Um die anderen Arten von Veröffentlichungen zu diesem Thema anzuzeigen, folgen Sie diesem Link: Software protection. Computer software.

Zeitschriftenartikel zum Thema „Software protection. Computer software“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit Top-50 Zeitschriftenartikel für die Forschung zum Thema "Software protection. Computer software" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.

1

Aubyn, John St. „Computer-software protection“. Learned Publishing 5, Nr. 2 (01.01.1992): 103–4. http://dx.doi.org/10.1002/leap/50035.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Menell, Peter S. „Tailoring Legal Protection for Computer Software“. Stanford Law Review 39, Nr. 6 (Juli 1987): 1329. http://dx.doi.org/10.2307/1228849.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Cifuentes, C. „Australian Recommendations on Computer Software Protection“. Computer Journal 39, Nr. 7 (01.07.1996): 566–76. http://dx.doi.org/10.1093/comjnl/39.7.566.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Greaves, D. W. „Computer software — Protection/liability/law/forms“. Computer Law & Security Review 4, Nr. 3 (September 1988): 5. http://dx.doi.org/10.1016/0267-3649(88)90026-x.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Assia, Naomi. „Software protection in Israel“. International Review of Law, Computers & Technology 7, Nr. 1 (Januar 1993): 221–30. http://dx.doi.org/10.1080/13600869.1993.9966364.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Tan, Hua Shan, und Yang Yang. „A Software Protection Method Based on Computer Fingerprint and Asymmetric Encryption“. Advanced Materials Research 756-759 (September 2013): 1215–19. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.1215.

Der volle Inhalt der Quelle
Annotation:
Software protection is an important research area in computer field. Combined with the traditional asymmetric encryption algorithm which provides the measures of protection, computer fingerprint was employed to identify the protection object. This novel software protection method is called AEA-CF, which means asymmetric encryption algorithm based on computer fingerprint. The computers used AEA-CF should be running on Internet so that the authentication information could be provided by server. The experiments show that this method could protect software effectively.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Zhao, Chun Yang, und Wei Ping Wang. „USB Storage Device Protection Software“. Advanced Materials Research 722 (Juli 2013): 244–49. http://dx.doi.org/10.4028/www.scientific.net/amr.722.244.

Der volle Inhalt der Quelle
Annotation:
U disk is the most convenient external memory, it is simple and easy to carry, but at the same time it is best tools to bring the virus. Limiting the use of USB interface effectively not only can limit the circulation of the virus, but also can play a part in safety precautions. In fact ,the easiest way of restricting USB interface is to modify the registry,but for many users, dealing with Registry keys is a boring job,for ordinary users, the application is the best way to solve this problem. This article describes a software development process, focusing on how to use C # to modify the registry key and password protection settings, to provide some reference for computer enthusiasts.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Samuels, Linda B., und Jeffrey M. Samuels. „New Developments in Copyright Protection of Computer Software“. International Journal of Legal Information 15, Nr. 5-6 (Dezember 1987): 195–200. http://dx.doi.org/10.1017/s0731126500021090.

Der volle Inhalt der Quelle
Annotation:
The scope of copyright protection for computer programs has proven to be a vexing issue for the courts. Over the past year, several courts focused on the issue and reached different results. This article will give background and then review and comment upon the newest decisions.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Roarke, Robert F., und Catherine Szenczy. „Computer software and copyright protection: Health care implications“. Journal of Healthcare Risk Management 12, Nr. 4 (Juni 1992): 5–11. http://dx.doi.org/10.1002/jhrm.5600120404.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Shalgi, Moshe. „Copyright in Software and Data“. Israel Law Review 21, Nr. 1 (1986): 15–22. http://dx.doi.org/10.1017/s0021223700008852.

Der volle Inhalt der Quelle
Annotation:
The advent of a new brand of intellectual creativity, which followed developments in computer technology, created a considerable body of proprietory interests in computer software and data. There was therefore a search for legal instruments to provide protection against unauthorized exploitation of the intellectual property in them.Several legal paths were attempted: contractual protection, patent law, trade secrets law and copyright. Of these, the current opinion is that copyright law is the most suitable instrument to protect rights in software and data.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
11

Li, Yu Xiang. „The Choice of Legal Protection Mode of Computer Software“. Advanced Materials Research 926-930 (Mai 2014): 2827–31. http://dx.doi.org/10.4028/www.scientific.net/amr.926-930.2827.

