[1] DAVIDSON R, MYHRVOLD N. Method and system for generating and auditing a signature for a computer program[P]. US, 5559884, 1996. [2] HATTANDA K, ICHIIKAWA S. The evaluation of Davidson’s digital signature scheme[J]. Transaction on Fundamentals, 2004, E87-A(01): 224-225. [3] MYLES G, COLLBERG C, HEIDEPRIEM Z, et al. The evaluation of two software watermarking algorithms[J]. Software: Practice and Experience, 2005, 35(10): 923-938. [4] MOSKOWITZ S, COOPERMAN M. Method for stega-cipher protection of computer code[P]. US, 5745569, 1996. [5] MONDEN A, INOUE K. A practical method for watermarking java programs[C]//Proceedings of the 24th Computer Software and Applications Conference, 2000: 191-197. [6] STERN J, HACHEZz G, KOEUNE F, et al. Robust object watermarking: application to code[C]//Proceedings of the 1999 Information Hiding Workshop. 1999: 368-378. [7] VENKATESAN R, VAZIRANI V, SINHA S. A graph theoretic approach to software watermarking[C]//Proceedings of the 4th International Workshop on Information Hiding. 2001: 157-168. [8] ARBOIT G. A method for watermarking java programs via opaque predicates: Implementation, analysis, and attacks[C]//Proceedings of the Fifth International Conference on Electronic Commerce Research, 2006, 6(02): 155-171. [9] 吴建军,高济. 基于指令统计分布的软件水印方案[J].浙江大学学报(工学版),2005,39(02):225-228. [10] NAGRA J, THOMBORSON C. Threading software watermarks[C]//Proceedings of 6th International Workshop on Information Hiding. 2004, 3200: 208-233. [11] COUSOT P, COUSOT R. An abstract interpretation-based framework for software watermarking[C]//Proceedings of the 31st ACM SIGPLAN-SIGACT Symposium Principles of Programming Language. 2004: 173-185. [12] COLLBERG C, KOBBOUROV S, CARTER E, et al. Error-correcting graphs for software watermarking[C]//Proceedings of The 29th Workshop on Graph Theoretic Concepts in Computer Science. 2003, 2880: 156-167. [13] 李淑芝,刘猛. 基于变量防篡改的动态图软件水印方案[J]. 计算机工程与科学,2011,33(05):18~21. [14] 陈志浩,谢小权. 一个基于TPM芯片的可信网络接入模型[J]. 信息网络安全,2008,(11):42-44. [15] 周正虎,矗陈丹,周光霞,等. 基于病毒多态性的Java软件水印技术[J]. 计算机与数字工程,2011,39(11):97-100. |