scientific article; zbMATH DE number 2087916
From MaRDI portal
Publication:4738947
zbMATH Open1048.68708MaRDI QIDQ4738947FDOQ4738947
Authors: Hoi Chang, Mikhail J. Atallah
Publication date: 11 August 2004
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2320/23200160.htm
Title of this publication is not available (Why is that?)
Recommendations
Computing methodologies and applications (68U99) Data encryption (aspects in computer science) (68P25) Coding and information theory (compaction, compression, models of communication, encoding schemes, etc.) (aspects in computer science) (68P30) Theory of software (68N99)
Cited In (11)
- Tamper-Tolerant Software: Modeling and Implementation
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Information Security
- A compiler-hardware approach to software protection for embedded systems
- Provable secure and efficient digital rights management authentication scheme using smart card based on elliptic curve cryptography
- Virtual leashing: creating a computational foundation for software protection
- Revisiting Software Protection
- Title not available (Why is that?)
- Partially defined computer instructions and guards
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4738947)