Der volle Inhalt der Quelle
Annotation:
Computer software is an information product [2]. Since the rising of the computer software industry during the 1960’s, the dispute into the best way to protect computer software has never stopped. Human society has already entered the information age, the development of the computer software industry is happening more rapidly than ever before. The application of using legal means to effectively protect computer software, is not only crucial to the development of the computer software industry, but also for national science and technology, the development of the economy is of great significance. This paper summarizes the present situation of international protection of computer software, based on the analysis of the quality of copyright law, patent law, and trade secret law to protect computer software and the analysis of the protected mode all over the world, put forward the author’s suggestions for the legal protection model.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
12

Xiong, Wenjie, Andre Schaller, Stefan Katzenbeisser und Jakub Szefer. „Software Protection Using Dynamic PUFs“. IEEE Transactions on Information Forensics and Security 15 (2020): 2053–68. http://dx.doi.org/10.1109/tifs.2019.2955788.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
13

Stytz, M. R., und J. A. Whittaker. „Software protection: security's last stand?“ IEEE Security & Privacy 1, Nr. 1 (Januar 2003): 95–98. http://dx.doi.org/10.1109/msecp.2003.1177004.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
14

Syarif, Hisyam. „English about Antivirus Software“. International Research Journal of Management, IT & Social Sciences 2, Nr. 1 (01.01.2015): 26. http://dx.doi.org/10.21744/irjmis.v2i1.56.

Der volle Inhalt der Quelle
Annotation:
Antivirus is a type of software used to detect existing viruses on the computer system. Antivirus software also known as virus protection software. With this software we can find out whether a computer system is exposed to a virus or not. In general, this software runs in the background or the background, and also perform a scan of all files that are accessed. In today's antivirus Progress has been transformed and has many uses associated with the virus. But also the computer's performance. The virus code also usually always updated by the antivirus developer. So the computer is ensured its empowering. Even by new viruses though.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
15

Borking, John. „Contract solutions in software protection“. Computer Law & Security Review 1, Nr. 1 (Mai 1985): 1–3. http://dx.doi.org/10.1016/0267-3649(85)90036-6.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
16

Jerrard, D. G. „International legal protection for software“. Computer Law & Security Review 6, Nr. 4 (November 1990): 13. http://dx.doi.org/10.1016/0267-3649(90)90128-x.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
17

Gautam, Pratiksha, und Hemraj Saini. „A Novel Software Protection Approach for Code Obfuscation to Enhance Software Security“. International Journal of Mobile Computing and Multimedia Communications 8, Nr. 1 (Januar 2017): 34–47. http://dx.doi.org/10.4018/ijmcmc.2017010103.

Der volle Inhalt der Quelle
Annotation:
Over the past few decades ago, software developers analyzed robustly several forms of software protection against illegal copying or piracy. With the expansion in digital technology, the risk of illegal copying of software also amplifies. The increasing piracy rate has posed a serious threat to software developers leading to the development of various software protection techniques. However, various techniques have been proposed for copyright protection such as software watermarking, obfuscation, tamper-proofing and diversity. The code transformation (obfuscation) is a method of transforming a program into a form which is more complicated for an adversary to understand or change the original code from an illegitimate process of reverse engineering. None of the current code obfuscation approaches provide resistance from reverse engineering attacks. The reverse engineering threat occurs due to the unconfined software code to the user. Malicious reverse engineering of software codes can be harder by exertion of code transformation on software programs. To address this, we acquaint a peculiar code transformation approach for software protection. The proposed approach is used semantically equivalent to code clone within the source code to protect logical part of program text. We have successfully implement our approach using open source java project Gantt project system and open source java obfuscator's tools. In this paper, we present our approach and demonstrate it with an illustration. The intent of this method is to prevent static analysis attack and make dynamic attack compact for an adversary. This makes it worthwhile against reverse engineering attacks.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
18

Dunn, Susan A. „Defining the Scope of Copyright Protection for Computer Software“. Stanford Law Review 38, Nr. 2 (Januar 1986): 497. http://dx.doi.org/10.2307/1228702.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
19

