2020
DOI: 10.1155/2020/8852124
|View full text |Cite
|
Sign up to set email alerts
|

Modelling Features-Based Birthmarks for Security of End-to-End Communication System

Abstract: Feature-based software birthmark is an essential property of software that can be used for the detection of software theft and many other purposes like to assess the security in end-to-end communication systems. Research on feature-based software birthmark shows that using the feature-based software birthmark joint with the practice of software birthmark estimation together can deliver a right and influential method for detecting software piracy and the amount of piracy done by a software. This can also guide … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
11
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
6
1
1

Relationship

5
3

Authors

Journals

citations
Cited by 13 publications
(11 citation statements)
references
References 37 publications
0
11
0
Order By: Relevance
“…Source code transformation is done for various purposes such as to optimize the efficiency of the source code, minimize the source code, and mostly to hide the identity of source code. Various preservation techniques are used for changing or modifying the source code [18][19][20][21][22]. Practitioners are mostly embedding the watermark or digital signature for protecting the identity and ownership of the source code.…”
Section: Introductionmentioning
confidence: 99%
“…Source code transformation is done for various purposes such as to optimize the efficiency of the source code, minimize the source code, and mostly to hide the identity of source code. Various preservation techniques are used for changing or modifying the source code [18][19][20][21][22]. Practitioners are mostly embedding the watermark or digital signature for protecting the identity and ownership of the source code.…”
Section: Introductionmentioning
confidence: 99%
“…Its effort is to bring commercial, cost-effective, and quality system by integrating the existing components. A system is designed using available components which is cheap, already tested, and error-free [1,[3][4][5][6]]. An individual component is a single part of a software system and is a unit to facilitate reputable functionality in the system.…”
Section: Introductionmentioning
confidence: 99%
“…The protocol guarantees anonymous communication end to end data secrecy together with node privacy and prevents impersonation taking advantage of the benefits pseudonyms to conceal the real identity of the nodes and bilinear pairing is to deduce a shared key. Li et al (2020) [19], recognized feature-based birthmark software is an important software property that can be used for information fraud disclosure, software theft and many other purposes such as assessing protection in end-to-end communication systems. This study contributed to offer a mathematical prototype founded on a differential system for the feature-based birthmark software to aid software birthmark differences to be verified for end-to-end communication system piracy and security analysis.…”
Section: Introductionmentioning
confidence: 99%