Author of the publication

A Functional Taxonomy for Software Watermarking.

, , and . ACSC, volume 4 of CRPIT, page 177-186. Australian Computer Society, (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Nagra, Jasvir
add a person with the name Nagra, Jasvir
 

Other publications of authors with the same name

A Functional Taxonomy for Software Watermarking., , and . ACSC, volume 4 of CRPIT, page 177-186. Australian Computer Society, (2002)A System for Graph-Based Visualization of the Evolution of Software., , , , and . SOFTVIS, page 77-86. ACM, (2003)Surreptitious Software - Obfuscation, Watermarking, and Tamperproofing for Software Protection., and . Addison-Wesley Software Security Series Addison-Wesley, (2010)Threading Software Watermarks., and . Information Hiding, volume 3200 of Lecture Notes in Computer Science, page 208-223. Springer, (2004)Distributed application tamper detection via continuous software updates., , , and . ACSAC, page 319-328. ACM, (2012)Trading-off security and performance in barrier slicing for remote software entrusting., , , , and . Autom. Softw. Eng., 16 (2): 235-261 (2009)The effectiveness of source code obfuscation: An experimental assessment., , , , , , and . ICPC, page 178-187. IEEE Computer Society, (2009)Towards experimental evaluation of code obfuscation techniques., , , , , , and . QoP, page 39-46. ACM, (2008)Tamper-proo ng Software Watermarks., , , and . ACSW, volume 32 of CRPIT, page 27-36. Australian Computer Society, (2004)Distributing Trust Verification to Increase Application Performance., , and . PDP, page 604-610. IEEE Computer Society, (2008)