An USB-Key_based approach for software tamper resistance
暂无分享,去创建一个
[1] Ping Wang,et al. Tamper Resistant Software Through Dynamic Integrity Checking , 2005 .
[2] Mikhail J. Atallah,et al. Protecting Software Code by Guards , 2001, Digital Rights Management Workshop.
[3] Li Dan. Towards Better Encryption Based Software Self-Checking Tamper Resistance , 2007 .
[4] Ramarathnam Venkatesan,et al. Oblivious Hashing: A Stealthy Software Integrity Verification Primitive , 2002, Information Hiding.
[5] Hyunsoo Yoon,et al. Tamper Resistant Software by Integrity-Based Encryption , 2004, PDCAT.
[6] Christian F. Tschudin,et al. Protecting Mobile Agents Against Malicious Hosts , 1998, Mobile Agents and Security.
[7] Liu Jiqiang,et al. USB key-based approach for software protection , 2009, 2009 International Conference on Industrial Mechatronics and Automation.
[8] Robert E. Tarjan,et al. Dynamic Self-Checking Techniques for Improved Tamper Resistance , 2001, Digital Rights Management Workshop.