DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lee, J | ko |
dc.contributor.author | Kim, H | ko |
dc.contributor.author | Yoon, Hyunsoo | ko |
dc.date.accessioned | 2013-03-04T12:28:37Z | - |
dc.date.available | 2013-03-04T12:28:37Z | - |
dc.date.created | 2012-02-06 | - |
dc.date.created | 2012-02-06 | - |
dc.date.issued | 2004 | - |
dc.identifier.citation | PARALLEL AND DISTRIBUTED COMPUTING: APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.3320, pp.608 - 612 | - |
dc.identifier.issn | 0302-9743 | - |
dc.identifier.uri | http://hdl.handle.net/10203/82642 | - |
dc.description.abstract | There are many situations in which it is desirable to protect a piece of software from illegitimate tampering once it gets distributed to the users. Protecting the software code means some level of assurance that the program will execute as expected even if it encounters the illegitimated modifications. We provide the method of protecting software from unauthorized modification. One important technique is an integrity-based encryption, by which a program, while running, checks itself to verify that it has not been modified and conceals some privacy sensitive parts of program. | - |
dc.language | English | - |
dc.publisher | SPRINGER-VERLAG BERLIN | - |
dc.title | Tamper resistant software by integrity-based encryption | - |
dc.type | Article | - |
dc.identifier.wosid | 000226132600117 | - |
dc.identifier.scopusid | 2-s2.0-13944283348 | - |
dc.type.rims | ART | - |
dc.citation.volume | 3320 | - |
dc.citation.beginningpage | 608 | - |
dc.citation.endingpage | 612 | - |
dc.citation.publicationname | PARALLEL AND DISTRIBUTED COMPUTING: APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE | - |
dc.contributor.localauthor | Yoon, Hyunsoo | - |
dc.contributor.nonIdAuthor | Lee, J | - |
dc.contributor.nonIdAuthor | Kim, H | - |
dc.type.journalArticle | Article; Proceedings Paper | - |
dc.subject.keywordAuthor | security | - |
dc.subject.keywordAuthor | tamper resistant software | - |
dc.subject.keywordAuthor | software protection | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.