1984
DOI: 10.1109/mc.1984.1659112
|View full text |Cite
|
Sign up to set email alerts
|

Combatting Software Piracy by Encryption and Key Management

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

1987
1987
2009
2009

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 20 publications
(9 citation statements)
references
References 2 publications
0
9
0
Order By: Relevance
“…are similar in the three methods. Those motives are discussed in depth in [2]. We will not repeat these arguments.…”
Section: Pps Versus Am and Spsmentioning
confidence: 97%
See 2 more Smart Citations
“…are similar in the three methods. Those motives are discussed in depth in [2]. We will not repeat these arguments.…”
Section: Pps Versus Am and Spsmentioning
confidence: 97%
“…The protected routines of the software would be run on the PPS coprocessor. In recent papers [2,13,141, two other software protection methods (henceforth referred to as AM and SPS) were presented. These methods require similar modifications to the internals of the processor.…”
Section: Pps Requires Modificationsmentioning
confidence: 99%
See 1 more Smart Citation
“…And finally, FE provides integrity, unlike Albert & Morse's scheme [2] (see also [13] and [17]). This area is shown in the form of a binary tree in Figure 10, each node of which is numbered for ease of reference.…”
Section: Related Workmentioning
confidence: 99%
“…2 That is, FE provides program integrity, even while the program is in execution. (As we will show below, FE schemes are a function of trusted volume size.…”
Section: Introductionmentioning
confidence: 99%