共 25 条
[1]
Aucsmith D., 1996, Information Hiding. First International Workshop Proceedings, P317
[2]
Balacheff B., 2002, TRUSTED COMPUTING PL
[3]
Brickell E., 2004, ACM CCS 2004, P132, DOI [DOI 10.1109/TSC.2010.60, DOI 10.1145/1030083.1030103]
[4]
CECCATO M, 2007, 7 IEEE INT WORK C SO
[5]
Virtual leashing: Internet-based software piracy protection
[J].
25TH IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS,
2005,
:283-292
[7]
Giffin JT, 2005, 21st Annual Computer Security Applications Conference, Proceedings, P18
[8]
Haldar V., 2004, VIRT MACH RES TECHN, P29
[9]
Huelsbergen, 2006, P ACM S INF COMP COM, P189
[10]
Kauer B., 2007, P USENIX SEC S AUG 6