Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

White-Box Cryptography and an AES Implementation., , , and . Selected Areas in Cryptography, volume 2595 of Lecture Notes in Computer Science, page 250-270. Springer, (2002)Data flow analysis for 'intractable' system software.. SIGPLAN Symposium on Compiler Construction, page 109-117. ACM, (1986)A White-Box DES Implementation for DRM Applications., , , and . Digital Rights Management Workshop, volume 2696 of Lecture Notes in Computer Science, page 1-15. Springer, (2002)Information Hiding in Software with Mixed Boolean-Arithmetic Transforms., , , and . WISA, volume 4867 of Lecture Notes in Computer Science, page 61-75. Springer, (2007)An Approach to the Obfuscation of Control-Flow of Sequential Computer Programs., , , and . ISC, volume 2200 of Lecture Notes in Computer Science, page 144-155. Springer, (2001)A compiler-based infrastructure for software-protection., , and . PLAS, page 33-44. ACM, (2008)White-box cryptography: practical protection on hostile hosts., , , , and . SSPREW@ACSAC, page 4:1-4:8. ACM, (2016)Disclosure of corporate social performance. Praeger special studies Praeger, New York, (1979)High tsunami frequency as a result of combined strike-slip faulting and coastal landslides, , , , , , , , , and 11 other author(s). Nature Geoscience, 3 (11): 783--788 (October 2010)