Works matching DE "SOFTWARE protection"


Results: 83
    1

    Watermarking by numbers.

    Published in:
    Nature, 1996, v. 384, n. 6609, p. 514, doi. 10.1038/384514a0
    By:
    • Zhao, Jian
    Publication type:
    Article
    2
    3
    4
    5

    Parameters for Software Piracy Research.

    Published in:
    Information Society, 2008, v. 24, n. 4, p. 199, doi. 10.1080/01972240802189468
    By:
    • Holsapple, ClydeW.;
    • Iyengar, Deepak;
    • Jin, Haihao;
    • Rao, Shashank
    Publication type:
    Article
    6
    7
    8

    On Best-Possible Obfuscation.

    Published in:
    Journal of Cryptology, 2014, v. 27, n. 3, p. 480, doi. 10.1007/s00145-013-9151-z
    By:
    • Goldwasser, Shafi;
    • Rothblum, Guy
    Publication type:
    Article
    9
    10
    11
    12
    13
    14
    15
    16
    18
    19
    20

    Modern obfuscation methods for secure coding.

    Published in:
    Ukrainian Scientific Journal of Information Security, 2016, v. 22, n. 1, p. 32, doi. 10.18372/2225-5036.22.10451
    By:
    • I., Stepanenko;
    • V., Kinzerya;
    • A., Nagi;
    • I., Lozinskyi
    Publication type:
    Article
    21
    22
    23
    24

    USAGE OF UNAUTHORIZED SOFTWARE IN TAIWAN.

    Published in:
    Social Behavior & Personality: an international journal, 2008, v. 36, n. 1, p. 1, doi. 10.2224/sbp.2008.36.1.1
    By:
    • Jane Lu Hsu;
    • Ya-Lan Su
    Publication type:
    Article
    25

    Point/Counterpoint.

    Published in:
    IEEE Software, 2011, v. 28, n. 2, p. 56, doi. 10.1109/MS.2011.39
    By:
    • Gu, Yuan Xiang;
    • Wyseur, Brecht;
    • Preneel, Bart;
    • Aussel, Jean-Daniel;
    • Sailer, Reiner
    Publication type:
    Article
    26

    Front Cover.

    Published in:
    IEEE Software, 2011, v. 28, n. 2, p. 1, doi. 10.1109/MS.2011.33
    Publication type:
    Article
    27
    28
    29

    Data Access Routines.

    Published in:
    IEEE Software, 2003, v. 20, n. 6, p. 96, doi. 10.1109/MS.2003.1241375
    By:
    • Fowler, Martin
    Publication type:
    Article
    30
    31

    Protecting against What?

    Published in:
    IEEE Software, 1999, v. 16, n. 1, p. 28, doi. 10.1109/52.744563
    By:
    • Voas, Jeffrey
    Publication type:
    Article
    32
    33
    34

    O ABORDARE JURIDICĂ A LICENȚELOR COPYLEFT.

    Published in:
    Romanian Journal of Intellectual Property Law / Revista Română de Dreptul Proprietăţii Intelectuale, 2015, n. 2, p. 198
    By:
    • Gheorghiu, Raluca-Gabriela
    Publication type:
    Article
    35
    36
    37

    Weak Password Security: An Empirical Study.

    Published in:
    Information Security Journal: A Global Perspective, 2008, v. 17, n. 1, p. 45, doi. 10.1080/10658980701824432
    By:
    • Weber, JamesE.;
    • Guster, Dennis;
    • Safonov, Paul;
    • Schmidt, MarkB.
    Publication type:
    Article
    38
    39

    CD DVD piracy.

    Published in:
    EMedia Professional, 1997, v. 10, n. 12, p. 92
    By:
    • Block, Debbie Galante
    Publication type:
    Article
    40
    41
    42
    43
    44
    45
    46
    47
    48
    49
    50