{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T12:43:33Z","timestamp":1762865013903},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540290391"},{"type":"electronic","value":"9783540314813"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11558859_25","type":"book-chapter","created":{"date-parts":[[2005,11,23]],"date-time":"2005-11-23T04:59:13Z","timestamp":1132721953000},"page":"342-356","source":"Crossref","is-referenced-by-count":18,"title":["Self-validating Branch-Based Software Watermarking"],"prefix":"10.1007","author":[{"given":"Ginger","family":"Myles","sequence":"first","affiliation":[]},{"given":"Hongxia","family":"Jin","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"25_CR1","unstructured":"International Planning and Research Corporation: Sixth annual BSA global software piracy study (2001)"},{"key":"25_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/3-540-45496-9_12","volume-title":"Information Hiding","author":"R. Venkatesan","year":"2001","unstructured":"Venkatesan, R., Vazirani, V., Sinha, S.: A graph theoretic approach to software watermarking. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol.\u00a02137, p. 157. Springer, Heidelberg (2001)"},{"key":"25_CR3","doi-asserted-by":"crossref","unstructured":"Stern, J.P., Hachez, G., Koeune, F., Quisquater, J.J.: Robust object watermarking: Application to code. In: Information Hiding Workshop (1999)","DOI":"10.1007\/10719724_25"},{"key":"25_CR4","doi-asserted-by":"crossref","unstructured":"Qu, G., Potkonjak, M.: Hiding signatures in graph coloring solutions. In: Information Hiding Workshop (1999)","DOI":"10.1007\/10719724_24"},{"key":"25_CR5","doi-asserted-by":"crossref","unstructured":"Collberg, C., Thomborson, C.: Software watermarking: Models and dynamic embeddings. In: Symposium on Principles of Programming Languages (1999)","DOI":"10.1145\/292540.292569"},{"key":"25_CR6","doi-asserted-by":"crossref","unstructured":"Collberg, C., Carter, E., Debray, S., Huntwork, A., Kececioglu, J., Linn, C., Stepp, M.: Dynamic path-based software watermarking. In: Conference on Programming Language Design and Implementation (2004)","DOI":"10.1145\/996841.996856"},{"key":"25_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1007\/978-3-540-30114-1_15","volume-title":"Information Hiding","author":"J. Nagra","year":"2004","unstructured":"Nagra, J., Thomborson, C.: Threading software watermarks. In: Fridrich, J. (ed.) IH 2004. LNCS, vol.\u00a03200, pp. 208\u2013223. Springer, Heidelberg (2004)"},{"key":"25_CR8","doi-asserted-by":"crossref","unstructured":"Cousot, P., Cousot, R.: An abstract interpretation-based framework for software watermarking. In: Symposium on Principles of Programming Languages (2004)","DOI":"10.1145\/964001.964016"},{"key":"25_CR9","doi-asserted-by":"crossref","unstructured":"Linn, C., Debray, S.: Obfuscation of executable code to improve resistance to static disassembly. In: ACM Conference on Computer and Communications Security (2003)","DOI":"10.1145\/948109.948149"},{"key":"25_CR10","doi-asserted-by":"crossref","unstructured":"Chang, H., Atallah, M.J.: Protecting software code by guards. In: ACM DRM workshop (2001)","DOI":"10.1007\/3-540-47870-1_10"}],"container-title":["Lecture Notes in Computer Science","Information Hiding"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11558859_25.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T03:10:21Z","timestamp":1619493021000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11558859_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540290391","9783540314813"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/11558859_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}