2005 Pakistan Section Multitopic Conference 2005
DOI: 10.1109/inmic.2005.334498
|View full text |Cite
|
Sign up to set email alerts
|

Development of a Methodology for Piracy Protection of Software Installations

Abstract: With the advent of illegal copying of software and pervasive access to the Internet, software protection has gained increasing importance. Therefore, a complete solution, that provides the software piracy protection capability, is required. It should allow one to protect his/her software applications against piracy, illegal use, or illegitimate copy. The authors surveyed current and promising techniques designed to reliably preserve and protect software installations vital to privacy and security. In this pape… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2008
2008
2020
2020

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 3 publications
0
4
0
Order By: Relevance
“…Gan and Koh [2] used a survey technique at the three universities of Singapore for examining the perception of software piracy and to discover the mentioned factors. Mumtaz et al [13] developed a methodology for piracy protection of secure electronic software distribution.…”
Section: Related Workmentioning
confidence: 99%
“…Gan and Koh [2] used a survey technique at the three universities of Singapore for examining the perception of software piracy and to discover the mentioned factors. Mumtaz et al [13] developed a methodology for piracy protection of secure electronic software distribution.…”
Section: Related Workmentioning
confidence: 99%
“…To prevent software piracy without using specific devices, Mumtaz et al [11] proposed a softlock scheme that involves using hardware component characteristics and applying a Triple Data Encryption Standard to protect software licenses that contained hardware component characters. However, indicated servers must reactivate software online if it is installed a second time.…”
Section: Related Workmentioning
confidence: 99%
“…Intermediate software/hardware methods are also usedtethering a program to a computer or devices signatures (CPU, RAM, ROM, BIOS, OS and etc. serial numbers, model ID and so on) [13][14][15]. Firewalls are used for the protection of internet programs [16].…”
Section: Fig 2 Experimental Structure Of Smart Machine Toolmentioning
confidence: 99%