2015
DOI: 10.3923/jse.2015.410.418
|View full text |Cite
|
Sign up to set email alerts
|

Software Watermarking in the Cloud: Analysis and Rigorous Theoretic Treatment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0
1

Year Published

2019
2019
2020
2020

Publication Types

Select...
4

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 5 publications
0
2
0
1
Order By: Relevance
“…Guang et. al then recently proposed an algorithm for the protection of software in the cloud by rigorous theoretic treatment [34]. Hayoma et al proposed a dynamic software watermarking approach using return-oriented programming [35].…”
Section: G Code Replacement Algorithmsmentioning
confidence: 99%
“…Guang et. al then recently proposed an algorithm for the protection of software in the cloud by rigorous theoretic treatment [34]. Hayoma et al proposed a dynamic software watermarking approach using return-oriented programming [35].…”
Section: G Code Replacement Algorithmsmentioning
confidence: 99%
“…Цифровые водяные знаки программного обеспечения -это метод защиты интеллектуальной собственности приложения. Смысл этого метода тот же самый, что и у обычных цифровых водяных знаков, когда в текстовых, графических, аудио-или видеоданных размещается уникальный идентификатор таким образом, что он не может быть обнаружен людьми [19][20][21][22][23]. Некоторые исследователи использовали методы инженерии знаний для классификации плагиата [24].…”
Section: обзор литературыunclassified
“…Software watermarking pertains to software application protection technology, which uses embedded information to provide application copyrights and deter software piracy [8]. For the past few years, software watermarking has achieved a large number of research results and has been proven to be an effective software protection technology [9], [10].…”
Section: Introductionmentioning
confidence: 99%