From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A technique for self-certifying tamper resistant software., и . QoP, стр. 12-14. ACM, (2007)Software Watermarking Through Register Allocation: Implementation, Analysis, and Attacks., и . ICISC, том 2971 из Lecture Notes in Computer Science, стр. 274-293. Springer, (2003)Towards Better Software Tamper Resistance., , и . ISC, том 3650 из Lecture Notes in Computer Science, стр. 417-430. Springer, (2005)The evaluation of two software watermarking algorithms., , , и . Softw. Pract. Exp., 35 (10): 923-938 (2005)K-gram based software birthmarks., и . SAC, стр. 314-318. ACM, (2005)Detecting Software Theft via Whole Program Path Birthmarks., и . ISC, том 3225 из Lecture Notes in Computer Science, стр. 404-415. Springer, (2004)Self-validating Branch-Based Software Watermarking., и . Information Hiding, том 3727 из Lecture Notes in Computer Science, стр. 342-356. Springer, (2005)