Mobile Agent Route Protection through Hash-Based Mechanisms
INDOCRYPT '01 Proceedings of the Second International Conference on Cryptology in India: Progress in Cryptology
Towards a Practical Secure Framework for Mobile Code Commerce
ISW '00 Proceedings of the Third International Workshop on Information Security
Sandmark--A Tool for Software Protection Research
IEEE Security and Privacy
Securing Java through software watermarking
PPPJ '03 Proceedings of the 2nd international conference on Principles and practice of programming in Java
An abstract interpretation-based framework for software watermarking
Proceedings of the 31st ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Dynamic path-based software watermarking
Proceedings of the ACM SIGPLAN 2004 conference on Programming language design and implementation
Hybrid static-dynamic attacks against software protection mechanisms
Proceedings of the 5th ACM workshop on Digital rights management
Software watermarking via opaque predicates: Implementation, analysis, and attacks
Electronic Commerce Research
IBM Systems Journal
Software watermarking in the frequency domain: implementation, analysis, and attacks
Journal of Computer Security - Special issue on security track at ACM symposium on applied computing 2004
Recognition in software watermarking
Proceedings of the 4th ACM international workshop on Contents protection and security
Key evolution-based tamper resistance: a subgroup extension
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Dynamic graph-based software fingerprinting
ACM Transactions on Programming Languages and Systems (TOPLAS)
More on graph theoretic software watermarks: Implementation, analysis, and attacks
Information and Software Technology
Digital Watermarking and Steganography
Digital Watermarking and Steganography
Secure brokerage mechanisms for mobile electronic commerce
Computer Communications
A semi-dynamic multiple watermarking schemefor java applications
Proceedings of the nineth ACM workshop on Digital rights management
In the track of the agent protection: a solution based on cryptographic hardware
MMM-ACNS'10 Proceedings of the 5th international conference on Mathematical methods, models and architectures for computer network security
A novel steganographic methodology for high capacity data hiding in executable files
International Journal of Internet Technology and Secured Transactions
On Source Code Transformations for Steganographic Applications
WI-IAT '11 Proceedings of the 2011 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology - Volume 03
Advances in Software Engineering
An attack on SMC-based software protection
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
Graph theoretic software watermarks: implementation, analysis, and attacks
IH'04 Proceedings of the 6th international conference on Information Hiding
IH'04 Proceedings of the 6th international conference on Information Hiding
Soft IP protection: watermarking HDL codes
IH'04 Proceedings of the 6th international conference on Information Hiding
A secure and auto-configurable environment for mobile agents in ubiquitous computing scenarios
UIC'06 Proceedings of the Third international conference on Ubiquitous Intelligence and Computing
A chaos-based robust software watermarking
ISPEC'06 Proceedings of the Second international conference on Information Security Practice and Experience
Self-validating branch-based software watermarking
IH'05 Proceedings of the 7th international conference on Information Hiding
Dither modulation watermarking of dynamic memory traces
IH'05 Proceedings of the 7th international conference on Information Hiding
A survey of software watermarking
ISI'05 Proceedings of the 2005 IEEE international conference on Intelligence and Security Informatics
Steganography for executables and code transformation signatures
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
A software watermark based architecture for cloud security
APWeb'12 Proceedings of the 14th Asia-Pacific international conference on Web Technologies and Applications
A novel watermarking method for Java programs
Proceedings of the 28th Annual ACM Symposium on Applied Computing
Hi-index | 0.00 |