The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for tamperproofing with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1998-2017 (9)
Publication types (Num. hits)
article(1) book(1) inproceedings(6) phdthesis(1)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 9 occurrences of 9 keywords

Results
Found 9 publication records. Showing 9 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
63Charles G. Boncelet Jr. Image authentication and tamperproofing for noisy channels. Search on Bibsonomy ICIP (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
63Jens Palsberg, S. Krishnaswamy, Minseok Kwon, Di Ma, Qiuyun Shao, Y. Zhang Experience with Software Watermarking. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF program-transformation attacks, heap-space usage, watermark retrieval time, protection technique, tamperproofing, Java, Java, data structures, security of data, execution times, obfuscation, dynamic data structures, code size, software watermarking, copy protection
36Mykolai Protsenko Securing the android app ecosystem: obfuscation, tamperproofing, and malware detection = Absicherung des Android App Ökosystems. Search on Bibsonomy 2017   RDF
36Emanuele N. de L. F. Jorge, Luci Pirmez, Claudio M. de Farias, Rafael de O. Costa, Davidson R. Boccardo, Luiz F. R. da Costa Carmo SensorWatermark: a scheme of software watermark using code obfuscation and tamperproofing for WSN. Search on Bibsonomy IWCMC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
36Mykola Protsenko, Sebastien Kreuter, Tilo Müller Dynamic Self-Protection and Tamperproofing for Android Apps Using Native Code. Search on Bibsonomy ARES The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
36Christian S. Collberg, Jasvir Nagra Surreptitious Software - Obfuscation, Watermarking, and Tamperproofing for Software Protection. Search on Bibsonomy 2010   RDF
36Mikhail J. Atallah, Victor Raskin, Christian Hempelmann, Mercan Karahan, Radu Sion, Umut Topkara, Katrina E. Triezenberg Natural Language Watermarking and Tamperproofing. Search on Bibsonomy Information Hiding The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
26Lisa M. Marvel, Charles G. Boncelet Jr., Charles T. Retter Spread spectrum image steganography. Search on Bibsonomy IEEE Trans. Image Process. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
26Lisa M. Marvel, Charles G. Boncelet Jr., Charles T. Retter Reliable Blind Information Hiding for Images. Search on Bibsonomy Information Hiding The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #9 of 9 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license