Two Obfuscation Methods by Controlling Calculation Amounts and by Table Function for Watermarks
暂无分享,去创建一个
[1] Gael Hachez,et al. A Comparative Study of Software Protection Tools Suited for E-Commerce with Contributions to Software Watermarking and Smart Cards , 2003 .
[2] Paul C. van Oorschot,et al. A White-Box DES Implementation for DRM Applications , 2002, Digital Rights Management Workshop.
[3] Amit Sahai,et al. On the (im)possibility of obfuscating programs , 2001, JACM.
[4] Christian S. Collberg,et al. Software watermarking via opaque predicates: Implementation, analysis, and attacks , 2006, Electron. Commer. Res..
[5] Kazuo Ohzeki,et al. 9-6 Evaluation of Methods and Computational amount of Watermarking with Disclosing Obfuscated Detector , 2009 .