메뉴 건너뛰기




Volumn 1975, Issue , 2000, Pages 82-96

An approach to the objective and quantitative evaluation of tamper-resistant software

Author keywords

[No Author keywords available]

Indexed keywords

FORESTRY; PROGRAM COMPILERS;

EID: 84944220914     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-44456-4_7     Document Type: Conference Paper
Times cited : (17)

References (4)
  • 1
    • 84955621400 scopus 로고    scopus 로고
    • Tamper Resistant Software: An Implementation
    • Springer-Verlag
    • David Aucsmith, “Tamper Resistant Software: An Implementation,” Information Hiding, Lecture Notes in Computer Science Vol.1174, pp.317-333, Springer-Verlag, 1996.
    • (1996) Information Hiding, Lecture Notes in Computer Science , vol.1174 , pp. 317-333
    • Aucsmith, D.1
  • 2
    • 84958760367 scopus 로고    scopus 로고
    • A Tentative Approach to Constructing Tamper-Resistant Software
    • ACM Press
    • Masahiro Mambo, Takanori Murayama and Eiji Okamoto, “A Tentative Approach to Constructing Tamper-Resistant Software,” 1997 New Security Paradigms Workshop, ACM Press, pp.23-33 1998.
    • (1998) 1997 New Security Paradigms Workshop , pp. 23-33
    • Mambo, M.1    Murayama, T.2    Okamoto, E.3
  • 3
    • 0344128124 scopus 로고    scopus 로고
    • Methods for Scrambling Programs Containing Loops
    • [in Japanese]
    • Akito Monden, Yoshihiro Takada and Koji Torii, “Methods for Scrambling Programs Containing Loops,” Trans. of IEICE, Vol.J80-D-I, No.7, pp.644-652, 1997. [in Japanese]
    • (1997) Trans. of IEICE , vol.J80-D-I , Issue.7 , pp. 644-652
    • Monden, A.1    Takada, Y.2    Torii, K.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.