Software watermarking scheme with cloud computing constraints

A non-equivalent semantic obfuscation-based software watermarking,scheme was introduced to satisfy the demands of software intellectual property breaches in cloud.Via obfuscated source codes,part of semantics was cut into a recovery module to make the source code unavailable.Watermarks map to transf...

Full description

Bibliographic Details
Main Authors: Guang SUN, Xiao-ping FAN, Wang-dong JIANG,Hang-jun ZHOU,Sheng-zong LIU,Chun-hong GONG,Jing ZHU
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2016-09-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2016.00083