版权说明 操作指南
首页 > 成果 > 详情

Software Protection with Encryption and Verification

认领
导出
Link by DOI
反馈
分享
QQ微信 微博
成果类型:
期刊论文、会议论文
作者:
Liu, Wentao*
通讯作者:
Liu, Wentao
作者机构:
[Liu, Wentao; Liu, WT] Wuhan Polytech Univ, Dept Comp & Informat Engn, Wuhan 430023, Hubei Provice, Peoples R China.
通讯机构:
[Liu, Wentao] W
Wuhan Polytech Univ, Dept Comp & Informat Engn, Wuhan 430023, Hubei Provice, Peoples R China.
语种:
英文
关键词:
encryption;software protection;verification
期刊:
Advances in Intelligent and Soft Computing
ISSN:
1867-5662
年:
2012
卷:
115
期:
VOL. 2
页码:
131-138
会议名称:
2009 Pacific-Asia Conference on Knowledge Engineering and Software Engineering, KESE 2009
会议论文集名称:
Software Engineering and Knowledge Engineering: Theory and Practice
会议时间:
19 December 2009 through 20 December 2009
会议地点:
Shenzhen, PEOPLES R CHINA
会议主办单位:
Wuhan Polytech Univ, Dept Comp & Informat Engn, Wuhan 430023, Hubei Provice, Peoples R China.
会议赞助商:
Int Sci & Engn Ctr, Wuchang Univ Technol
主编:
Yanwen Wu
出版地:
HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY
出版者:
Springer, Berlin, Heidelberg
ISBN:
9783642253485
机构署名:
本校为第一且通讯机构
院系归属:
数学与计算机学院
摘要:
The software protection is the key technology for the shareware and it can delay and prevent the software reverse and cracking. There are many methods such as junk code, anti-debug, virtual machine, deformation, packers, encryption and verification. The software registration is the most important step of protection and it can be implemented by many forms such as network registration, license key or file, dongle. This paper introduces and compares these protection methods. Some architectures of protection based on encryption and verification are provided and they are realized by RSA encryption ...

反馈

验证码:
看不清楚,换一个
确定
取消

成果认领

标题:
用户 作者 通讯作者
请选择
请选择
确定
取消

提示

该栏目需要登录且有访问权限才可以访问

如果您有访问权限,请直接 登录访问

如果您没有访问权限,请联系管理员申请开通

管理员联系邮箱:yun@hnwdkj.com