Author:
Collberg Christian,Kobourov Stephen,Carter Edward,Thomborson Clark
Publisher
Springer Berlin Heidelberg
Reference17 articles.
1. Aho, A., Sethi, R., Ullman, J.: Compilers: Principles, Techniques, and Tools. Addison-Wesley, Reading (1986)
2. Anderson, R.J., Peticolas, F.A.: On the limits of steganography. IEEE J-SAC 16(4) (May 1998)
3. Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for data hiding. IBM Systems Journal 35(3&4), 313–336 (1996)
4. Collberg, C., Thomborson, C.: Software watermarking: Models and dynamic embeddings. In: POPL 1999 (January 1999)
5. Collberg, C., Thomborson, C., Low, D.: Breaking abstractions and unstructuring data structures. In: ICCL 1998 (1998)
Cited by
12 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Structured Watermarks for Structured Software;SN Computer Science;2024-05-22
2. Strong watermark numbers encoded as reducible permutation graphs against edge modification attacks;Journal of Computer Security;2023-04-06
3. Software Watermark Scheme;2022 IEEE International Workshop on Metrology for Industry 4.0 & IoT (MetroInd4.0&IoT);2022-06-07
4. Dijkstra graphs;Discrete Applied Mathematics;2019-05
5. Robust active attacks on social graphs;Data Mining and Knowledge Discovery;2019-04-25