The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Clark D. Thomborson: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Jasvir Nagra, Clark D. Thomborson, Christian S. Collberg
    A Functional Taxonomy for Software Watermarking. [Citation Graph (0, 0)][DBLP]
    ACSC, 2002, pp:177-186 [Conf]
  2. Anirban Majumdar, Clark D. Thomborson
    Manufacturing opaque predicates in distributed systems for code obfuscation. [Citation Graph (0, 0)][DBLP]
    ACSC, 2006, pp:187-196 [Conf]
  3. Akito Monden, Antoine Monsifrot, Clark D. Thomborson
    A Framework for Obfuscated Interpretation. [Citation Graph (0, 0)][DBLP]
    ACSW Frontiers, 2004, pp:7-16 [Conf]
  4. Clark D. Thomborson, Jasvir Nagra, Ram Somaraju, Charles He
    Tamper-proo ng Software Watermarks. [Citation Graph (0, 0)][DBLP]
    ACSW Frontiers, 2004, pp:27-36 [Conf]
  5. Matt Barrett, Clark D. Thomborson
    Frameworks Built on the Trusted Platform Module. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2006, pp:59-62 [Conf]
  6. William Zhu, Clark D. Thomborson
    Algorithms to Watermark Software Through Register Allocation. [Citation Graph (0, 0)][DBLP]
    DRMTICS, 2005, pp:180-191 [Conf]
  7. Christos Kaklamanis, Anna R. Karlin, Frank Thomson Leighton, Victor Milenkovic, Prabhakar Raghavan, Satish Rao, Clark D. Thomborson, A. Tsantilas
    Asymptotically Tight Bounds for Computing with Faulty Arrays of Processors (Extended Abstract) [Citation Graph (0, 0)][DBLP]
    FOCS, 1990, pp:285-296 [Conf]
  8. Christian S. Collberg, Clark D. Thomborson, Douglas Low
    Breaking Abstractions and Unstructuring Data Structures. [Citation Graph (0, 0)][DBLP]
    ICCL, 1998, pp:28-38 [Conf]
  9. Anirban Majumdar, Clark D. Thomborson, Stephen Drape
    A Survey of Control-Flow Obfuscations. [Citation Graph (0, 0)][DBLP]
    ICISS, 2006, pp:353-356 [Conf]
  10. Andrew M. Colarik, Clark D. Thomborson, Lech J. Janczewski
    Update/Patch Management Systems: A Protocol Taxonomy with Security Implications. [Citation Graph (0, 0)][DBLP]
    International Information Security Workshops, 2004, pp:67-80 [Conf]
  11. Jasvir Nagra, Clark D. Thomborson
    Threading Software Watermarks. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2004, pp:208-223 [Conf]
  12. Anirban Majumdar, Clark D. Thomborson
    On the Use of Opaque Predicates in Mobile Agent Code Obfuscation. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:648-649 [Conf]
  13. William Zhu, Clark D. Thomborson
    On the QP Algorithm in Software Watermarking. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:646-647 [Conf]
  14. William Zhu, Clark D. Thomborson, Fei-Yue Wang
    A Survey of Software Watermarking. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:454-458 [Conf]
  15. Anirban Majumdar, Clark D. Thomborson
    Securing Mobile Agents Control Flow Using Opaque Predicates. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:1065-1071 [Conf]
  16. Clark D. Thomborson, Linda L. Deneen, Gary M. Shute
    Computing a Rectilinear Steiner Minimal Tree in nO(sqrt(n)) Time. [Citation Graph (0, 0)][DBLP]
    Parallel Algorithms and Architectures, 1987, pp:176-183 [Conf]
  17. Larry Carter, Jeanne Ferrante, Clark D. Thomborson
    Folklore confirmed: reducible flow graphs are exponentially larger. [Citation Graph (0, 0)][DBLP]
    POPL, 2003, pp:106-114 [Conf]
  18. Christian S. Collberg, Clark D. Thomborson
    Software Watermarking: Models and Dynamic Embeddings. [Citation Graph (0, 0)][DBLP]
    POPL, 1999, pp:311-324 [Conf]
