Recognition in software watermarking
暂无分享,去创建一个
[1] Clark Thomborson,et al. A PROVABLE SCHEME FOR HOMOMORPHIC OBFUSCATIONS IN SOFTWARE SECURITY , 2005 .
[2] Joseph A. O'Sullivan,et al. Information-theoretic analysis of watermarking , 2000, 2000 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.00CH37100).
[3] Josef Pieprzyk,et al. Fingerprints for Copyright Software Protection , 1999, ISW.
[4] Jean-Jacques Quisquater,et al. Robust Object Watermarking: Application to Code , 1999, Information Hiding.
[5] Clark Thomborson,et al. Software Watermarking: Protective Terminology , 2001 .
[6] Gang Qu,et al. Analysis of watermarking techniques for graph coloring problem , 1998, 1998 IEEE/ACM International Conference on Computer-Aided Design. Digest of Technical Papers (IEEE Cat. No.98CB36287).
[7] Gael Hachez,et al. A Comparative Study of Software Protection Tools Suited for E-Commerce with Contributions to Software Watermarking and Smart Cards , 2003 .
[8] Christian S. Collberg,et al. Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection , 2002, IEEE Trans. Software Eng..
[9] Derrick Grover,et al. The Protection of Computer Software: Its Technology and Application , 1992 .
[10] Christian S. Collberg,et al. Detecting Software Theft via Whole Program Path Birthmarks , 2004, ISC.
[11] William Zhu,et al. Algorithms to Watermark Software Through Register Allocation , 2005, DRMTICS.
[12] William Zhu,et al. Extraction in software watermarking , 2006, MM&Sec '06.
[13] Peter J. Haas,et al. A system for watermarking relational databases , 2003, SIGMOD '03.
[14] Edward J. Delp,et al. Further progress in watermark evaluation testbed (WET) , 2005, IS&T/SPIE Electronic Imaging.
[15] Christian S. Collberg,et al. A Taxonomy of Obfuscating Transformations , 1997 .
[16] William Zhu,et al. On the QP Algorithm in Software Watermarking , 2005, ISI.
[17] Christian S. Collberg,et al. On the Limits of Software Watermarking , 1998 .
[18] Edward J. Delp,et al. Natural language watermarking , 2005, IS&T/SPIE Electronic Imaging.
[19] Clark Thomborson,et al. Tamper-proofing software watermarks , 2004 .
[20] Fei-Yue Wang,et al. Applications of Homomorphic Functions to Software Obfuscation , 2006, WISI.
[21] Christian S. Collberg,et al. Software Watermarking Through Register Allocation: Implementation, Analysis, and Attacks , 2003, ICISC.
[22] Jasvir Nagra,et al. Threading Software Watermarks , 2004, Information Hiding.
[23] Jens Palsberg,et al. Experience with software watermarking , 2000, Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00).
[24] Katsuro Inoue,et al. A practical method for watermarking Java programs , 2000, Proceedings 24th Annual International Computer Software and Applications Conference. COMPSAC2000.
[25] Radu Sion,et al. Rights protection for categorical data , 2005, IEEE Transactions on Knowledge and Data Engineering.
[26] Fei-Yue Wang,et al. A Survey of Software Watermarking , 2005, ISI.
[27] Ramarathnam Venkatesan,et al. A Graph Theoretic Approach to Software Watermarking , 2001, Information Hiding.
[28] Krishnaswamy Palsberg,et al. A Functional Taxonomy for Software Watermarking , 2002 .
[29] Radu Sion,et al. Natural Language Watermarking and Tamperproofing , 2002, Information Hiding.
[30] Fei-Yue Wang,et al. Obfuscate arrays by homomorphic functions , 2006, 2006 IEEE International Conference on Granular Computing.
[31] Radu Sion,et al. Rights protection for relational data , 2003, IEEE Transactions on Knowledge and Data Engineering.
[32] Christian S. Collberg,et al. Software watermarking: models and dynamic embeddings , 1999, POPL '99.
[33] Radu Sion,et al. wmdb.*: rights protection for numeric relational data , 2004, Proceedings. 20th International Conference on Data Engineering.
[34] Christian S. Collberg,et al. Software watermarking via opaque predicates: Implementation, analysis, and attacks , 2006, Electron. Commer. Res..
[35] Hongxia Jin,et al. Self-validating Branch-Based Software Watermarking , 2005, Information Hiding.
[36] Joseph A. O'Sullivan,et al. Information-theoretic analysis of information hiding , 2003, IEEE Trans. Inf. Theory.
[37] Clark Thomborson,et al. Manufacturing cheap, resilient, and stealthy opaque constructs , 1998, POPL '98.
[38] Pierre Moulin,et al. Game-theoretic analysis of watermark detection , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).
[39] Josef Pieprzyk,et al. Copyright Protection of Object-Oriented Software , 2001, ICISC.
[40] Fei-Yue Wang,et al. Covering Based Granular Computing for Conflict Analysis , 2006, ISI.
[41] Peter J. Haas,et al. Watermarking relational data: framework, algorithms and analysis , 2003, The VLDB Journal.
[42] Miodrag Potkonjak,et al. Hiding Signatures in Graph Coloring Solutions , 1999, Information Hiding.