{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:28:26Z","timestamp":1725560906853},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540208273"},{"type":"electronic","value":"9783540245919"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24591-9_23","type":"book-chapter","created":{"date-parts":[[2010,7,29]],"date-time":"2010-07-29T03:36:56Z","timestamp":1280374616000},"page":"303-316","source":"Crossref","is-referenced-by-count":3,"title":["A Software Fingerprinting Scheme for Java Using Classfiles Obfuscation"],"prefix":"10.1007","author":[{"given":"Kazuhide","family":"Fukushima","sequence":"first","affiliation":[]},{"given":"Kouichi","family":"Sakurai","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"23_CR1","doi-asserted-by":"crossref","unstructured":"Monden, A., Iida, H., Matsumoto, K., Inoue, K., Torii, K.: A practical method for watermarking java programs. In: compsac2000, 24th Computer Software and Applications Conference (2000)","DOI":"10.1109\/CMPSAC.2000.884716"},{"key":"23_CR2","unstructured":"Collberg, C., Thomborson, C., Low, D.: A taxonomy of obfuscating transformations. Technical Report of Deptartment of Computer Science 148, University of Auckland, New Zealand (1997)"},{"key":"23_CR3","unstructured":"Low, D.: Java control flow obfuscation (1998)"},{"key":"23_CR4","unstructured":"Wang, C., Hill, J., Knight, J., Davidson, J.: Software tamper resistance: Obstructing static analysis of programs. Technical Report CS-2000-12 (2000)"},{"key":"23_CR5","unstructured":"Sakabe, Y., Soshi, M., Miyaji, A.: Software obfuscation for object oriented languages. Technical report of ieice (2002)"},{"key":"23_CR6","first-page":"176","volume":"E86-A","author":"T. Ogiso","year":"2003","unstructured":"Ogiso, T., Sakabe, Y., Soshi, M., Miyaji, A.: A new approach of software obfuscation based on the difficulty of interprocedural analysis. IEICE Transactions on Fundamentals\u00a0E86-A, 176\u2013186 (2003)","journal-title":"IEICE Transactions on Fundamentals"},{"key":"23_CR7","unstructured":"Kitagawa, T., Kaji, Y., Kasami, T.: Digital watermarking method for java programs. In: Symposium on cryptography and information security (scis1998) (1998)"},{"key":"23_CR8","unstructured":"(jmark: A lightweight tool for watermarking java class filess), \n                    \n                      http:\/\/se.aistnara.ac.jp\/jmark\/"},{"key":"23_CR9","unstructured":"(Don quixote), \n                    \n                      http:\/\/oikaze.com\/tamada\/Products\/DonQuixote\/"},{"key":"23_CR10","unstructured":"(Zelix klassmaster), \n                    \n                      http:\/\/www.zelix.com\/klassmaster\/"},{"key":"23_CR11","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1145\/567532.567556","volume-title":"Proceedings of the 8th ACM SIGPLAN-SIGACT symposium on Principles of programming languages","author":"E.M. Myers","year":"1981","unstructured":"Myers, E.M.: A precise inter-procedural data flow algorithm. In: Proceedings of the 8th ACM SIGPLAN-SIGACT symposium on Principles of programming languages, pp. 219\u2013230. ACM Press, New York (1981)"},{"key":"23_CR12","unstructured":"(Mocha, the java decompiler), \n                    \n                      http:\/\/www.brouhaha.com\/eric\/computers\/mocha.html"},{"key":"23_CR13","unstructured":"(Jad - the fast java decompiler), \n                    \n                      http:\/\/kpdus.tripod.com\/jad.html"},{"key":"23_CR14","unstructured":"Lafore, R.: Data Structures and Algorithms in Java, 2nd edn. Sams, USA"}],"container-title":["Lecture Notes in Computer Science","Information Security Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24591-9_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,17]],"date-time":"2019-03-17T09:51:35Z","timestamp":1552816295000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24591-9_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540208273","9783540245919"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24591-9_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}