Dubrovin, A. S., E. A. Rogozin, Yu A. Meshcheryakov und V. V. Obukhov. „Program Techniques for Software Protection in Computer-Aided Systems“. Telecommunications and Radio Engineering 62, Nr. 7 (2004): 633–38. http://dx.doi.org/10.1615/telecomradeng.v62.i7.50.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
20

TANI, YOSHIKAZU. „Protection of Computer Software by Means of Patent System.“ Journal of the Institute of Electrical Engineers of Japan 114, Nr. 6 (1994): 385–88. http://dx.doi.org/10.1541/ieejjournal.114.385.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
21

Donovan, S. „Patent, copyright and trade secret protection for computer software“. IEEE Antennas and Propagation Magazine 34, Nr. 1 (Februar 1992): 33–38. http://dx.doi.org/10.1109/74.125887.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
22

Jackson, Keith. „The protection of computer software— its technology and application“. Computer Fraud & Security Bulletin 11, Nr. 10 (August 1989): 13–14. http://dx.doi.org/10.1016/0142-0496(89)90164-1.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
23

Puri, K. „Copyright protection of software in Australia“. Information & Communications Technology Law 1, Nr. 1 (Januar 1992): 79–114. http://dx.doi.org/10.1080/13600834.1992.9965643.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
24

Wehlau, Andreas. „Software protection under European community law“. Information & Communications Technology Law 2, Nr. 1 (Januar 1993): 3–19. http://dx.doi.org/10.1080/13600834.1993.9965665.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
25

Knight, J. „Fascinating book on protection of software“. Information and Software Technology 33, Nr. 5 (Juni 1991): 384. http://dx.doi.org/10.1016/0950-5849(91)90109-o.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
26

Wang, Pin. „Safety Testing Method Analysis of Computer Software“. Applied Mechanics and Materials 299 (Februar 2013): 135–38. http://dx.doi.org/10.4028/www.scientific.net/amm.299.135.

Der volle Inhalt der Quelle
Annotation:
Along with the computer network application becomes more popular, along with our country Internet market becoming stronger, more and more individuals or enterprises to commercial activities into the electronic commerce platform, so the computer software security has become increasingly important. Therefore, to strengthen the security of computer software protection research is very necessary, and guarantee the software safety is one of the effective means of software security hidden trouble detection. This paper will discuss the computer software system in safety detection method. Computer software security testing technology is existing computer software safety based, effective recognition computer software security problems in.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
27

Rebecchi, Filippo, Julien Boite, Pierre-Alexis Nardin, Mathieu Bouet und Vania Conan. „DDoS protection with stateful software-defined networking“. International Journal of Network Management 29, Nr. 1 (09.08.2018): e2042. http://dx.doi.org/10.1002/nem.2042.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
28

Kamel, Ibrahim, und Qutaiba Albluwi. „A robust software watermarking for copyright protection“. Computers & Security 28, Nr. 6 (September 2009): 395–409. http://dx.doi.org/10.1016/j.cose.2009.01.007.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
29

Shin, Yukyun “Harry”. „Protection and Enforcement of Copyright for Computer Software in Korea“. Journal of World Intellectual Property 3, Nr. 4 (01.11.2005): 467–92. http://dx.doi.org/10.1111/j.1747-1796.2000.tb00138.x.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
30

Li, Chiang Ling. „The New Prc Regulation for the Protection of Computer Software“. Journal of World Intellectual Property 5, Nr. 3 (01.11.2005): 491–99. http://dx.doi.org/10.1111/j.1747-1796.2002.tb00167.x.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
31

Menell, Peter S. „The Challenges of Reforming Intellectual Property Protection for Computer Software“. Columbia Law Review 94, Nr. 8 (Dezember 1994): 2644. http://dx.doi.org/10.2307/1123151.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
32

Moldovyan, A. A., und N. A. Moldovyan. „SOFTWARE ENCRYPTION ALGORITHMS FOR TRANSPARENT PROTECTION TECHNOLOGY“. Cryptologia 22, Nr. 1 (Januar 1998): 56–68. http://dx.doi.org/10.1080/0161-119891886786.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
33

Anil, Aditya, D. K. Mohanta, D. Sinha Roy und A. K. Panda. „Software reliability estimation of computer relaying for transmission line protection using user-oriented software reliability model“. International Journal of Power and Energy Conversion 1, Nr. 2/3 (2009): 300. http://dx.doi.org/10.1504/ijpec.2009.027949.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
34

de Vuyst, Bruno, und Alea Fairchild. „Legal and Economic Justification for Software Protection“. International Journal of Open Source Software and Processes 4, Nr. 3 (Juli 2012): 1–12. http://dx.doi.org/10.4018/ijossp.2012070101.

