๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

Methods for preventing unauthorized software distribution

โœ Scribed by Mohammad Peyravian; Allen Roginsky; Nevenko Zunic


Publisher
Elsevier Science
Year
2003
Tongue
English
Weight
91 KB
Volume
22
Category
Article
ISSN
0167-4048

No coin nor oath required. For personal study only.

โœฆ Synopsis


In this paper we present algorithms for protecting software from unauthorized installation. We assume that the user buys software on a disk or downloads it from the Internet -although our methods are not limited to protecting software under these circumstances. We consider two kinds of adversaries. One kind of attacker is a sophisticated hacker who can monitor a line and can read and intercept any information flowing unprotected over the Internet. These attackers are also skillful programmers who can analyze the software, locate any data of interest to them and also write and execute any programs, even the most complicated ones. Another kind of attacker is an average attacker who can copy and use personal or business software.


๐Ÿ“œ SIMILAR VOLUMES


Marketing methods for software
โœ Hershey H. Friedman; Linda Weiser Friedman ๐Ÿ“‚ Article ๐Ÿ“… 1987 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 727 KB
Software for distributed computing
โœ R.D. Dowsing ๐Ÿ“‚ Article ๐Ÿ“… 1982 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 558 KB