[1] |
YU Z , WANG C , THOMBORSON C . A novel watermarking method for software protection in the cloud[J]. Software Practice and Experience, 2012,42(4): 409-430.
|
[2] |
HWANG K , LI D . Trusted cloud computing with secure resources and data coloring[J]. IEEE Internet Computing, 2010,14(5): 14-22.
|
[3] |
STERN J , HACHEZ G. , KOEUNE F . Robust object watermarking:application to code[A]. Proceedings of the Third International Workshop on Information Hiding[C]. Dresden,Germany, 1999. 368-378.
|
[4] |
COLLBERG C , CATER E . Dynamic path-based software watermarking[A]. Proceedings of the ACM Conference on Programming Language Design and Implementation[C]. New York,USA, 2004. 107-118.
|
[5] |
COLLBERG C . Software watermarking:models and dynamic embedding[A]. Proceedings of Symposium on Principles of Programming Languages[C]. New York,USA, 1999. 311-324.
|
[6] |
COLLBERG C , THOMBORSON C . Watermarking,tamper-proofing,and obfuscation-tools for software protection[J]. IEEE Transactions on Software Engineering, 2002,28(8): 735-746.
|
[7] |
KAMELA I , ALBLUWIB Q . A robust software watermarking for copyright protection[J]. Computers&Security, 2009,28(6): 395-409.
|
[8] |
COLLBERG C , HUNTWORK A , CATER E . Software watermarks:Implementation,analysis,and attacks[J]. Information and Software Technology, 2009,51(1): 56-67.
|
[9] |
陈晓苏, 刘立刚, 卢正鼎 . 网络环境下数字图像版权保护安全协议的设计与分析[J]. 计算机学报, 2006,29(9): 1722-1727. CHEN X S , LIU L G , LU Z D . Design and analysis of digital image copyright protection security protocol in internet environment[J]. Chinese Journal of Computers, 2006,29(9): 1722-1727.
|
[10] |
胡军全, 黄继武, 张龙军 . 结合数字签名与数字水印的多媒体认证系统[J]. 软件学报, 2003,14(6): 1157-1162. HU J Q , HUANG J W , ZHANG L J . A multimedia authentication system combining digital signature and digital watermarking[J]. Journal of Software, 2003,14(6): 1157-1162.
|
[11] |
ISO.Information Technoly-Security Techniques-Key Managementpart 3:Mechanisms Using Asymmetric Techniques ISO/IEC 11770-3[S]. International Standard, 1999.
|
[12] |
SHOUP V . On formal models for secure key exchange[EB/OL]. , 2012.
|