Der volle Inhalt der Quelle
Annotation:
This article discusses legal and economic rationale in regards to open source software protection. Software programs are, under TRIPS1, protected by copyright (reference is made to the Berne Convention2). The issue with this protection is that, due to the dichotomy idea/expression that is typical for copyright protection, reverse engineering of software is not excluded, and copyright is hence found to be an insufficient protection. Hence, in the U.S., software makers have increasingly turned to patent protection. In Europe, there is an exclusion of computer programs in Article 52 (2) c) EPC (EPO, 1973), but this exclusion is increasingly narrowed and some call for abandoning the exclusion altogether. A proposal by the European Commission, made in 2002, called for a directive to allow national patent authorities to patent software in a broader way, so as to ensure further against reverse engineering; this proposal, however, was shelved in 2005 over active opposition within and outside the European parliament. In summary, open source software does not fit in any proprietary model; rather, it creates a freedom to operate. Ultimately, there is a need to rethink approaches to property law so as to allow for viable software packaging in both models.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
35

Suslina, Irina, und Valeriya Tarasova. „Law Protection of Computer Programs in the State of Israel“. Tirosh. Jewish, Slavic & Oriental Studies 18 (2018): 206–18. http://dx.doi.org/10.31168/2658-3380.2018.18.4.2.

Der volle Inhalt der Quelle
Annotation:
Nowadays IT sphere all over the world experiences rapid growth. This situation also refers to the State of Israel that is considered to be one of the leaders in IT-startups and IT sphere in all. The development of IT has a great influence on economy of Israel and its economic development. Application software is usually defined as a main unit in information technologies. Therefore, legal protection of software becomes one of the most important issues regarding IT sphere. Intellectual property law in Israel is mostly based on British intellectual property law. International legislation concerning intellectual property also influences Israeli IP law. As in the majority of countries, in Israel software is considered as an object of copyright law and it is protected in compliance with its provisions. Copyright law is regulated by the Copyright Act passed the Knesset in 2007. The term of protection granted by this Act shall be the life of the author and seventy years after his death. In accordance with the main principle of copyright law, software has been protected since the moment the software was created. That means that software in Israel does not subject to registration or any other procedure of its kind. It is also possible to register a logo and a unique name of software as a trademark, and this can become a substantial addition to the law protection.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
36

NOYA, Yoichi, Shozi MASUKO, Toshiyuki OHNISHI und Sigeru KASAHARA. „Utilization of a Computer Using Spreadsheet Software for Radiation Protection Management.“ RADIOISOTOPES 41, Nr. 11 (1992): 577–80. http://dx.doi.org/10.3769/radioisotopes.41.11_577.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
37

Kingston, David. „Computer Software Reviews. Environmental Protection Agency's Sampling and Analysis Methods Database“. Journal of Chemical Information and Modeling 32, Nr. 5 (01.09.1992): 573–74. http://dx.doi.org/10.1021/ci00009a605.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
38

Pugh, Edward Bryn. „Legal protection of computer software against misuse ? Feasibility or fond hope?“ Liverpool Law Review 9, Nr. 1 (März 1987): 45–67. http://dx.doi.org/10.1007/bf01207249.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
39

Wibisurya, Aswin, und Timothy Yudi Adinugroho. „A Reusable Software Copy Protection Using Hash Result and Asymetrical Encryption“. ComTech: Computer, Mathematics and Engineering Applications 5, Nr. 2 (01.12.2014): 647. http://dx.doi.org/10.21512/comtech.v5i2.2215.

