Author:
Gomathisankaran Mahadevan,Tyagi Akhilesh
Publisher
Springer Berlin Heidelberg
Reference20 articles.
1. Business Software Alliance: Second Annual BSA and IDC Global Software Piracy Study, Trends in software piracy 1994-2004 (May 2005)
2. Lie, D., et al.: Architectural support for copy and tamper resistant software. In: Proceedings of ASPLOS 2000, pp. 168–177 (2000)
3. Zhuang, X., et al.: HIDE: An Infrastructure for Efficiently Protecting Information Leakage on the Address Bus. In: Proceedings of ASPLOS 2004 (2004)
4. White, S.R., Comerford, L.: ABYSS: An Architecture for Software Protection. IEEE Transactions on Software Engineering 16(6), 619–629 (1990)
5. Kuhn, M.: The TrustNo1 Cryptoprocessor Concept, Technical Report, Purdue University, 1997-04-30
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献