1 |
Business Software Alliance, Ninth Annual BSA and IDC Global Software Piracy Study. 2012.
|
2 |
Business Software Alliance, 경쟁력 우위: 정품 소프트웨어의 경제적 효과 (Competitive Advantage The Economic Impact of Properly Licensed Software), 2013.
|
3 |
Christian Collberg and Clark Thomborson. Software watermarking: Models and dynamic embeddings. In Principles of Programming Languages POPL'99, 1999.
|
4 |
Christian Collberg and Clark Thomborson. Watermarking, tamper-proofing, and obfuscation tools for software protection. IEEE Trans. Software Engineering, 28(11)pp. 735-746, 2002
DOI
|
5 |
Christian Collberg and Clark Thomborson. On the limitsof software watermarking. Technical Report 164, Departmentof Computer Science, University of Auckland, 1998.
|
6 |
Robert L. Davidson and Nathan Myhrvold. Method and system for generating and auditing a signature for a computer program. US Patent 5,664,191, 1996.
|
7 |
Ginger Myles and Christian Collberg, The evaluation of two software watermarking algorithms. Software Practice and Experience, 35(10), pp. 923-938, 2005.
DOI
|
8 |
Gaurav Gupta and Josef Pieprzyk. Software Watermarking Resilient to Debugging Attacks. Journal of Multimedia, 2(2), pp. 10-16, 2007.
|
9 |
Gaurav Gupta and Josef Pieprzyk. Source Code Watermarking Based on Function Dependency Oriented Sequencing. Proceedings of the 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2008.
|
10 |
J. Hamilton and S. Danicic. An Evaluation of Static Java Bytecode Watermarking. Proceedings of The World Congress on Engineering and Computer Science, 2010.
|
11 |
A. Monden, H. Iida, K. Matsumoto, Katsuro Inoue, and Koji Torii. A practical method for watermarking java programs. In Proceedings of The 24th Computer Software and Applications Conference, 2000.
|
12 |
James Hamilton and Sebastian Danicic, A Survey of Software Watermarking by Code Re-Ordering, 2010.
|
13 |
G. Qu and M. Potkonjak. Analysis of watermarking techniques for graph coloring problem. In IEEE/ACM International Conference on Computer Aided Design, '98, pp. 190-193, 1998.
|
14 |
G. Qu and M. Potkonjak. Hiding signatures in graph coloring solutions. In Information Hiding Workshop '99, pp. 348-367, 1999.
|
15 |
William Zhu and Clark Thomborson. Recognition in software watermarking. In Proceedings of the 4th ACM international workshop on Contents protection and security, pages 29.36, Santa Barbara, California, USA, 2006.
|