{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T02:18:48Z","timestamp":1725502728109},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,12]]},"DOI":"10.1109\/isias.2011.6122791","type":"proceedings-article","created":{"date-parts":[[2012,1,11]],"date-time":"2012-01-11T17:01:11Z","timestamp":1326301271000},"page":"35-39","source":"Crossref","is-referenced-by-count":1,"title":["Fixed size encoding scheme for software watermarking"],"prefix":"10.1109","author":[{"given":"Azyan Yusra","family":"Kapi","sequence":"first","affiliation":[]},{"given":"Subariah","family":"Ibrahim","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"\"Watermark Attacks\" [PowerPoint Slides]","year":"2002","author":"zhao","key":"13"},{"journal-title":"Concepts and Techniques in Software Watermarking and Obfuscation","year":"2007","author":"zhu","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/TENCON.2006.343919"},{"key":"3","article-title":"JConstHide: A Framework for Java Source Code Constant Hiding","author":"sivadasan","year":"2009","journal-title":"Computing Research Repository CoRR(2009) Informal Publication"},{"key":"2","first-page":"22","article-title":"Is Software Piracy a Middle Class Crime","author":"justina","year":"0","journal-title":"Workshop on the Law and Economics of Intellectual Property and Information Technology Milan Italy July 2005"},{"journal-title":"Sixth Annual BSA Global and IDC Global Software Piracy Study","year":"2008","author":"alliance","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/CCECE.2001.933564"},{"journal-title":"Tamperproofing a Software Watermark by Encoding Constants","year":"2002","author":"he","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1219058"},{"key":"5","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1007\/978-3-540-79104-1_7","article-title":"Towards Tamper Resistant Code Encryption: Practice and Experience","author":"cappaert","year":"2008","journal-title":"Proc of the 4th International Conference on Information Security Practice and Experience (ISPEC'OS)"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/ISCIS.2008.4717945"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1002\/spe.657"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/CMPSAC.2000.884716"}],"event":{"name":"2011 7th International Conference on Information Assurance and Security (IAS)","start":{"date-parts":[[2011,12,5]]},"location":"Melacca, Malaysia","end":{"date-parts":[[2011,12,8]]}},"container-title":["2011 7th International Conference on Information Assurance and Security (IAS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6112288\/6122777\/06122791.pdf?arnumber=6122791","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T08:36:58Z","timestamp":1497947818000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6122791\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,12]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/isias.2011.6122791","relation":{},"subject":[],"published":{"date-parts":[[2011,12]]}}}