Cargando…
Surreptitious software: obfuscation, watermarking, and tamperproofing for software protection
Autores principales: | , |
---|---|
Lenguaje: | eng |
Publicado: |
Addison-Wesley
2010
|
Materias: | |
Acceso en línea: | http://cds.cern.ch/record/1518163 |
_version_ | 1780928584987181056 |
---|---|
author | Collberg, Christian Nagra, Jasvir |
author_facet | Collberg, Christian Nagra, Jasvir |
author_sort | Collberg, Christian |
collection | CERN |
id | cern-1518163 |
institution | Organización Europea para la Investigación Nuclear |
language | eng |
publishDate | 2010 |
publisher | Addison-Wesley |
record_format | invenio |
spelling | cern-15181632021-04-21T23:15:09Zhttp://cds.cern.ch/record/1518163engCollberg, ChristianNagra, JasvirSurreptitious software: obfuscation, watermarking, and tamperproofing for software protectionComputing and ComputersAddison-Wesleyoai:cds.cern.ch:15181632010 |
spellingShingle | Computing and Computers Collberg, Christian Nagra, Jasvir Surreptitious software: obfuscation, watermarking, and tamperproofing for software protection |
title | Surreptitious software: obfuscation, watermarking, and tamperproofing for software protection |
title_full | Surreptitious software: obfuscation, watermarking, and tamperproofing for software protection |
title_fullStr | Surreptitious software: obfuscation, watermarking, and tamperproofing for software protection |
title_full_unstemmed | Surreptitious software: obfuscation, watermarking, and tamperproofing for software protection |
title_short | Surreptitious software: obfuscation, watermarking, and tamperproofing for software protection |
title_sort | surreptitious software: obfuscation, watermarking, and tamperproofing for software protection |
topic | Computing and Computers |
url | http://cds.cern.ch/record/1518163 |
work_keys_str_mv | AT collbergchristian surreptitioussoftwareobfuscationwatermarkingandtamperproofingforsoftwareprotection AT nagrajasvir surreptitioussoftwareobfuscationwatermarkingandtamperproofingforsoftwareprotection |