A Method for Watermarking Java Programs via Opaque Predicates
暂无分享,去创建一个
[1] Rajeev Motwani,et al. Randomized Algorithms , 1995, SIGA.
[2] Josef Pieprzyk,et al. Fingerprints for Copyright Software Protection , 1999, ISW.
[3] Jean-Jacques Quisquater,et al. Robust Object Watermarking: Application to Code , 1999, Information Hiding.
[4] Ross J. Anderson,et al. On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..
[5] Dan L. Burk,et al. Copyrightable functions and patentable speech , 2001, CACM.
[6] Michael Luby,et al. Pseudorandomness and cryptographic applications , 1996, Princeton computer science notes.
[7] Clark Thomborson,et al. Manufacturing cheap, resilient, and stealthy opaque constructs , 1998, POPL '98.
[8] Jan Camenisch,et al. Proving in Zero-Knowledge that a Number Is the Product of Two Safe Primes , 1998, EUROCRYPT.
[9] Ramarathnam Venkatesan,et al. A Graph Theoretic Approach to Software Watermarking , 2001, Information Hiding.
[10] Christian S. Collberg,et al. Software watermarking: models and dynamic embeddings , 1999, POPL '99.
[11] Katsuro Inoue,et al. A practical method for watermarking Java programs , 2000, Proceedings 24th Annual International Computer Software and Applications Conference. COMPSAC2000.
[12] Clark Thomborson,et al. Software Watermarking: Protective Terminology , 2001 .
[13] Jens Palsberg,et al. Experience with software watermarking , 2000, Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00).
[14] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[15] A. H. Beiler,et al. Recreations in the theory of numbers : the queen of mathematics entertains , 1965 .
[16] Christian S. Collberg,et al. Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection , 2002, IEEE Trans. Software Eng..