{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,7]],"date-time":"2025-04-07T23:06:32Z","timestamp":1744067192239},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540414162"},{"type":"electronic","value":"9783540444565"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/3-540-44456-4_13","type":"book-chapter","created":{"date-parts":[[2007,8,28]],"date-time":"2007-08-28T09:47:02Z","timestamp":1188294422000},"page":"164-178","source":"Crossref","is-referenced-by-count":2,"title":["Towards a Practical Secure Framework for Mobile Code Commerce"],"prefix":"10.1007","author":[{"given":"Ga\u00ebl","family":"Hachez","sequence":"first","affiliation":[]},{"given":"Laurent","family":"Den Hollander","sequence":"additional","affiliation":[]},{"given":"Mehrdad","family":"Jalali","sequence":"additional","affiliation":[]},{"given":"Quisquater","family":"Jean-Jacques","sequence":"additional","affiliation":[]},{"given":"Christophe","family":"Vasserot","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,3,28]]},"reference":[{"key":"13_CR1","unstructured":"C. Cifuentes. Reverse Compilation Techniques. PhD thesis, Queensland University of Technology, July 1994."},{"key":"13_CR2","doi-asserted-by":"crossref","unstructured":"C. Collbergand C. Thomborson. Software Watermarking: Models and Dynamic Embeddings. In ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL99), January 1999.","DOI":"10.1145\/292540.292569"},{"key":"13_CR3","unstructured":"C. Collberg, C. Thomborson, and D. Low. A taxonomy of obfuscating transformations. Technical Report 148, Department of Computer Science. The University of Auckland, July 1997."},{"key":"13_CR4","unstructured":"Intel Corporation and Microsoft Corporation. PC 99 System Design Guide. http:\/\/www.pcdesguide.org\/pc99\/ , 1999."},{"key":"13_CR5","unstructured":"D. Dean. DIVX, DPRM (Digital Property Rights Management) and SDMI (Secure Digital Music Initiative). In DIMACS Workshop on Management of Digital Intellectual Property, Piscataway, New Jersey, USA, April 2000. DIMACS."},{"key":"13_CR6","doi-asserted-by":"crossref","unstructured":"Premkunar T. Devanbu and Stuart Stubblebine. Software Engineering for Security: a Roadmap. In The Future of Software Engineering. Special volume of the proceedings of the 22nd International Conference on Software Engineering-ICSE 2000, June 2000.","DOI":"10.1145\/336512.336559"},{"key":"13_CR7","unstructured":"N. Johnson and S. Katzenbeisser. A survey of steganographic tehcniques. In Information Hiding: techniques for steganography and digital watermarking [10], chapter 3."},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"S. Katzenbeisser and F. Petitcolas. Information Hiding: techniques for steganography and digital watermarking. Computer Security Series. Artech House, 2000.","DOI":"10.1201\/1079\/43263.28.6.20001201\/30373.5"},{"key":"13_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1007\/3-540-68697-5_9","volume-title":"Advances in Cryptology-CRYPTO\u2019 96","author":"P. Kocher","year":"1996","unstructured":"Paul Kocher. TimingA ttack on Implementations of Diffie-Hellman, RSA, DSS and other systems. In N. Kobliz, editor, Advances in Cryptology-CRYPTO\u2019 96, volume 1109 of Lectures Notes in Computer Science (LNCS), pages 104\u2013113. Springer-Verlag, 1996."},{"key":"13_CR10","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology-CRYPTO\u2019 99","author":"P. Kocher","year":"1999","unstructured":"Paul Kocher, J. Jaffe, and B. Jun. Differential Power Analysis. In M. Wiener, editor, Advances in Cryptology-CRYPTO\u2019 99, volume 1666 of Lectures Notes in Computer Science (LNCS), pages 388\u2013397. Springer-Verlag, 1999."},{"key":"13_CR11","unstructured":"Oliver Kommerling and Markus G. Kuhn. Design principles for tamper-resistant smartcard processors. In Proceedings of the USENIX Workshop on Smartcard Technology (Smartcard\u2019 99), pages 9\u201320. USENIX Association, May 1999."},{"key":"13_CR12","unstructured":"M. Kutter and F. Hartung. Introduction of watermaking techniques. In Information Hiding: techniques for steganography and digital watermarking [10], chapter 5."},{"key":"13_CR13","unstructured":"G. Nolan. Decompile once, run anywhere. Web Techniques Magazine, 2(9), September 1997."},{"key":"13_CR14","doi-asserted-by":"crossref","unstructured":"F. Petitcolas, R. Anderson, and M. Kuhn. Information hiding-a survey. Proceedings of the IEEE, special issue on protection of multimedia content, 87(7):1062\u20131078, July 1999.","DOI":"10.1109\/5.771065"},{"key":"13_CR15","unstructured":"T. Proebsting and S. Watterson. Krakatoa: Decompilation in JAVA (Does Bytecode Reveal Source?). In USENIX Conference on Object-Oriented Technologies and Systems (COOTS\u2019 97), June 1997."},{"key":"13_CR16","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"368","DOI":"10.1007\/10719724_25","volume-title":"Information Hiding\u2019 99","author":"J. P. Stern","year":"2000","unstructured":"Julien P. Stern, Ga\u00ebl Hachez, Fran\u00e7ois Koeune, and Jean-Jacques Quisquater. Robust object watermarking: Application to code. In A. Pfitzmann, editor, Information Hiding\u2019 99, volume 1768 of Lectures Notes in Computer Science (LNCS), pages 368\u2013378, Dresden, Germany, 2000. Springer-Verlag."}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44456-4_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,22]],"date-time":"2021-08-22T08:33:43Z","timestamp":1629621223000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44456-4_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540414162","9783540444565"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/3-540-44456-4_13","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2000]]}}}