{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T12:44:37Z","timestamp":1759063477459},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540204527"},{"type":"electronic","value":"9783540398905"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-39890-5_14","type":"book-chapter","created":{"date-parts":[[2010,9,4]],"date-time":"2010-09-04T01:16:57Z","timestamp":1283563017000},"page":"156-167","source":"Crossref","is-referenced-by-count":16,"title":["Graph-Based Approaches to Software Watermarking"],"prefix":"10.1007","author":[{"given":"Christian","family":"Collberg","sequence":"first","affiliation":[]},{"given":"Stephen","family":"Kobourov","sequence":"additional","affiliation":[]},{"given":"Edward","family":"Carter","sequence":"additional","affiliation":[]},{"given":"Clark","family":"Thomborson","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","volume-title":"Compilers: Principles, Techniques, and Tools","author":"A. Aho","year":"1986","unstructured":"Aho, A., Sethi, R., Ullman, J.: Compilers: Principles, Techniques, and Tools. Addison-Wesley, Reading (1986)"},{"key":"14_CR2","doi-asserted-by":"crossref","unstructured":"Anderson, R.J., Peticolas, F.A.: On the limits of steganography. IEEE J-SAC\u00a016(4) (May 1998)","DOI":"10.1109\/49.668971"},{"issue":"3&4","key":"14_CR3","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1147\/sj.353.0313","volume":"35","author":"W. Bender","year":"1996","unstructured":"Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for data hiding. IBM Systems Journal\u00a035(3&4), 313\u2013336 (1996)","journal-title":"IBM Systems Journal"},{"key":"14_CR4","doi-asserted-by":"crossref","unstructured":"Collberg, C., Thomborson, C.: Software watermarking: Models and dynamic embeddings. In: POPL 1999 (January 1999)","DOI":"10.1145\/292540.292569"},{"key":"14_CR5","doi-asserted-by":"crossref","unstructured":"Collberg, C., Thomborson, C., Low, D.: Breaking abstractions and unstructuring data structures. In: ICCL 1998 (1998)","DOI":"10.1109\/ICCL.1998.674154"},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"Collberg, C., Thomborson, C., Low, D.: Manufacturing cheap, resilient, and stealthy opaque constructs. In: POPL 1998 (January 1998)","DOI":"10.1145\/268946.268962"},{"key":"14_CR7","unstructured":"Davidson, R.L., Myhrvold, N.: Method and system for generating and auditing a signature for a computer program. US Patent 5,559,884, Assignee: Microsoft Corporation (September 1996)"},{"key":"14_CR8","doi-asserted-by":"crossref","unstructured":"Ghiya, R., Hendren, L.J.: Is it a tree, a DAG, or a cyclic graph? A shape analysis for heap-directed pointers in C. In: POPL 1996, January 21-24, pp. 1\u201315 (1996)","DOI":"10.1145\/237721.237724"},{"key":"14_CR9","volume-title":"Graphical Enumeration","author":"F. Harary","year":"1973","unstructured":"Harary, F., Palmer, E.: Graphical Enumeration. Academic Press, New York (1973)"},{"issue":"2","key":"14_CR10","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1006\/jagm.1998.0956","volume":"29","author":"S. Kannan","year":"1998","unstructured":"Kannan, S., Proebsting, T.A.: Register allocation in structured programs. Journal of Algorithms\u00a029(2), 223\u2013237 (1998)","journal-title":"Journal of Algorithms"},{"key":"14_CR11","series-title":"The Art of Computer Programming","volume-title":"Fundamental Algorithms","author":"D.E. Knuth","year":"1997","unstructured":"Knuth, D.E.: Fundamental Algorithms, 3rd edn. The Art of Computer Programming, vol.\u00a01. Addison-Wesley, Reading (1997)","edition":"3"},{"key":"14_CR12","doi-asserted-by":"crossref","unstructured":"Qu, G., Potkonjak, M.: Analysis of watermarking techniques for graph coloring problem. In: IEEE\/ACM Intl. Conference on CAD, pp. 190\u2013193 (1998)","DOI":"10.1145\/288548.288607"},{"issue":"5","key":"14_CR13","doi-asserted-by":"publisher","first-page":"1467","DOI":"10.1145\/186025.186041","volume":"16","author":"G. Ramalingam","year":"1994","unstructured":"Ramalingam, G.: The undecidability of aliasing. ACM TOPLAS\u00a016(5), 1467\u20131471 (1994)","journal-title":"ACM TOPLAS"},{"key":"14_CR14","doi-asserted-by":"crossref","unstructured":"Stern, J.P., Hachez, G., Koeune, F., Quisquater, J.-J.: Robust object watermarking: Application to code. Information Hiding, 368\u2013378 (1999)","DOI":"10.1007\/10719724_25"},{"key":"14_CR15","volume-title":"Applied Combinatorics","author":"A. Tucker","year":"1994","unstructured":"Tucker, A.: Applied Combinatorics, 3rd edn. Wiley, Chichester (1994)","edition":"3"},{"key":"14_CR16","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-2032-7","volume-title":"An Introduction to Error Correcting Codes with Applications","author":"S.A. Vanstone","year":"1989","unstructured":"Vanstone, S.A., Oorschot, P.C.V.: An Introduction to Error Correcting Codes with Applications. Klewer Academic Publishers, Dordrecht (1989)"},{"key":"14_CR17","doi-asserted-by":"crossref","unstructured":"Venkatesan, R., Vazirani, V., Sinha, S.: A graph theoretic approach to software watermarking. In: 4th Intl. Information Hiding Workshop (2001)","DOI":"10.1007\/3-540-45496-9_12"}],"container-title":["Lecture Notes in Computer Science","Graph-Theoretic Concepts in Computer Science"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-39890-5_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,3]],"date-time":"2023-06-03T04:50:44Z","timestamp":1685767844000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-39890-5_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540204527","9783540398905"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-39890-5_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]}}}