{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:26:12Z","timestamp":1750307172419,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,10,26]],"date-time":"2012-10-26T00:00:00Z","timestamp":1351209600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,10,26]]},"DOI":"10.1145\/2393216.2393291","type":"proceedings-article","created":{"date-parts":[[2012,11,13]],"date-time":"2012-11-13T15:04:07Z","timestamp":1352819047000},"page":"444-451","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["An efficient secure code approach based on indexed table quasi group encryption with Hadamard and Number Theoretic Transformation for software protection"],"prefix":"10.1145","author":[{"given":"N.","family":"Sasirekha","sequence":"first","affiliation":[{"name":"Karpagam University, Coimbatore, Tamilnadu, Inida"}]},{"given":"M.","family":"Hemalatha","sequence":"additional","affiliation":[{"name":"Karpagam University, Coimbatore, Tamilnadu, India"}]}],"member":"320","published-online":{"date-parts":[[2012,10,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/52.210607"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2010.385"},{"key":"e_1_3_2_1_3_1","unstructured":"J. Viega G. McGraw \"Building Secure Software\" Addison Wesley 2001.  J. Viega G. McGraw \"Building Secure Software\" Addison Wesley 2001."},{"key":"e_1_3_2_1_4_1","volume-title":"Secrets of Reverse Engineering","author":"Eilam E.","year":"2005","unstructured":"E. Eilam , \"Reversing : Secrets of Reverse Engineering \", Wiley Publishing, Inc. , 2005 . E. Eilam, \"Reversing: Secrets of Reverse Engineering\", Wiley Publishing, Inc., 2005."},{"issue":"1","key":"e_1_3_2_1_5_1","article-title":"Computer Software Protection against Piracy in Taiwan","volume":"8","author":"Chen L. K.","year":"1994","unstructured":"L. K. Chen , \" Computer Software Protection against Piracy in Taiwan \", J. Asian Law , vol. 8 , no. 1 , 1994 , http:\/\/www.columbia.edu\/cu\/asiaweb\/v8n1chen.htm. L. K. Chen, \"Computer Software Protection against Piracy in Taiwan\", J. Asian Law, vol. 8, no. 1, 1994, http:\/\/www.columbia.edu\/cu\/asiaweb\/v8n1chen.htm.","journal-title":"J. Asian Law"},{"key":"e_1_3_2_1_6_1","volume-title":"Eighth annual BSA global software piracy studies {Online}. Available: http:\/\/www.bsa.org","author":"International Plannning and Research Corporation","year":"2003","unstructured":"International Plannning and Research Corporation , Eighth annual BSA global software piracy studies {Online}. Available: http:\/\/www.bsa.org Jun. 2003 . International Plannning and Research Corporation, Eighth annual BSA global software piracy studies {Online}. Available: http:\/\/www.bsa.org Jun. 2003."},{"key":"e_1_3_2_1_7_1","volume-title":"Available: http:\/\/www.gocsi.com","author":"Computer Security Institute and Federal Bureau of Investigation, CSI\/FBI 2002 computer crime and security survey {Online}.","year":"2002","unstructured":"Computer Security Institute and Federal Bureau of Investigation, CSI\/FBI 2002 computer crime and security survey {Online}. Available: http:\/\/www.gocsi.com Apr. 2002 Computer Security Institute and Federal Bureau of Investigation, CSI\/FBI 2002 computer crime and security survey {Online}. Available: http:\/\/www.gocsi.com Apr. 2002"},{"key":"e_1_3_2_1_9_1","first-page":"28","article-title":"Breaking abstractions and unstructuring data structures","author":"Thomborson C., C.","year":"1998","unstructured":"Collberg, C., C. Thomborson , and D. Low , \" Breaking abstractions and unstructuring data structures ,\" Proceedings from International Conference on Computer Languages , pp. 28 -- 38 , 1998 . Collberg, C., C. Thomborson, and D. Low, \"Breaking abstractions and unstructuring data structures,\" Proceedings from International Conference on Computer Languages, pp. 28--38, 1998.","journal-title":"Proceedings from International Conference on Computer Languages"},{"volume-title":"Proceedings of the","author":"Zambreno Joseph","key":"e_1_3_2_1_10_1","unstructured":"Joseph Zambreno , Dan Honbo , Alok Choudhary , Rahul Simha and Bhagirath Narahari, \"High-Performance Software Protection Using Reconfigurable Architectures \", Proceedings of the IEEE , Vol . 94, No. 2, 2006. Joseph Zambreno, Dan Honbo, Alok Choudhary, Rahul Simha and Bhagirath Narahari, \"High-Performance Software Protection Using Reconfigurable Architectures\", Proceedings of the IEEE, Vol. 94, No. 2, 2006."