Number |
Name |
Paper |
1 |
MACNESS, JOSEPH RODNEY ARNOLD |
Cohen, Operating System Protection Through Program Evolution |
3 |
LI, JIHONG |
Margrave, GSM Security and Encryption |
4 |
YIP, HO YEE |
Garcia-Molina & Shivakumar, Safeguarding & Charging for Information on the Internet |
5 |
DONG, QIANG |
Bellare et al, Design [of an] Electronic Payment System |
6 |
VON RANDOW, KARL |
Proebsting & Watterson, Krakatoa: Decompilation in Java |
7 |
YU, GUANGLUN |
LaDue, The Maginot License |
8 |
LEVINE, DANIEL |
|
9 |
PEPER, DENNIS |
Shivakumar & Garcia-Molina, SCAM: A Copy Protection System for Digital Documents |
10 |
CHEN, YE |
Rubin & Geer, Survey of Web Security |
11 |
MCCRACKEN, SHANNON WILLIAM |
Shore, H.323 and Firewalls |
12 |
LAI, HONGYING |
Collberg et al, Breaking Abstractions |
13 |
PAN, RUOBING |
Chess, Security Issues in Mobile Code Systems |
14 |
LIU, CHONGJIAN |
Johnson & Jojodia, Exploring Steganography |
15 |
DONG, JIAN JUN |
Neuman & T'so, Kerberos |
16 |
SHADABI, FARIBA |
Matheson et al, Robustness & Security of Digital Watermarks |
17 |
HE, YONG |
Palsberg et al, Experience with Software Watermarking |
18 |
XU, PING |
Mori & Kawahara, Superdistribution |
19 |
COGHILL, COLIN BLAIR |
Baker et al, RSVP Cryptographic Authentication |
20 |
HUANG, JI |
Baker & Manber, Deducing Similarities in Java Sources from Bytecodes |
21 |
PAXIE, ANDREW LESLIE |
Aucsmith, Tamper Resistant Software |
22 |
CAI, YUHONG |
Dean et al, Java Security |
23 |
WATERS, DAVID NEAL |
Wallach et al, Extensible Security Architectures for Java |
24 |
LAM, PATRICK |
Gong et al, Signing, Sealing & Guarding Java Objects |
25 |
WANG, XIAO |
Hauser, Using the Internet to Decrease Software Piracy |
26 |
ZHOU, NIAN |
Collberg & Thomborson, Software Watermarking |
27 |
DENG, GUOYU |
Ousterhout et al, Safe-Tcl Security Model |
28 |
ROSIE, KATHERINE JANE |
Thompson, Reflections on Trusting Trust |
29 |
NOBLE, MARK ANTHONY |
Maude & Maude, Hardware Protection against Software Piracy |
30 |
LEE, SEUNG JUN |
Simmel & Godard, Metering & Licensing of Resources: Kala's General Purpose Approach |
31 |
CHAN, CONNIE NAM NAM |
Cifuentes & Gough, Decompilation of Binary Programs |