1. Aura T, Gollman D (1999) Software license management with smart cards. In: Proc. Usenix workshop on smartcard technology (Smartcard’99), pp 75–86
2. Beck F (1998) Integrated circuit failure analysis: a guide to preparation techniques. Wiley, New York
3. Yee BS (1994) Using secure coprocessors. PhD thesis CMU-CS-94-149, Carnegie Mellon University, Pittsburgh
4. Barak B, Goldreich O, Impagliazzo R, Rudich S, Sahai A, Vadhan S, Yang K (2001) On the (im)possibility of obfuscating programs. In: Proc. CRYPTO ‘01. Lecture notes in computer science, vol 2139. Springer, Berlin Heidelberg New York, pp 1–18
5. Collberg C, Thomborson C (2000) Watermarking, tamper-proofing, and obfuscation – tools for software protection. University of Auckland Technical Report #170. http://www.cs.auckland.ac.nz/∼collberg/Research/Publications/CollbergThomborson2000a/index.html