{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T16:55:40Z","timestamp":1725468940862},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540368502"},{"type":"electronic","value":"9783540368519"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11807964_85","type":"book-chapter","created":{"date-parts":[[2006,8,25]],"date-time":"2006-08-25T14:14:24Z","timestamp":1156515264000},"page":"848-857","source":"Crossref","is-referenced-by-count":1,"title":["An ID-Based Watermarking Scheme for Java Programs"],"prefix":"10.1007","author":[{"given":"Zheng","family":"Yuan","sequence":"first","affiliation":[]},{"given":"Qiaoyan","family":"Wen","sequence":"additional","affiliation":[]},{"given":"Wenling","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Qing","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"85_CR1","unstructured":"Davidson, R.L., Myhrvold, N.: Method and System for Generating and Auditing a Signature for a Computer Program. US Patent No. 5,559,884. Assignee: Microsoft Corporation (1996)"},{"key":"85_CR2","doi-asserted-by":"crossref","unstructured":"Monden, A., Iida, H., Matsumoto, K., Inoue, K., Torii, K.: A Practical Method for Watermarking Java Programs. In: 24th Computer Software and Applications Conference (2000)","DOI":"10.1109\/CMPSAC.2000.884716"},{"key":"85_CR3","doi-asserted-by":"crossref","unstructured":"Collberg, C., Thomborson, C.: Software Watermarking: Models and Dynamic Embeddings. In: Conference Record of POPL 1999: The 26th ACM SIGPLANSIGACT Symposium on Principles of Programming Languages (January 1999)","DOI":"10.1145\/292540.292569"},{"key":"85_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30114-1_15","volume-title":"Information Hiding","author":"J. Nagra","year":"2004","unstructured":"Nagra, J., Thomborson, C.: Threading Software Watermarks. In: Fridrich, J. (ed.) IH 2004. LNCS, vol.\u00a03200, Springer, Berlin (2004)"},{"key":"85_CR5","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1145\/947380.947395","volume-title":"ACM Workshop on Digital Rights Management(DRM 2003)","author":"A. Adelsbach","year":"2003","unstructured":"Adelsbach, A., Katzenbeisser, S., Veith, H.: Watermarking Schemes Provably Secure Against Copy and Ambiguity Attacks. In: ACM Workshop on Digital Rights Management(DRM 2003), pp. 111\u2013119. ACM Press, Washington (2003)"},{"key":"85_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"416","DOI":"10.1007\/3-540-39200-9_26","volume-title":"Advances in Cryptology \u2013 EUROCRPYT 2003","author":"D. Boneh","year":"2003","unstructured":"Boneh, D., Gentry, C., Lynn, B., Shacham, H.: Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol.\u00a02656, pp. 416\u2013432. Springer, Heidelberg (2003)"},{"key":"85_CR7","unstructured":"Saxena, A., Soh, B.: Additive Zero-Knowledge and Applications: SPAM Prevention (2005), http:\/\/eprint.iacr.org\/"},{"key":"85_CR8","doi-asserted-by":"crossref","unstructured":"Collberg, C., Thomborson, C., Low, D.: Manufacturing Cheap, Resilient, and Stealthy Opaque Constructs. In: Principles of Programming Languages 1998, POPL 1998, San Diego, CA (1998), http:\/\/www.cs.arizona.edu\/collberg\/Teaching\/620\/","DOI":"10.1145\/268946.268962"},{"key":"85_CR9","unstructured":"Collberg, C.: CS 620 Security Through Obscurity (2002) Course Notes from, http:\/\/www.cs.arizona.edu\/collberg\/Teaching\/SoftwareSecurity.html"},{"key":"85_CR10","unstructured":"Arboit, G.: A Method for Watermarking Java Programs via Opaque Predicates. In: International Conference on Electronic Commerce Research (ICECR-5) (2002)"},{"key":"85_CR11","volume-title":"Elementary Numbers Theory","author":"C. Pan","year":"1991","unstructured":"Pan, C., Pan, C.: Elementary Numbers Theory. Beijing University Publishing Company, Beijing, China (1991)"},{"key":"85_CR12","volume-title":"Modern Cryptography: Theory and Practice","author":"W. Mao","year":"2004","unstructured":"Mao, W.: Modern Cryptography: Theory and Practice. Publishing House of Electronic Industry, Beijing, China (2004)"},{"key":"85_CR13","volume-title":"Digital Watermarking","author":"I.J. Cox","year":"2003","unstructured":"Cox, I.J., Miller, M.L., Bloom, J.A.: Digital Watermarking. Publishing House of Electronic Industry, Beijing, China (2003)"}],"container-title":["Lecture Notes in Computer Science","Emerging Directions in Embedded and Ubiquitous Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11807964_85.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T20:13:29Z","timestamp":1605644009000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11807964_85"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540368502","9783540368519"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/11807964_85","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}