From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

No persons found for author name Nagra, Jasvir
add a person with the name Nagra, Jasvir
 

Другие публикации лиц с тем же именем

Surreptitious Software - Obfuscation, Watermarking, and Tamperproofing for Software Protection., и . Addison-Wesley Software Security Series Addison-Wesley, (2010)A System for Graph-Based Visualization of the Evolution of Software., , , , и . SOFTVIS, стр. 77-86. ACM, (2003)A Functional Taxonomy for Software Watermarking., , и . ACSC, том 4 из CRPIT, стр. 177-186. Australian Computer Society, (2002)Threading Software Watermarks., и . Information Hiding, том 3200 из Lecture Notes in Computer Science, стр. 208-223. Springer, (2004)Distributed application tamper detection via continuous software updates., , , и . ACSAC, стр. 319-328. ACM, (2012)Trading-off security and performance in barrier slicing for remote software entrusting., , , , и . Autom. Softw. Eng., 16 (2): 235-261 (2009)The effectiveness of source code obfuscation: An experimental assessment., , , , , , и . ICPC, стр. 178-187. IEEE Computer Society, (2009)Towards experimental evaluation of code obfuscation techniques., , , , , , и . QoP, стр. 39-46. ACM, (2008)Tamper-proo ng Software Watermarks., , , и . ACSW, том 32 из CRPIT, стр. 27-36. Australian Computer Society, (2004)Automated Analysis of Security-Critical JavaScript APIs., , , , и . IEEE Symposium on Security and Privacy, стр. 363-378. IEEE Computer Society, (2011)