Sciweavers

113
Voted
ICISC
2003
83views Cryptology» more  ICISC 2003»

Software Watermarking Through Register Allocation: Implementation, Analysis, and Attacks

15 years 3 months ago
Software Watermarking Through Register Allocation: Implementation, Analysis, and Attacks
Ginger Myles, Christian S. Collberg
Added 31 Oct 2010
Updated 31 Oct 2010
Type Conference
Year 2003
Where ICISC
Authors Ginger Myles, Christian S. Collberg
Comments (0)