Traitor tracing schemes for protected software implementations.
Marc JoyeTancrède LepointPublished in: Digital Rights Management Workshop (2011)
Keyphrases
- software implementation
- software systems
- software development
- user interface
- software design
- software projects
- software tools
- software engineering
- source code
- software architecture
- efficient implementation
- software maintenance
- development process
- hardware design
- software package
- data flow
- real world
- case study
- decision trees
- learning algorithm