Der volle Inhalt der Quelle
Annotation:
Desktop application is one of the most popular types of application being used in computer due to the one time install simplicity and the quick accessibility from the moment the computer being turned on. Limitation of the copy and usage of desktop applications has long been an important issue to application providers. For security concerns, software copy protection is usually integrated with the application. However, developers seek to reuse the copy protection component of the software. This paper proposes an approach of reusable software copy protection which consists of a certificate validator on the client computer and a certificate generator on the server. The certificate validator integrity is protected using hashing result while all communications are encrypted using asymmetrical encryption to ensure the security of this approach.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
40

Coneby, Randy, und Fred Gallegos. „Software Protection Techniques: Control Issues for is Auditors“. EDPACS 27, Nr. 10 (April 2000): 1–12. http://dx.doi.org/10.1201/1079/43256.27.10.20000401/30326.1.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
41

Merling, Daniel, Steffen Lindner und Michael Menth. „Robust LFA Protection for Software-Defined Networks (RoLPS)“. IEEE Transactions on Network and Service Management 18, Nr. 3 (September 2021): 2570–86. http://dx.doi.org/10.1109/tnsm.2021.3090843.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
42

Freed, Roy N. „Legal protection of software—a global view from Japan“. International Review of Law, Computers & Technology 4, Nr. 1 (Januar 1989): 71–78. http://dx.doi.org/10.1080/13600869.1989.9966279.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
43

Cash, B. „The Last Place in the World - Copyright Protection for Computer Software in New Zealand“. Victoria University of Wellington Law Review 27, Nr. 3 (03.11.1997): 391. http://dx.doi.org/10.26686/vuwlr.v27i3.6109.

Der volle Inhalt der Quelle
Annotation:
Computer technology - whether it is hardware, software or the internet - is the headache that just won't go away for anyone grappling with the law of intellectual property. With the Copyright Act 1994, the New Zealand legislature attempted to meet some of the challenges but it largely avoided the issue, passing the headache onto the judiciary should any tricky issues arise. One such issue is copyright protection for computer programs. The Copyright Act 1994 makes it clear that computer programs are protected as a literary work but how far does that protection extend (or how far do we carry the fiction that a computer program is literary work)? This article attempts to second guess what level of protection our courts might provide. It argues that New Zealand has shown a willingness to protect functional items and would protect the "look and feel" of a program, providing a level of protection which courts in the United States have considered undesirable.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
44

Dedman, Richard. „Legal protection of software in the United Kingdom“. Computer Law & Security Review 3, Nr. 5 (Januar 1988): 10–14. http://dx.doi.org/10.1016/0267-3649(88)90107-0.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
45

Guifeng, Shi, Ouyang Lingnan und Zhang Qingsheng. „Policies of software protection: The practice of China“. Computer Law & Security Review 21, Nr. 4 (Januar 2005): 338–43. http://dx.doi.org/10.1016/j.clsr.2005.06.012.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
46

May, J., G. Hughes und A. D. Lunn. „Reliability estimation from appropriate testing of plant protection software“. Software Engineering Journal 10, Nr. 6 (1995): 206. http://dx.doi.org/10.1049/sej.1995.0026.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
47

Yan, Ke. „A Practical Method for Software Encryption“. Applied Mechanics and Materials 571-572 (Juni 2014): 535–38. http://dx.doi.org/10.4028/www.scientific.net/amm.571-572.535.

Der volle Inhalt der Quelle
Annotation:
Some technical measures should be taken for software protection in addition to the laws and regulations. Software encryption is a commonly used method. The main methods of software encryption are introduced here firstly, and the characteristics of different methods are given. Then the idea of encryption card based on computer system bus is put forward. The design of logical circuit for the concrete realization is shown and the key detection process is described. The key is generated by the port address dynamically with the encryption card. There are several key with multi port. The encryption card is difficult to decrypt and is with good stability, high reliability.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
48

Esteve, Asuncion. „Patent Protection of Computer-Implemented Inventions Vis-A-Vis Open Source Software“. Journal of World Intellectual Property 9, Nr. 3 (Mai 2006): 276–300. http://dx.doi.org/10.1111/j.1422-2213.2006.00278.x.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
49

Neophytou, J. P. „How will the scope of protection afforded to computer software be defined?“ Journal of Intellectual Property Law & Practice 5, Nr. 12 (01.11.2010): 837–39. http://dx.doi.org/10.1093/jiplp/jpq156.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
50

Hinshaw, M. Joseph. „The role of standardization and interoperability in copyright protection of computer software“. Communication Law and Policy 4, Nr. 3 (Juni 1999): 299–323. http://dx.doi.org/10.1080/10811689909368680.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!

Zur Bibliographie