White-box cryptography and an AES implementation S Chow, P Eisen, H Johnson, PC Van Oorschot Selected Areas in Cryptography: 9th Annual International Workshop, SAC 2002 …, 2003 | 666 | 2003 |
A white-box DES implementation for DRM applications S Chow, P Eisen, H Johnson, PC Van Oorschot ACM Workshop on Digital Rights Management, 1-15, 2002 | 516 | 2002 |
An approach to the obfuscation of control-flow of sequential computer programs S Chow, Y Gu, H Johnson, VA Zakharov Information Security: 4th International Conference, ISC 2001 Malaga, Spain …, 2001 | 219 | 2001 |
Verifying authenticity of webpages S Chow, J Smith, C Gustave US Patent 7,877,784, 2011 | 179 | 2011 |
Tamper resistant software encoding ST Chow, HJ Johnson, Y Gu US Patent 6,842,862, 2005 | 174 | 2005 |
Tamper resistant software-mass data encoding HJ Johnson, ST Chow, YX Gu US Patent 7,350,085, 2008 | 171 | 2008 |
System and method for protecting computer software from a white box attack HJ Johnson, ST Chow, PA Eisen US Patent 7,397,916, 2008 | 154 | 2008 |
Tamper resistant software-control flow encoding ST Chow, HJ Johnson, Y Gu US Patent 6,779,114, 2004 | 143 | 2004 |
Information system service-level security risk analysis D Wiemer, C Gustave, ST Chow, BK Mcfarlane US Patent 8,438,643, 2013 | 128 | 2013 |
Tamper resistant software encoding ST Chow, HJ Johnson, Y Gu US Patent 6,594,761, 2003 | 116 | 2003 |
Application of cut-sets to network interdependency security risk assessment D Wiemer, JM Robert, B McFarlane, C Gustave, S Chow, J Tang US Patent App. 11/232,004, 2007 | 103 | 2007 |
Security vulnerability information aggregation C Gustave, ST Chow, D Wiemer US Patent 8,544,098, 2013 | 96 | 2013 |
Internet authentication technology ST Chow, HJ Johnson, Y Gu US Patent App. 09/134,731, 2002 | 93 | 2002 |
System and method of hiding cryptographic private keys Y Zhou, ST Chow US Patent 7,634,091, 2009 | 84 | 2009 |
Method and system for secure access ST Chow, HJ Johnson, Y Gu US Patent 7,325,141, 2008 | 77 | 2008 |
Self-steering directional loudspeakers and a method of operation thereof TL Marzetta, S Chow US Patent App. 12/607,919, 2011 | 72 | 2011 |
Secure method and system for computer protection ST Chow, HJ Johnson, A Main, Y Gu US Patent 7,958,554, 2011 | 71 | 2011 |
Encoding technique for software and hardware HJ Johnson, YX Gu, BL Chang, ST Chow US Patent 6,088,452, 2000 | 69 | 2000 |
Caller name authentication to prevent caller identity spoofing ST Chow, V Choyi, D Vinokurov US Patent 9,241,013, 2016 | 68 | 2016 |
Method and apparatus for detecting malware B Abdel-Aziz, ST Chow, SL Chen US Patent 8,112,801, 2012 | 64 | 2012 |