},{"key":"e_1_3_2_1_11_1","first-page":"160","volume-title":"ACM Workshop on Security and Privacy in Digital Rights Management","author":"Chang H.","year":"2000","unstructured":"H. Chang and M. Atallah , \" Protecting software code by guards,\" in Proc . ACM Workshop on Security and Privacy in Digital Rights Management Nov. 2000 , pp. 160 -- 175 . H. Chang and M. Atallah, \"Protecting software code by guards,\" in Proc. ACM Workshop on Security and Privacy in Digital Rights Management Nov. 2000, pp. 160--175."},{"key":"e_1_3_2_1_12_1","volume-title":"M. I. T.","author":"Kent S.","year":"1980","unstructured":"S. Kent , \" Protecting Externally Supplied Software in Small Computers\", Ph. D. thesis , M. I. T. , September 1980 S. Kent, \"Protecting Externally Supplied Software in Small Computers\", Ph.D. thesis, M. I. T., September 1980"},{"key":"e_1_3_2_1_13_1","unstructured":"D. Denning \"Cryptography and Data Security\" Addison Wesley 1982.  D. Denning \"Cryptography and Data Security\" Addison Wesley 1982."},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of the Winter Simulation Conference","author":"Okhravi D.","year":"2005","unstructured":"Nicol, D. M.; Okhravi , H.; \"Performance analysis of binary code protection \", Proceedings of the Winter Simulation Conference , 2005 . Nicol, D. M.; Okhravi, H.; \"Performance analysis of binary code protection\", Proceedings of the Winter Simulation Conference, 2005."},{"key":"e_1_3_2_1_15_1","volume-title":"1st Benelux Workshop Inf. Syst. Security","author":"Cappaert Jan","year":"2006","unstructured":"Jan Cappaert , Nessim Kisserli , Dries Schellekens , and Bart Preneel , \"Self-encrypting Code to Protect Against Analysis and Tampering\" , 1st Benelux Workshop Inf. Syst. Security , 2006 Jan Cappaert, Nessim Kisserli, Dries Schellekens, and Bart Preneel, \"Self-encrypting Code to Protect Against Analysis and Tampering\", 1st Benelux Workshop Inf. Syst. Security, 2006"},{"key":"e_1_3_2_1_16_1","first-page":"86","article-title":"Toward Tamper Resistant Code Encryption: Practice and Experience","volume":"4991","author":"Cappaert Jan","year":"2008","unstructured":"Jan Cappaert , Nessim Kisserli , Dries Schellekens , and Bart Preneel , \" Toward Tamper Resistant Code Encryption: Practice and Experience ,\" LNCS , vol. 4991 , 2008 , pp. 86 -- 100 . Jan Cappaert, Nessim Kisserli, Dries Schellekens, and Bart Preneel, \"Toward Tamper Resistant Code Encryption: Practice and Experience,\" LNCS, vol. 4991, 2008, pp. 86--100.","journal-title":"LNCS"},{"issue":"2","key":"e_1_3_2_1_17_1","first-page":"85","article-title":"A Code Block Cipher Method to Protect Application Programs From Reverse Engineering","volume":"18","author":"Jung D. W","year":"2008","unstructured":"D. W Jung , H. S Kim , and J. G. Park , \" A Code Block Cipher Method to Protect Application Programs From Reverse Engineering ,\" J. Korea Inst. Inf. Security Cryptology , vol. 18 , no. 2 , 2008 , pp. 85 -- 96 (in Korean) D. W Jung, H. S Kim, and J. G. Park, \"A Code Block Cipher Method to Protect Application Programs From Reverse Engineering,\" J. Korea Inst. Inf. Security Cryptology, vol. 18, no. 2, 2008, pp. 85--96 (in Korean)","journal-title":"J. Korea Inst. Inf. Security Cryptology"},{"volume-title":"Proc. 2000 USENIX Security Symposium.","author":"Gutmann P.","key":"e_1_3_2_1_18_1","unstructured":"P. Gutmann , \" An Open-source Cryptographic Co-processor\" , Proc. 2000 USENIX Security Symposium. P. Gutmann, \"An Open-source Cryptographic Co-processor\", Proc. 2000 USENIX Security Symposium."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.4218\/etrij.11.0110.0056"},{"key":"e_1_3_2_1_20_1","unstructured":"Maruti Venkat Kartik Satti \"Quasi Group based Crypto-System\" A Thesis 2007.  Maruti Venkat Kartik Satti \"Quasi Group based Crypto-System\" A Thesis 2007."},{"key":"e_1_3_2_1_21_1","volume-title":"Int. J. Appl. Math. Comput. Sci.","volume":"12","author":"C.","year":"2002","unstructured":"Koscienly, C. 2002 . Generating quasi groups for cryptographic applications . Int. J. Appl. Math. Comput. Sci. , vol. 12 , No.4, 559--569. Koscienly, C. 2002. Generating quasi groups for cryptographic applications. Int. J. Appl. Math. Comput. Sci., vol.12, No.4, 559--569."