-
1
-
-
84955621400
-
-
David Aucsmith, Tamper Resistant Software: An Implementation. Proceedings of Workshop on Information Hiding, Cambridge 1996, Springer-Verlag, Lecture Notes in Computer Science, Volume 1174, pp 317–333. 450, 461
-
Tamper Resistant Software: An Implementation. Proceedings of Workshop on Information Hiding, Cambridge 1996, Springer-Verlag, Lecture Notes in Computer Science, Volume 1174
, vol.450
, Issue.461
, pp. 317-333
-
-
Aucsmith, D.1
-
2
-
-
84947985844
-
-
Dash O-Pro Obfuscator optimising compiler for Java
-
Dash O-Pro Obfuscator optimising compiler for Java. http://www.preemptive.com/DashO/obfuscate.html 450
-
-
-
-
3
-
-
0029345668
-
-
Cifuentes Cristina and K. John Gough, Decompilation of binary programs. Software — Practice and Experience, vol. 25, no. 7, pp. 811-829, July, 1995. http://www.csee.uq.edu.au/∼cristina/pubs.html 449
-
(1995)
Decompilation of Binary Programs. Software — Practice and Experience
, vol.25
, Issue.7
, pp. 811-829
-
-
Cristina, C.1
John Gough, K.2
-
5
-
-
0032307022
-
-
C Cifuentes, D Simon and A Fraboulet, Assembly to High-Level Language Translation. Proceedings of the International Conference on Software Maintenance, Washington DC, USA, Nov 1998, IEEE-CS Press, pp 228-237. http://www.csee.uq.edu.au/∼cristina/pubs.html 449
-
Assembly to High-Level Language Translation. Proceedings of the International Conference on Software Maintenance, Washington DC, USA, Nov 1998, IEEE-CS Press
, vol.449
, pp. 228-237
-
-
Cifuentes, C.1
Simon, D.2
Fraboulet, A.3
-
7
-
-
0030143835
-
A Specification Driven Slicing Process for Identifying Reusable Functions
-
Cimitile A., De Lucia A., Munro M., A Specification Driven Slicing Process for Identifying Reusable Functions, Journal of Software Maintenance: Research and Practice, 8(3), pp145–178, 1996. 449
-
(1996)
Journal of Software Maintenance: Research and Practice, 8(3), pp145–178
, pp. 449
-
-
Cimitile, A.1
De Lucia, A.2
Munro, M.3
-
8
-
-
0004046658
-
-
Collberg Christian, Clark Thomborson and Douglas Low. A taxonomy of obfuscating transformations. Technical Report 148, Department of Computer Science, University of Auckland, New Zealand, July, 1997. http://www.cs.auckland.ac.nz/∼collberg/Research/Publications/CollbergThomborsonLow97a/index.html 450
-
(1997)
A Taxonomy of Obfuscating Transformations. Technical Report 148, Department of Computer Science, University of Auckland, New Zealand
, pp. 450
-
-
Christian, C.1
Thomborson, C.2
Low, D.3
-
9
-
-
84947985847
-
-
Collberg Christian, Clark Thomborson and Douglas Low. Manufacturing cheap, resilient, and stealthy opaque constructs. Department of Computer Science, University of Auckland, New Zealand, July, 1997. 450 Also in ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL’98), San Diego CA, January 1998. http://www.cs.auckland.ac.nz/∼collberg/Research/Publications/CollbergThomborsonLow98a/index.html
-
(1998)
Manufacturing Cheap, Resilient, and Stealthy Opaque Constructs. Department of Computer Science, University of Auckland, New Zealand, July, 1997. 450 also in ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL’98), San Diego CA
-
-
Christian, C.1
Thomborson, C.2
Low, D.3
-
10
-
-
84947985848
-
-
De Lucia A., Fasolino A.R., Munro M., Understanding Function Behaviors through Program Slicing, Workshop on Program Comprehension, IEEE Press, 1996. http://www.dur.ac.uk/∼dcs1elb/delucia-wpc96.html 449
-
(1996)
Understanding Function Behaviors through Program Slicing, Workshop on Program Comprehension, IEEE Press
, pp. 449
-
-
De Lucia, A.1
Fasolino, A.R.2
Munro, M.3
-
11
-
-
84957707067
-
-
Oded Goldreich, Birgit Pfitzmann and Ronald L. Rivest, Self-Delegation with Controlled Propagation — or—What If You Loose Your Laptop, CRYPTO’ 98, LNCS 1462, pp. 153-168. 450
-
Rivest, Self-Delegation with Controlled Propagation — or—What If You Loose Your Laptop, CRYPTO’ 98, LNCS 1462
, vol.450
, pp. 153-168
-
-
Goldreich, O.1
Pfitzmann, B.2
Ronald, L.3
-
12
-
-
84947985849
-
-
Java Code Engineering & Reverse Engineering
-
Java Code Engineering & Reverse Engineering. http://meurrens.ml.org/ip-Links/Java/CodeEngineering/mm scale.html 450
-
-
-
-
13
-
-
0003855464
-
-
Second Edition, John Wiley & Sons
-
Bruce Schneier. Applied Cryptography, Second Edition, John Wiley & Sons, 1996 458
-
(1996)
Applied Cryptography
, pp. 458
-
-
Schneier, B.1
-
14
-
-
0003412071
-
-
B. Schneier, J. Kelsey, D. Whiting, D. Wagner, C. Hall, N. Ferguson. Twofish: A 128-Bit Block Cipher, June 1998, http://www.counterpane.com/twofish-paper.html 459
-
(1998)
Twofish: A 128-Bit Block Cipher
, pp. 459
-
-
Schneier, B.1
Kelsey, J.2
Whiting, D.3
Wagner, D.4
Hall, C.5
Ferguson, N.6
|