Ginger Myles

According to our database1, Ginger Myles authored at least 13 papers between 2003 and 2007.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2007
An empirical study of Java bytecode programs.
Softw. Pract. Exp., 2007

A technique for self-certifying tamper resistant software.
Proceedings of the 3th ACM Workshop on Quality of Protection, 2007

2006
Content protection for games.
IBM Syst. J., 2006

Software watermarking via opaque predicates: Implementation, analysis, and attacks.
Electron. Commer. Res., 2006

2005
The evaluation of two software watermarking algorithms.
Softw. Pract. Exp., 2005

Using software watermarking to discourage piracy.
ACM Crossroads, 2005

K-gram based software birthmarks.
Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), 2005

Towards Better Software Tamper Resistance.
Proceedings of the Information Security, 8th International Conference, 2005

Self-validating Branch-Based Software Watermarking.
Proceedings of the Information Hiding, 7th International Workshop, 2005

2004
Detecting Software Theft via Whole Program Path Birthmarks.
Proceedings of the Information Security, 7th International Conference, 2004

2003
Preserving Privacy in Environments with Location-Based Applications.
IEEE Pervasive Comput., 2003

Sandmark--A Tool for Software Protection Research.
IEEE Secur. Priv., 2003

Software Watermarking Through Register Allocation: Implementation, Analysis, and Attacks.
Proceedings of the Information Security and Cryptology, 2003


  Loading...