},{"key":"e_1_3_2_1_22_1","first-page":"393","volume-title":"On Quasigroup Sequence Random Generator. Proceedings of the 1st Balkan Conference in Informatics, Y. Manolopoulos and E. Spirakis, Eds., 21--23","author":"Dimitrova V.","year":"2004","unstructured":"V. Dimitrova , J. Markovski , On Quasigroup Sequence Random Generator. Proceedings of the 1st Balkan Conference in Informatics, Y. Manolopoulos and E. Spirakis, Eds., 21--23 November , 2004 , Thessaloniki, Greece , pp. 393 -- 401 . V. Dimitrova, J. Markovski, On Quasigroup Sequence Random Generator. Proceedings of the 1st Balkan Conference in Informatics, Y. Manolopoulos and E. Spirakis, Eds., 21--23 November, 2004, Thessaloniki, Greece, pp. 393--401."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TBC.2009.2014993"},{"key":"e_1_3_2_1_24_1","volume-title":"Third Conference on Theoretical and Applied Computer Science (TACS","author":"Ella Vaignana Spoorthy","year":"2012","unstructured":"Vaignana Spoorthy Ella , \" Sequence Randomization Using Quasigroups and Number Theoretic Transforms\" , Third Conference on Theoretical and Applied Computer Science (TACS 2012 ). Vaignana Spoorthy Ella, \"Sequence Randomization Using Quasigroups and Number Theoretic Transforms\", Third Conference on Theoretical and Applied Computer Science (TACS 2012)."},{"key":"e_1_3_2_1_25_1","volume-title":"An Introduction to Mathematical Cryptography","author":"Hoffstein J.","year":"2010","unstructured":"J. Hoffstein , J. Pipher , J. H. Silverman , An Introduction to Mathematical Cryptography . Springer , 2010 . J. Hoffstein, J. Pipher, J. H. Silverman, An Introduction to Mathematical Cryptography. Springer, 2010."},{"key":"e_1_3_2_1_26_1","unstructured":"R. S.Reddy Encryption of binary and non-binary data using chained Hadamard transforms.arXiv:1012.4452.  R. S.Reddy Encryption of binary and non-binary data using chained Hadamard transforms.arXiv:1012.4452."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/T-C.1970.222925"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2009.2020264"},{"key":"e_1_3_2_1_29_1","unstructured":"V. Godavarty Using Quasigroups for Generating Pseudorandom Numbers. arXiv:1112.1048.  V. Godavarty Using Quasigroups for Generating Pseudorandom Numbers. arXiv:1112.1048."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/49.223875"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEMC.1971.303131"},{"key":"e_1_3_2_1_32_1","first-page":"742","volume-title":"Proceedings of an International Conference on Networks, Intelligence and Computing Technologies{ICNICT 2011}","author":"Sasirekha N.","year":"2011","unstructured":"N. Sasirekha , A. Edwin Robert and Dr.M.Hemalatha, \"Novel Obfuscation Obfuscation Algorithms for Software Security \", Proceedings of an International Conference on Networks, Intelligence and Computing Technologies{ICNICT 2011} , December 2011 . ISBN: 978-81-8424- 742 - 748 N. Sasirekha, A. Edwin Robert and Dr.M.Hemalatha, \"Novel Obfuscation Obfuscation Algorithms for Software Security\", Proceedings of an International Conference on Networks, Intelligence and Computing Technologies{ICNICT 2011}, December 2011. ISBN: 978-81-8424-742-8"},{"issue":"1","key":"e_1_3_2_1_33_1","article-title":"A Survey on Software Protection Techniques against Various Attacks","volume":"12","author":"Sasirekha N.","year":"2012","unstructured":"N. Sasirekha , M. Hemalatha , \" A Survey on Software Protection Techniques against Various Attacks \", Global Journal of Computer Science and Technology , Vol 12 , Issue 1 , January 2012 . N. Sasirekha, M. Hemalatha, \"A Survey on Software Protection Techniques against Various Attacks\", Global Journal of Computer Science and Technology, Vol 12, Issue 1, January 2012.","journal-title":"Global Journal of Computer Science and Technology"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2345396.2345578"}],"event":{"name":"CCSEIT '12: The Second International Conference on Computational Science, Engineering","sponsor":["Avinashilingam University Avinashilingam University"],"location":"Coimbatore UNK India","acronym":"CCSEIT '12"},"container-title":["Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2393216.2393291","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2393216.2393291","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:54:47Z","timestamp":1750240487000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2393216.2393291"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10,26]]},"references-count":33,"alternative-id":["10.1145\/2393216.2393291","10.1145\/2393216"],"URL":"https:\/\/doi.org\/10.1145\/2393216.2393291","relation":{},"subject":[],"published":{"date-parts":[[2012,10,26]]},"assertion":[{"value":"2012-10-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}