参考文献/References:
[1] KISSERLI Nessim, PRENEEL Bart. A taxonomy of selfmodifying code for obfuscation[J].Computers & Security,2011, 30(8): 679-691.
[2] 周晓斌, 许勇, 张凌. 一种开放式PKI 身份认证模型的研究[J].国防科技大学学报,2013,35(1):169-174.
ZHOU Xiaobin, XU Yong, ZHANG Ling. Research on open identity authentication model for PKI[J]. Journal of National University of Defense Technology, 2013,35(1):169-174.
[3] 刘莉苹. 基于属性的空间数据访问控制研究[J].计算机工程与设计,2014,35(3):803-808.
LIU Liping. Research of attributed based spatial data access control[J].Computer Engineering and Design,2014,35 (3): 803-808.
[4] GREESHMA Sarath, JAYAPRIYA R. Securing database server using homomorphism encryption and reencryption[J]. Communications in Computer and Information Science, 2015, 536(8):277-289.
[5] ZUNERA Jalil, ANWAR M Mirza. An invisible text watermarking algorithm using image watermark[C]//Tarek Sobh, Khaled Elleithy. Innovations in Computing Sciences and Software Engineering.New York: Springer, 2010:147-152.
[6] VAN der Sloot. Do privacy and data protection rules apply to legal persons and should they? A proposal for a two-tiered system[J].Computer Law & Security Review,
2015, 31(1): 26-45.
[7] VIVEK Balachandran, SABU Emmanuel. Software protection with obfuscation and encryption[J]. Lecture Notes in Computer Science, 2013,7863: 309-320.
[8] 李新良, 罗戈夕. 基于Java 的代码混淆算法研究[J]. 湖南文理学院学报:自然科学版,2010,22(3): 64-69.
LI Xinliang, LUO Gexi. The study of Java code obfuscation algorithm[J]. Journal of Hunan University of Arts and Science(Natural Science Edition), 2010,22(3):64-69.
[9] 王志. 二进制代码路径混淆技术研究[D].天津: 南开大学,2012.
WANG Zhi. Research on binary code path obfuscation[D].Tianjin: Nankai University, 2012.
[10] 程小刚, 郭韧. GB18030 与Unicode 编码转换算法[J].华侨大学学报(自然科学版),2009,30(1):39-41.
CHENG Xiaogang, GUO Ren. Transcoding algorithm between GB18030 and unicode[J]. Journal of HuaQiao University(Natural Science Edition), 2009, 30(1):39-41.
[11] 徐小龙, 周静岚, 杨庚. 一种基于数据分割与分级的云存储数据隐私保护机制[J].计算机科学,2013,40(2):98-102.
XU Xiaolong, ZHOU Jinglan, YANG Geng. Data privacy protection mechanism for cloud storage based on data partition and classification[J]. Computer Science, 2013,
40(2): 98-102.
[12] STEWART GW. The efficient generation of random orthogonal matrices with an application to condition estimators[J]. SIAM Journal on Numerical Analysis, 1980,17(3): 403-409.