3[1]Collberg C S,Thomborson C D.Watermarking,tamper-proofing,and obfuscationn-tools for software protection[J].IEEE Transactions on Software Engineering,2002,28(8):735-746
4[2]Knuth D E.Fundamental algorithms,volume 1 of the art of computer programmingp [M].MA:AddisonWesley,1997.
5[3]Kundu S,Misra J.A linear tree partitioning algorithm [J].SIAM Journal of Computing,1997,6(1):151-154
7[5]Collberg C,Carter E,Kobourov S,et al.Error-correcting graphs for software watermarking[A].In:29th Workshop on Graphs Theoretic Concepts in Computer Science,2003.
8COLLBERG C, THOMBORSON C. Software watermarking: Models and dynamic embeddings [A]. Proceedings of 26th Annual SIGPLAN-SIGACT Symon Principles of Programming Languages [C]. New York: ACM, 1999: 311-324.
9MONDEN A, LIDA H, MATSUMOTO K I, et al. A practical method for watermarking Java programs [A]. Proceedings of 24th Computer Software and Applications Conference [C]. Los Alamitos: IEEE-CS, 2000: 191-197.
10ARBOIT G. A method for watermarking Java programs via opaque predicates [A]. Proceedings of Fifth International Conference on Electronic Commerce Research [C]. Los Alamitos: IEEE-CS,2002: 124-131.