Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Graph-Based Approaches to Software Watermarking., , , and . WG, volume 2880 of Lecture Notes in Computer Science, page 156-167. Springer, (2003)Detecting Software Theft via Whole Program Path Birthmarks., and . ISC, volume 3225 of Lecture Notes in Computer Science, page 404-415. Springer, (2004)A System for Graph-Based Visualization of the Evolution of Software., , , , and . SOFTVIS, page 77-86. ACM, (2003)K-gram based software birthmarks., and . SAC, page 314-318. ACM, (2005)Surreptitious Software - Obfuscation, Watermarking, and Tamperproofing for Software Protection., and . Addison-Wesley Software Security Series Addison-Wesley, (2010)Problem identification using program checking., and . Discrete Applied Mathematics, 144 (3): 270-280 (2004)Software watermarking via opaque predicates: Implementation, analysis, and attacks., and . Electron. Commer. Res., 6 (2): 155-171 (2006)A Possible Solution for Privacy Preserving Cloud Data Storage., , and . IC2E, page 397-403. IEEE Computer Society, (2015)Code Artificiality: A Metric for the Code Stealth Based on an N-Gram Model., , and . SPRO@ICSE, page 31-37. IEEE Computer Society, (2015)SLINKY: Static Linking Reloaded., , , and . USENIX Annual Technical Conference, General Track, page 309-322. USENIX, (2005)