3Qiong Liu, Reihaneh Safavi-Naini, Nicholas Paul Sheppard.Digital rights management for content distribution [ A ]. Proceedings of the Australasian Information Security Workshop Conference on ACSW Frontiers [ C ]. Adelaide, Australia ,2003. 49-58.
4S Hada.Zero-knowledge and code obfuscation[A].Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology[ C]. London, UK: Springer-Verlag GmbH, 2000. 443-457.
5C S Collberg, C Thomborson. Watermarking, tamper-proofing,and obfuscation-tools for software protection[J]. IEEE Transactions on software Engineering,2000,28(8):735-746.
6S A Moskowitz, M Cooperman. Method for Stega-cipher Protection of Computer Code[ CP]. US Patent 5745569, January 1996. Assignee: The Dice Company.
7R L Davidson, N Myhrvold. Method and System for Generating and Auditing a Signature for a Computer Program [ CP]. US Patent 5559884, September 1996. Assignee: Microsoft Corporation .
8R Venkatesan, V Vazirani, S Sinha. A graph theoretic approach to software watermarking[ A]. Proceedings of the 4th International Information Hiding Workshop[ C ]. Pittsburgh, PA,April 2001.157-168.