Software watermarking scheme with cloud computing constraints

A non-equivalent semantic obfuscation-based software watermarking,scheme was introduced to satisfy the demands of software intellectual property breaches in cloud.Via obfuscated source codes,part of semantics was cut into a recovery module to make the source code unavailable.Watermarks map to transf...

Full description

Saved in:
Bibliographic Details
Main Authors: Guang SUN, Xiao-ping FAN, Wang-dong JIANG, Hang-jun ZHOU, Sheng-zong LIU, Chun-hong GONG, Jing ZHU
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2016-09-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2016.00083
Tags: Add Tag
No Tags, Be the first to tag this record!