  19. Christian S. Collberg, Clark D. Thomborson, Douglas Low
    Manufacturing Cheap, Resilient, and Stealthy Opaque Constructs. [Citation Graph (0, 0)][DBLP]
    POPL, 1998, pp:184-196 [Conf]
  20. Clark D. Thomborson, Belle W. Y. Wei
    Systolic Implementations of a Move-to-Front Text Compressor. [Citation Graph (0, 0)][DBLP]
    SPAA, 1989, pp:283-290 [Conf]
  21. Christian S. Collberg, Stephen G. Kobourov, Edward Carter, Clark D. Thomborson
    Graph-Based Approaches to Software Watermarking. [Citation Graph (0, 0)][DBLP]
    WG, 2003, pp:156-167 [Conf]
  22. William Zhu, Clark D. Thomborson, Fei-Yue Wang
    Applications of Homomorphic Functions to Software Obfuscation. [Citation Graph (0, 0)][DBLP]
    WISI, 2006, pp:152-153 [Conf]
  23. Gary M. Shute, Linda L. Deneen, Clark D. Thomborson
    An O(n log n) Plane-Sweep Algorithm for L_1 and L_\infty Delaunay Triangulations. [Citation Graph (0, 0)][DBLP]
    Algorithmica, 1991, v:6, n:2, pp:207-221 [Journal]
  24. Clark D. Thomborson
    Does Your Workstation Computation Belong on a Vector Supercomputer? [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1993, v:36, n:11, pp:41-49 [Journal]
  25. Akito Monden, Antoine Monsifrot, Clark D. Thomborson
    Tamper-Resistant Software System Based on a Finite State Machine. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:112-122 [Journal]
  26. Clark D. Thomborson
    The Economics of Large-Memory Computations. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1998, v:66, n:5, pp:263-268 [Journal]
  27. Linda L. Deneen, Gary M. Shute, Clark D. Thomborson
    A Probaby Fast, Provably Optimal Algorithm for Rectilinear Steiner Trees. [Citation Graph (0, 0)][DBLP]
    Random Struct. Algorithms, 1994, v:5, n:4, pp:535-558 [Journal]
  28. Pak K. Chan, Martine D. F. Schlag, Clark D. Thomborson, Vojin G. Oklobdzija
    Delay Optimization of Carry-Skip Adders and Block Carry-Lookahead Adders Using Multidimensional Dynamic Programming. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1992, v:41, n:8, pp:920-930 [Journal]
  29. Christian S. Collberg, Clark D. Thomborson
    Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 2002, v:28, n:8, pp:735-746 [Journal]
  30. Stephen Drape, Anirban Majumdar, Clark D. Thomborson
    Slicing Aided Design of Obfuscating Transforms. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2007, pp:1019-1024 [Conf]
  31. Stephen Drape, Clark D. Thomborson, Anirban Majumdar
    Specifying Imperative Data Obfuscations. [Citation Graph (0, 0)][DBLP]
    ISC, 2007, pp:299-314 [Conf]
  32. William Zhu, Clark D. Thomborson
    Extraction in software watermarking. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2006, pp:175-181 [Conf]
  33. Christian S. Collberg, Clark D. Thomborson, Gregg M. Townsend
    Dynamic graph-based software fingerprinting. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Program. Lang. Syst., 2007, v:29, n:6, pp:- [Journal]

  34. Slicing obfuscations: design, correctness, and evaluation. [Citation Graph (, )][DBLP]


  35. A semi-dynamic multiple watermarking schemefor java applications. [Citation Graph (, )][DBLP]


  36. Metrics-based Evaluation of Slicing Obfuscations. [Citation Graph (, )][DBLP]


  37. A Model for New Zealand's Identity Verification Service. [Citation Graph (, )][DBLP]


  38. Axiomatic and Behavioural Trust. [Citation Graph (, )][DBLP]


Search in 0.420secs, Finished in 0.423secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002