Computer Science ›› 2013, Vol. 40 ›› Issue (12): 211-214.
Previous Articles Next Articles
LI Kui,CHEN Jian-ping,SHI Quan and LI Gui-sen
[1] Collberg C,Thomborson C.Watermarking,tamper-proofing,and Obfuscation-Tools for Software Protection[J].IEEE Transactions on Software Engineering,2002,28(8):735-746 [2] 张立和,杨义先,钮心析.软件水印综述[J].软件学报,2003,14(2):268-277 [3] Zhu W,Thomborson C,Wang F.A Survey of Software Watermarking[C]∥IEEE International Conference on Intelligence and Security Informatics.2005:454-458 [4] Hamilton J,Danicic S.A survey of static software watermarking [C]∥IEEE World Congress on Internet Security.2011:100-107 [5] 鲍福良,彭俊艳,方志刚.Java类文件保护方法综述[J].计算机系统应用,2007,6:124-126 [6] 周正虎,陈丹,周光霞,等.基于病毒多态性的Java软件水印技术[J].计算机与数字工程,2011,39(11):97-100 [7] Monden A,Iida H,Matsumoto K,et al.A Practical Method for Watermarking Java Programs[C]∥The 24th International Computer Software and Applications Conference.2000:191-197 [8] 王春红,陈建平,王杰华,等.基于字节码的Java软件水印的研究与实现[J].微电子学与计算机,2009,26(9):146-149 [9] 樊昌信,曹丽娜.通信原理[M].北京:国防工业出版社,2010 |
No related articles found! |
|