References
- 강호갑, DRM 최신 국제표준 기술사양분석 및 세계 유명제품 동향과 전망에 관한 연구, 한국소프트웨어진흥원, 2004.
- 오병택, 문병주, 이동일, "디지털 워터마킹 기술동향 및 전망", 전자통신동향분석 제17권 제6호, pp. 155-162, 2002
- C. Collberg, S. Jha, D. Tomko and H. Wang. "UWStego: A General Architecture for Software Watermarking", Technical Report(Aug. 31, 2001), available on http://www.cs.wisc.edu/ hbwang/watermark/TR.ps on Nov. 20 , 2004
- S. Jamal H. Zaidi and Hongxia Wang, "On the Analysis of Dynamic Software Watermarking", International Journal of Computer Science and Security, vol.4 issue 2, 2010
- Christian S. Collberg, C. Thomborson, "Watermarking, tamper-proffing, and obfuscation: tools for software protection", IEEE Transactions on Software Engineering, v.28 n.8, p.735-746, August 2002 https://doi.org/10.1109/TSE.2002.1027797
- X. Zhang, F. He and W. Zuo. "Hash Function Based Software Watermarking". In Proc. of ASEA 2008, IEEE Computer Society Conference, pp. 95-98, 2008
- A. Monden, H. Iida, K. Matsumoto, K. Inoue, K. Torii, "A Practical Method for Watermarking Java Programs", Computer Software and Applications Conference 2000, pp. 191-197, 2000.
- 이병용 최용수, "Obfuscation 기술의 현황 및 분석과 향후 개발 방향", 보안공학연구논문지, Vol. 5, No. 2, pp. 43-52, 2008
- Developer Resources for Java Technology, http://java.sun.com/
- W. Zhu1, C. Thomborson and F. Wang, "A Survey of Software Watermarking", Lecture Notes in Computer Science, Vol 3495, pp. 454-458, 2005
- W. F. Zhu, "Concepts and Techniques in Software Watermarking and Obfuscation", Ph.D Thesis, The Department of Computer Sciences, The University of Auckland, 2007
- A. Menezes, P. van Oorschot and S. Vanstone, "Handbook of Applied Cryptography," CRC Press, Boca Raton, FL, 1996
- Android at Google I/O, http://www.android.com/