Zero-knowledge SoftwareWatermarking for C Programs
暂无分享,去创建一个
[1] Patrick Cousot,et al. An abstract interpretation-based framework for software watermarking , 2004, POPL.
[2] Jasvir Nagra,et al. Threading Software Watermarks , 2004, Information Hiding.
[3] Christian S. Collberg,et al. Software watermarking: models and dynamic embeddings , 1999, POPL '99.
[4] Christian S. Collberg,et al. Graph Theoretic Software Watermarks: Implementation, Analysis, and Attacks , 2004, Information Hiding.
[5] Stefan Katzenbeisser,et al. Watermark detection with zero-knowledge disclosure , 2003, Multimedia Systems.
[6] Gang Qu,et al. Analysis of watermarking techniques for graph coloring problem , 1998, 1998 IEEE/ACM International Conference on Computer-Aided Design. Digest of Technical Papers (IEEE Cat. No.98CB36287).
[7] Stuart Haber,et al. How to time-stamp a digital document , 1990, Journal of Cryptology.
[8] Christian S. Collberg,et al. Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection , 2002, IEEE Trans. Software Eng..
[9] Frank Ruskey,et al. Ranking and unranking permutations in linear time , 2001, Inf. Process. Lett..
[10] Hongxia Jin,et al. Self-validating Branch-Based Software Watermarking , 2005, Information Hiding.
[11] Christian S. Collberg,et al. Software Watermarking Through Register Allocation: Implementation, Analysis, and Attacks , 2003, ICISC.
[12] Oded Goldreich,et al. Definitions and properties of zero-knowledge proof systems , 1994, Journal of Cryptology.
[13] Nasir D. Memon,et al. Obfuscation of design intent in object-oriented applications , 2003, DRM '03.
[14] Agostino Cortesi,et al. A Distortion Free Watermark Framework for Relational Databases , 2009, ICSOFT.
[15] Xiangyu Zhang,et al. Hiding program slices for software security , 2003, International Symposium on Code Generation and Optimization, 2003. CGO 2003..
[16] Michael Stepp,et al. Dynamic path-based software watermarking , 2004, PLDI '04.
[17] Agostino Cortesi,et al. A Generic Distortion Free Watermarking Technique for Relational Databases , 2009, ICISS.
[18] Ramarathnam Venkatesan,et al. A Graph Theoretic Approach to Software Watermarking , 2001, Information Hiding.