A novel watermarking method for software protection in the cloud
暂无分享,去创建一个
Athanasios V. Vasilakos | Jianmin Wang | Shiguo Lian | Zhiwei Yu | Chaokun Wang | Clark D. Thomborson
[1] Christian S. Collberg,et al. Software watermarking via opaque predicates: Implementation, analysis, and attacks , 2006, Electron. Commer. Res..
[2] Clark Thomborson,et al. A Security Model for VoIP Steganography , 2009, 2009 International Conference on Multimedia Information Networking and Security.
[3] Mark Stamp,et al. Handbook of Information and Communication Security , 2010, Handbook of Information and Communication Security.
[4] Thomas C. Rindfleisch,et al. Privacy, information technology, and health care , 1997, CACM.
[5] Christian S. Collberg,et al. Surreptitious Software - Obfuscation, Watermarking, and Tamperproofing for Software Protection , 2009, Addison-Wesley Software Security Series.
[6] Genevieve Arboit,et al. A Method for Watermarking Java Programs via Opaque Predicates , 2002 .
[7] Clark D. Thomborson,et al. A Framework for System Security , 2010, Handbook of Information and Communication Security.
[8] Randy H. Katz,et al. Above the Clouds: A Berkeley View of Cloud Computing , 2009 .
[9] Kai Hwang,et al. Cloud Security with Virtualized Defense and Reputation-Based Trust Mangement , 2009, 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing.
[10] John Mylopoulos,et al. Security and privacy requirements analysis within a social setting , 2003, Proceedings. 11th IEEE International Requirements Engineering Conference, 2003..
[11] Noboru Sonehara,et al. Privacy by Data Provenance with Digital Watermarking - A Proof-of-Concept Implementation for Medical Services with Electronic Health Records , 2010, 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[12] Yan Zhang,et al. Handbook of Research on Secure Multimedia Distribution , 2009 .
[13] Dimitris Kanellopoulos,et al. Recent Advances in Multimedia Information System Security , 2009, Informatica.
[14] Fei-Yue Wang,et al. A Survey of Software Watermarking , 2005, ISI.
[15] Christian S. Collberg,et al. Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection , 2002, IEEE Trans. Software Eng..
[16] Kai Hwang,et al. Trusted Cloud Computing with Secure Resources and Data Coloring , 2010, IEEE Internet Computing.
[17] Christian S. Collberg,et al. Software watermarking: models and dynamic embeddings , 1999, POPL '99.
[18] William Zhu,et al. Recognition in software watermarking , 2006, MCPS '06.