The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Ginger Myles: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Ginger Myles, Christian S. Collberg
    Software Watermarking Through Register Allocation: Implementation, Analysis, and Attacks. [Citation Graph (0, 0)][DBLP]
    ICISC, 2003, pp:274-293 [Conf]
  2. Ginger Myles, Hongxia Jin
    Self-validating Branch-Based Software Watermarking. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2005, pp:342-356 [Conf]
  3. Hongxia Jin, Ginger Myles, Jeffery Lotspiech
    Towards Better Software Tamper Resistance. [Citation Graph (0, 0)][DBLP]
    ISC, 2005, pp:417-430 [Conf]
  4. Ginger Myles, Christian S. Collberg
    Detecting Software Theft via Whole Program Path Birthmarks. [Citation Graph (0, 0)][DBLP]
    ISC, 2004, pp:404-415 [Conf]
  5. Ginger Myles, Christian S. Collberg
    K-gram based software birthmarks. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:314-318 [Conf]
  6. Ginger Myles
    Using software watermarking to discourage piracy. [Citation Graph (0, 0)][DBLP]
    ACM Crossroads, 2004, v:10, n:3, pp:2- [Journal]
  7. Ginger Myles, Christian S. Collberg
    Software watermarking via opaque predicates: Implementation, analysis, and attacks. [Citation Graph (0, 0)][DBLP]
    Electronic Commerce Research, 2006, v:6, n:2, pp:155-171 [Journal]
  8. Ginger Myles, Stefan Nusser
    Content protection for games. [Citation Graph (0, 0)][DBLP]
    IBM Systems Journal, 2006, v:45, n:1, pp:119-144 [Journal]
  9. Christian S. Collberg, Ginger Myles, Andrew Huntwork
    Sandmark--A Tool for Software Protection Research. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:4, pp:40-49 [Journal]
  10. Ginger Myles, Christian S. Collberg, Zachary V. Heidepriem, Armand Navabi
    The evaluation of two software watermarking algorithms. [Citation Graph (0, 0)][DBLP]
    Softw., Pract. Exper., 2005, v:35, n:10, pp:923-938 [Journal]

  11. A technique for self-certifying tamper resistant software. [Citation Graph (, )][DBLP]


  12. Using software watermarking to discourage piracy. [Citation Graph (, )][DBLP]


Search in 0.001secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002