To see the other types of publications on this topic, follow the link: Software protection. Computer software.

Journal articles on the topic 'Software protection. Computer software'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Software protection. Computer software.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Aubyn, John St. "Computer-software protection." Learned Publishing 5, no. 2 (January 1, 1992): 103–4. http://dx.doi.org/10.1002/leap/50035.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Menell, Peter S. "Tailoring Legal Protection for Computer Software." Stanford Law Review 39, no. 6 (July 1987): 1329. http://dx.doi.org/10.2307/1228849.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Cifuentes, C. "Australian Recommendations on Computer Software Protection." Computer Journal 39, no. 7 (July 1, 1996): 566–76. http://dx.doi.org/10.1093/comjnl/39.7.566.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Greaves, D. W. "Computer software — Protection/liability/law/forms." Computer Law & Security Review 4, no. 3 (September 1988): 5. http://dx.doi.org/10.1016/0267-3649(88)90026-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Assia, Naomi. "Software protection in Israel." International Review of Law, Computers & Technology 7, no. 1 (January 1993): 221–30. http://dx.doi.org/10.1080/13600869.1993.9966364.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Tan, Hua Shan, and Yang Yang. "A Software Protection Method Based on Computer Fingerprint and Asymmetric Encryption." Advanced Materials Research 756-759 (September 2013): 1215–19. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.1215.

Full text
Abstract:
Software protection is an important research area in computer field. Combined with the traditional asymmetric encryption algorithm which provides the measures of protection, computer fingerprint was employed to identify the protection object. This novel software protection method is called AEA-CF, which means asymmetric encryption algorithm based on computer fingerprint. The computers used AEA-CF should be running on Internet so that the authentication information could be provided by server. The experiments show that this method could protect software effectively.
APA, Harvard, Vancouver, ISO, and other styles
7

Zhao, Chun Yang, and Wei Ping Wang. "USB Storage Device Protection Software." Advanced Materials Research 722 (July 2013): 244–49. http://dx.doi.org/10.4028/www.scientific.net/amr.722.244.

Full text
Abstract:
U disk is the most convenient external memory, it is simple and easy to carry, but at the same time it is best tools to bring the virus. Limiting the use of USB interface effectively not only can limit the circulation of the virus, but also can play a part in safety precautions. In fact ,the easiest way of restricting USB interface is to modify the registry,but for many users, dealing with Registry keys is a boring job,for ordinary users, the application is the best way to solve this problem. This article describes a software development process, focusing on how to use C # to modify the registry key and password protection settings, to provide some reference for computer enthusiasts.
APA, Harvard, Vancouver, ISO, and other styles
8

Samuels, Linda B., and Jeffrey M. Samuels. "New Developments in Copyright Protection of Computer Software." International Journal of Legal Information 15, no. 5-6 (December 1987): 195–200. http://dx.doi.org/10.1017/s0731126500021090.

Full text
Abstract:
The scope of copyright protection for computer programs has proven to be a vexing issue for the courts. Over the past year, several courts focused on the issue and reached different results. This article will give background and then review and comment upon the newest decisions.
APA, Harvard, Vancouver, ISO, and other styles
9

Roarke, Robert F., and Catherine Szenczy. "Computer software and copyright protection: Health care implications." Journal of Healthcare Risk Management 12, no. 4 (June 1992): 5–11. http://dx.doi.org/10.1002/jhrm.5600120404.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Shalgi, Moshe. "Copyright in Software and Data." Israel Law Review 21, no. 1 (1986): 15–22. http://dx.doi.org/10.1017/s0021223700008852.

Full text
Abstract:
The advent of a new brand of intellectual creativity, which followed developments in computer technology, created a considerable body of proprietory interests in computer software and data. There was therefore a search for legal instruments to provide protection against unauthorized exploitation of the intellectual property in them.Several legal paths were attempted: contractual protection, patent law, trade secrets law and copyright. Of these, the current opinion is that copyright law is the most suitable instrument to protect rights in software and data.
APA, Harvard, Vancouver, ISO, and other styles
11

Li, Yu Xiang. "The Choice of Legal Protection Mode of Computer Software." Advanced Materials Research 926-930 (May 2014): 2827–31. http://dx.doi.org/10.4028/www.scientific.net/amr.926-930.2827.

Full text
Abstract:
Computer software is an information product [2]. Since the rising of the computer software industry during the 1960’s, the dispute into the best way to protect computer software has never stopped. Human society has already entered the information age, the development of the computer software industry is happening more rapidly than ever before. The application of using legal means to effectively protect computer software, is not only crucial to the development of the computer software industry, but also for national science and technology, the development of the economy is of great significance. This paper summarizes the present situation of international protection of computer software, based on the analysis of the quality of copyright law, patent law, and trade secret law to protect computer software and the analysis of the protected mode all over the world, put forward the author’s suggestions for the legal protection model.
APA, Harvard, Vancouver, ISO, and other styles
12

Xiong, Wenjie, Andre Schaller, Stefan Katzenbeisser, and Jakub Szefer. "Software Protection Using Dynamic PUFs." IEEE Transactions on Information Forensics and Security 15 (2020): 2053–68. http://dx.doi.org/10.1109/tifs.2019.2955788.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Stytz, M. R., and J. A. Whittaker. "Software protection: security's last stand?" IEEE Security & Privacy 1, no. 1 (January 2003): 95–98. http://dx.doi.org/10.1109/msecp.2003.1177004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Syarif, Hisyam. "English about Antivirus Software." International Research Journal of Management, IT & Social Sciences 2, no. 1 (January 1, 2015): 26. http://dx.doi.org/10.21744/irjmis.v2i1.56.

