A Reusable Software Copy Protection Using Hash Result and Asymetrical Encryption

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Protection Reconfiguration for Reusable Software

Secure distributed applications often include code to authenticate users, verify access rights, and establish secure communication channels between software components (e.g., clients and servers). This code is often specific to the application and to the context in which the application is used. Embedding protection definitions in the application code makes it difficult to reuse because differe...

متن کامل

Chemical Engineering Software and Legal Protection Thereof

In recent years, an increasing number of Chemical Engineering Software (CES), which play an important role in improving efficiency in the petroleum industry, has been introduced to the                market. Generally, software is the product of intellectual creativity, but protection of the intellectual property residing in software is the subject of some controversy.  This paper explores the ...

متن کامل

Digital Image Protection using Keyed Hash Function

Digital image authentication is an essential attribute for protecting digital image from piracy and copyright violator. Anti-piracy, digital watermarking, and ownership verification are some mechanisms evolving over the years for achieving digital image authentication. Cryptographic primitives, such as hash function, digital signature, and message authentication codes are being used in several ...

متن کامل

Message Encryption and Authentication Using One-Way Hash Functions

A one-way hash function is an important cryptographic primitive for digital signatures and authentication. Recently much work has been done toward construction of other cryptographic algorithms (e.g., MACs) using hash functions. In particular, such algorithms would be easy to implement with existing codes of hash functions if they are used as a black box without modiication. In this paper we pr...

متن کامل

Strenthening Hash Functions using Block Symmetric Key Encryption Algorithm

With the requirement of high speed network protocols, fast message integrity and authentication services are at the top most priority. Currently many integrity techniques, that involve hashing, are being used and developed, but almost every technique faces one or other attack or any other security or performance related issue. The chief problem being faced is the forgery of hash value, being tr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: ComTech: Computer, Mathematics and Engineering Applications

سال: 2014

ISSN: 2476-907X,2087-1244

DOI: 10.21512/comtech.v5i2.2215