|
Search the dblp DataBase
Clark D. Thomborson:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Jasvir Nagra, Clark D. Thomborson, Christian S. Collberg
A Functional Taxonomy for Software Watermarking. [Citation Graph (0, 0)][DBLP] ACSC, 2002, pp:177-186 [Conf]
- Anirban Majumdar, Clark D. Thomborson
Manufacturing opaque predicates in distributed systems for code obfuscation. [Citation Graph (0, 0)][DBLP] ACSC, 2006, pp:187-196 [Conf]
- Akito Monden, Antoine Monsifrot, Clark D. Thomborson
A Framework for Obfuscated Interpretation. [Citation Graph (0, 0)][DBLP] ACSW Frontiers, 2004, pp:7-16 [Conf]
- Clark D. Thomborson, Jasvir Nagra, Ram Somaraju, Charles He
Tamper-proo ng Software Watermarks. [Citation Graph (0, 0)][DBLP] ACSW Frontiers, 2004, pp:27-36 [Conf]
- Matt Barrett, Clark D. Thomborson
Frameworks Built on the Trusted Platform Module. [Citation Graph (0, 0)][DBLP] COMPSAC (2), 2006, pp:59-62 [Conf]
- William Zhu, Clark D. Thomborson
Algorithms to Watermark Software Through Register Allocation. [Citation Graph (0, 0)][DBLP] DRMTICS, 2005, pp:180-191 [Conf]
- Christos Kaklamanis, Anna R. Karlin, Frank Thomson Leighton, Victor Milenkovic, Prabhakar Raghavan, Satish Rao, Clark D. Thomborson, A. Tsantilas
Asymptotically Tight Bounds for Computing with Faulty Arrays of Processors (Extended Abstract) [Citation Graph (0, 0)][DBLP] FOCS, 1990, pp:285-296 [Conf]
- Christian S. Collberg, Clark D. Thomborson, Douglas Low
Breaking Abstractions and Unstructuring Data Structures. [Citation Graph (0, 0)][DBLP] ICCL, 1998, pp:28-38 [Conf]
- Anirban Majumdar, Clark D. Thomborson, Stephen Drape
A Survey of Control-Flow Obfuscations. [Citation Graph (0, 0)][DBLP] ICISS, 2006, pp:353-356 [Conf]
- Andrew M. Colarik, Clark D. Thomborson, Lech J. Janczewski
Update/Patch Management Systems: A Protocol Taxonomy with Security Implications. [Citation Graph (0, 0)][DBLP] International Information Security Workshops, 2004, pp:67-80 [Conf]
- Jasvir Nagra, Clark D. Thomborson
Threading Software Watermarks. [Citation Graph (0, 0)][DBLP] Information Hiding, 2004, pp:208-223 [Conf]
- Anirban Majumdar, Clark D. Thomborson
On the Use of Opaque Predicates in Mobile Agent Code Obfuscation. [Citation Graph (0, 0)][DBLP] ISI, 2005, pp:648-649 [Conf]
- William Zhu, Clark D. Thomborson
On the QP Algorithm in Software Watermarking. [Citation Graph (0, 0)][DBLP] ISI, 2005, pp:646-647 [Conf]
- William Zhu, Clark D. Thomborson, Fei-Yue Wang
A Survey of Software Watermarking. [Citation Graph (0, 0)][DBLP] ISI, 2005, pp:454-458 [Conf]
- Anirban Majumdar, Clark D. Thomborson
Securing Mobile Agents Control Flow Using Opaque Predicates. [Citation Graph (0, 0)][DBLP] KES (3), 2005, pp:1065-1071 [Conf]
- Clark D. Thomborson, Linda L. Deneen, Gary M. Shute
Computing a Rectilinear Steiner Minimal Tree in nO(sqrt(n)) Time. [Citation Graph (0, 0)][DBLP] Parallel Algorithms and Architectures, 1987, pp:176-183 [Conf]
- Larry Carter, Jeanne Ferrante, Clark D. Thomborson
Folklore confirmed: reducible flow graphs are exponentially larger. [Citation Graph (0, 0)][DBLP] POPL, 2003, pp:106-114 [Conf]
- Christian S. Collberg, Clark D. Thomborson
Software Watermarking: Models and Dynamic Embeddings. [Citation Graph (0, 0)][DBLP] POPL, 1999, pp:311-324 [Conf]
