; SOFTWARE VENDORS; TOOLS AND TECHNIQUES;

EID: 79952182106     PISSN: 07407459     EISSN: None     Source Type: Journal    
DOI: 10.1109/MS.2011.34     Document Type: Review
Times cited : (48)

References (12)
  • 2
    • 78651078800 scopus 로고    scopus 로고
    • PhD thesis, Computer Security and Industrial Cryptography COSIC, Dept. of Electrical Engineering, Katholieke Universiteit Leuven
    • B. Wyseur, "White-Box Cryptography", PhD thesis, Computer Security and Industrial Cryptography (COSIC), Dept. of Electrical Engineering, Katholieke Universiteit Leuven, 2009.
    • (2009) White-box Cryptography
    • Wyseur, B.1
  • 3
    • 79952175956 scopus 로고    scopus 로고
    • Smart grid lacks smart security
    • 24 Mar
    • T. Claburn, "Smart Grid Lacks Smart Security", InformationWeek, 24 Mar. 2009; www.informationweek.com/news/infrastructure/management/ showArticle.jhtml?articleID=216200240.
    • (2009) InformationWeek
    • Claburn, T.1
  • 4
    • 80051996994 scopus 로고    scopus 로고
    • Video games in the 21st century: The 2010 report
    • S. E. Siwek, "Video Games in the 21st Century: The 2010 Report", Entertainment Software Assoc, 2010; www.theesa.com/facts/pdfs/ VideoGames2 1stCentury-2010.pdf.
    • (2010) Entertainment Software Assoc.
    • Siwek, S.E.1
  • 5
    • 79251578513 scopus 로고    scopus 로고
    • On the (im) possibility of obfuscating programs
    • CRYPTO 01, LNCS 2139, Springer Verlag
    • B. Barak et al., "On the (Im) possibility of Obfuscating Programs", Advances in Cryptology (CRYPTO 01), LNCS 2139, Springer Verlag, 2001, pp. 1-18.
    • (2001) Advances in Cryptology , pp. 1-18
    • Barak, B.1
  • 6
    • 0027684663 scopus 로고
    • Operating system protection through program evolution
    • F. B. Cohen, "Operating System Protection through Program Evolution", Computer Security, vol. 12, no. 6, 1993, pp. 565-584.
    • (1993) Computer Security , vol.12 , Issue.6 , pp. 565-584
    • Cohen, F.B.1
  • 8
    • 79955909178 scopus 로고    scopus 로고
    • Exploiting code mobility for dynamic binary obfuscation
    • to be published in, WorldCIS, Feb
    • P. Falcarin et al., "Exploiting Code Mobility for Dynamic Binary Obfuscation", to be published in Proc. IEEE World Conf. Internet Security (WorldCIS), Feb. 2011.
    • (2011) Proc. IEEE World Conf. Internet Security
    • Falcarin, P.1
  • 10
    • 38849121919 scopus 로고    scopus 로고
    • Towards integral binary execution: Implementing oblivious hashing using overlapped instruction encodings
    • DOI 10.1145/1288869.1288887, MM and Sec'07 - Proceedings of the Multimedia and Security Workshop 2007
    • M. Jacob, M. H. Jakubowski, and R. Venkatesan, "Towards Integral Binary Execution: Implementing Oblivious Hashing Using Overlapped Instruction Encodings", Proc. 9th ACM Workshop on Multimedia & Security, ACM Press, 2007, pp. 129-140. (Pubitemid 351203811)
    • (2007) MM and Sec'07 - Proceedings of the Multimedia and Security Workshop 2007 , pp. 129-140
    • Jacob, M.1    Jakubowski, M.H.2    Venkatesan, R.3
  • 12
    • 85028170979 scopus 로고    scopus 로고
    • Establishing the genuinity of remote computer systems
    • Usenix Assoc.
    • R. Kennel and L. H. Jamieson, "Establishing the Genuinity of Remote Computer Systems", Proc. 12th Usenix Security Symp., Usenix Assoc., 2003, pp. 295-310.
    • (2003) Proc. 12th Usenix Security Symp. , pp. 295-310
    • Kennel, R.1    Jamieson, L.H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.