Works matching DE "SOFTWARE protection"


Results: 83
    1
    2
    3
    4

    USAGE OF UNAUTHORIZED SOFTWARE IN TAIWAN.

    Published in:
    Social Behavior & Personality: an international journal, 2008, v. 36, n. 1, p. 1, doi. 10.2224/sbp.2008.36.1.1
    By:
    • Jane Lu Hsu;
    • Ya-Lan Su
    Publication type:
    Article
    6
    7
    8
    9
    10
    11
    12
    13
    14
    15
    16
    17
    18
    19
    20
    21

    On Best-Possible Obfuscation.

    Published in:
    Journal of Cryptology, 2014, v. 27, n. 3, p. 480, doi. 10.1007/s00145-013-9151-z
    By:
    • Goldwasser, Shafi;
    • Rothblum, Guy
    Publication type:
    Article
    22

    Modern obfuscation methods for secure coding.

    Published in:
    Ukrainian Scientific Journal of Information Security, 2016, v. 22, n. 1, p. 32, doi. 10.18372/2225-5036.22.10451
    By:
    • I., Stepanenko;
    • V., Kinzerya;
    • A., Nagi;
    • I., Lozinskyi
    Publication type:
    Article
    23
    24
    25
    26
    27
    28
    29
    30

    Parameters for Software Piracy Research.

    Published in:
    Information Society, 2008, v. 24, n. 4, p. 199, doi. 10.1080/01972240802189468
    By:
    • Holsapple, ClydeW.;
    • Iyengar, Deepak;
    • Jin, Haihao;
    • Rao, Shashank
    Publication type:
    Article
    31
    32
    33
    34
    35
    36
    37
    38

    Watermarking by numbers.

    Published in:
    Nature, 1996, v. 384, n. 6609, p. 514, doi. 10.1038/384514a0
    By:
    • Zhao, Jian
    Publication type:
    Article
    39

    Point/Counterpoint.

    Published in:
    IEEE Software, 2011, v. 28, n. 2, p. 56, doi. 10.1109/MS.2011.39
    By:
    • Gu, Yuan Xiang;
    • Wyseur, Brecht;
    • Preneel, Bart;
    • Aussel, Jean-Daniel;
    • Sailer, Reiner
    Publication type:
    Article
    40

    Front Cover.

    Published in:
    IEEE Software, 2011, v. 28, n. 2, p. 1, doi. 10.1109/MS.2011.33
    Publication type:
    Article
    41
    42
    43

    Data Access Routines.

    Published in:
    IEEE Software, 2003, v. 20, n. 6, p. 96, doi. 10.1109/MS.2003.1241375
    By:
    • Fowler, Martin
    Publication type:
    Article
    44
    45

    Protecting against What?

    Published in:
    IEEE Software, 1999, v. 16, n. 1, p. 28, doi. 10.1109/52.744563
    By:
    • Voas, Jeffrey
    Publication type:
    Article
    46
    47
    48

    CD DVD piracy.

    Published in:
    EMedia Professional, 1997, v. 10, n. 12, p. 92
    By:
    • Block, Debbie Galante
    Publication type:
    Article
    49
    50