- Christian S. Collberg, Clark D. Thomborson, Douglas Low
Manufacturing Cheap, Resilient, and Stealthy Opaque Constructs. [Citation Graph (0, 0)][DBLP] POPL, 1998, pp:184-196 [Conf]
- Clark D. Thomborson, Belle W. Y. Wei
Systolic Implementations of a Move-to-Front Text Compressor. [Citation Graph (0, 0)][DBLP] SPAA, 1989, pp:283-290 [Conf]
- Christian S. Collberg, Stephen G. Kobourov, Edward Carter, Clark D. Thomborson
Graph-Based Approaches to Software Watermarking. [Citation Graph (0, 0)][DBLP] WG, 2003, pp:156-167 [Conf]
- William Zhu, Clark D. Thomborson, Fei-Yue Wang
Applications of Homomorphic Functions to Software Obfuscation. [Citation Graph (0, 0)][DBLP] WISI, 2006, pp:152-153 [Conf]
- Gary M. Shute, Linda L. Deneen, Clark D. Thomborson
An O(n log n) Plane-Sweep Algorithm for L_1 and L_\infty Delaunay Triangulations. [Citation Graph (0, 0)][DBLP] Algorithmica, 1991, v:6, n:2, pp:207-221 [Journal]
- Clark D. Thomborson
Does Your Workstation Computation Belong on a Vector Supercomputer? [Citation Graph (0, 0)][DBLP] Commun. ACM, 1993, v:36, n:11, pp:41-49 [Journal]
- Akito Monden, Antoine Monsifrot, Clark D. Thomborson
Tamper-Resistant Software System Based on a Finite State Machine. [Citation Graph (0, 0)][DBLP] IEICE Transactions, 2005, v:88, n:1, pp:112-122 [Journal]
- Clark D. Thomborson
The Economics of Large-Memory Computations. [Citation Graph (0, 0)][DBLP] Inf. Process. Lett., 1998, v:66, n:5, pp:263-268 [Journal]
- Linda L. Deneen, Gary M. Shute, Clark D. Thomborson
A Probaby Fast, Provably Optimal Algorithm for Rectilinear Steiner Trees. [Citation Graph (0, 0)][DBLP] Random Struct. Algorithms, 1994, v:5, n:4, pp:535-558 [Journal]
- Pak K. Chan, Martine D. F. Schlag, Clark D. Thomborson, Vojin G. Oklobdzija
Delay Optimization of Carry-Skip Adders and Block Carry-Lookahead Adders Using Multidimensional Dynamic Programming. [Citation Graph (0, 0)][DBLP] IEEE Trans. Computers, 1992, v:41, n:8, pp:920-930 [Journal]
- Christian S. Collberg, Clark D. Thomborson
Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection. [Citation Graph (0, 0)][DBLP] IEEE Trans. Software Eng., 2002, v:28, n:8, pp:735-746 [Journal]
- Stephen Drape, Anirban Majumdar, Clark D. Thomborson
Slicing Aided Design of Obfuscating Transforms. [Citation Graph (0, 0)][DBLP] ACIS-ICIS, 2007, pp:1019-1024 [Conf]
- Stephen Drape, Clark D. Thomborson, Anirban Majumdar
Specifying Imperative Data Obfuscations. [Citation Graph (0, 0)][DBLP] ISC, 2007, pp:299-314 [Conf]
- William Zhu, Clark D. Thomborson
Extraction in software watermarking. [Citation Graph (0, 0)][DBLP] MM&Sec, 2006, pp:175-181 [Conf]
- Christian S. Collberg, Clark D. Thomborson, Gregg M. Townsend
Dynamic graph-based software fingerprinting. [Citation Graph (0, 0)][DBLP] ACM Trans. Program. Lang. Syst., 2007, v:29, n:6, pp:- [Journal]
Slicing obfuscations: design, correctness, and evaluation. [Citation Graph (, )][DBLP]
A semi-dynamic multiple watermarking schemefor java applications. [Citation Graph (, )][DBLP]
Metrics-based Evaluation of Slicing Obfuscations. [Citation Graph (, )][DBLP]
A Model for New Zealand's Identity Verification Service. [Citation Graph (, )][DBLP]
Axiomatic and Behavioural Trust. [Citation Graph (, )][DBLP]
Search in 0.022secs, Finished in 0.024secs
|