Full text
Abstract:
Antivirus is a type of software used to detect existing viruses on the computer system. Antivirus software also known as virus protection software. With this software we can find out whether a computer system is exposed to a virus or not. In general, this software runs in the background or the background, and also perform a scan of all files that are accessed. In today's antivirus Progress has been transformed and has many uses associated with the virus. But also the computer's performance. The virus code also usually always updated by the antivirus developer. So the computer is ensured its empowering. Even by new viruses though.
APA, Harvard, Vancouver, ISO, and other styles
15

Borking, John. "Contract solutions in software protection." Computer Law & Security Review 1, no. 1 (May 1985): 1–3. http://dx.doi.org/10.1016/0267-3649(85)90036-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Jerrard, D. G. "International legal protection for software." Computer Law & Security Review 6, no. 4 (November 1990): 13. http://dx.doi.org/10.1016/0267-3649(90)90128-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Gautam, Pratiksha, and Hemraj Saini. "A Novel Software Protection Approach for Code Obfuscation to Enhance Software Security." International Journal of Mobile Computing and Multimedia Communications 8, no. 1 (January 2017): 34–47. http://dx.doi.org/10.4018/ijmcmc.2017010103.

Full text
Abstract:
Over the past few decades ago, software developers analyzed robustly several forms of software protection against illegal copying or piracy. With the expansion in digital technology, the risk of illegal copying of software also amplifies. The increasing piracy rate has posed a serious threat to software developers leading to the development of various software protection techniques. However, various techniques have been proposed for copyright protection such as software watermarking, obfuscation, tamper-proofing and diversity. The code transformation (obfuscation) is a method of transforming a program into a form which is more complicated for an adversary to understand or change the original code from an illegitimate process of reverse engineering. None of the current code obfuscation approaches provide resistance from reverse engineering attacks. The reverse engineering threat occurs due to the unconfined software code to the user. Malicious reverse engineering of software codes can be harder by exertion of code transformation on software programs. To address this, we acquaint a peculiar code transformation approach for software protection. The proposed approach is used semantically equivalent to code clone within the source code to protect logical part of program text. We have successfully implement our approach using open source java project Gantt project system and open source java obfuscator's tools. In this paper, we present our approach and demonstrate it with an illustration. The intent of this method is to prevent static analysis attack and make dynamic attack compact for an adversary. This makes it worthwhile against reverse engineering attacks.
APA, Harvard, Vancouver, ISO, and other styles
18

Dunn, Susan A. "Defining the Scope of Copyright Protection for Computer Software." Stanford Law Review 38, no. 2 (January 1986): 497. http://dx.doi.org/10.2307/1228702.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Dubrovin, A. S., E. A. Rogozin, Yu A. Meshcheryakov, and V. V. Obukhov. "Program Techniques for Software Protection in Computer-Aided Systems." Telecommunications and Radio Engineering 62, no. 7 (2004): 633–38. http://dx.doi.org/10.1615/telecomradeng.v62.i7.50.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

TANI, YOSHIKAZU. "Protection of Computer Software by Means of Patent System." Journal of the Institute of Electrical Engineers of Japan 114, no. 6 (1994): 385–88. http://dx.doi.org/10.1541/ieejjournal.114.385.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Donovan, S. "Patent, copyright and trade secret protection for computer software." IEEE Antennas and Propagation Magazine 34, no. 1 (February 1992): 33–38. http://dx.doi.org/10.1109/74.125887.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Jackson, Keith. "The protection of computer software— its technology and application." Computer Fraud & Security Bulletin 11, no. 10 (August 1989): 13–14. http://dx.doi.org/10.1016/0142-0496(89)90164-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Puri, K. "Copyright protection of software in Australia." Information & Communications Technology Law 1, no. 1 (January 1992): 79–114. http://dx.doi.org/10.1080/13600834.1992.9965643.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Wehlau, Andreas. "Software protection under European community law." Information & Communications Technology Law 2, no. 1 (January 1993): 3–19. http://dx.doi.org/10.1080/13600834.1993.9965665.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Knight, J. "Fascinating book on protection of software." Information and Software Technology 33, no. 5 (June 1991): 384. http://dx.doi.org/10.1016/0950-5849(91)90109-o.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Wang, Pin. "Safety Testing Method Analysis of Computer Software." Applied Mechanics and Materials 299 (February 2013): 135–38. http://dx.doi.org/10.4028/www.scientific.net/amm.299.135.

Full text
Abstract:
Along with the computer network application becomes more popular, along with our country Internet market becoming stronger, more and more individuals or enterprises to commercial activities into the electronic commerce platform, so the computer software security has become increasingly important. Therefore, to strengthen the security of computer software protection research is very necessary, and guarantee the software safety is one of the effective means of software security hidden trouble detection. This paper will discuss the computer software system in safety detection method. Computer software security testing technology is existing computer software safety based, effective recognition computer software security problems in.
APA, Harvard, Vancouver, ISO, and other styles
27

Rebecchi, Filippo, Julien Boite, Pierre-Alexis Nardin, Mathieu Bouet, and Vania Conan. "DDoS protection with stateful software-defined networking." International Journal of Network Management 29, no. 1 (August 9, 2018): e2042. http://dx.doi.org/10.1002/nem.2042.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Kamel, Ibrahim, and Qutaiba Albluwi. "A robust software watermarking for copyright protection." Computers & Security 28, no. 6 (September 2009): 395–409. http://dx.doi.org/10.1016/j.cose.2009.01.007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Shin, Yukyun “Harry.” "Protection and Enforcement of Copyright for Computer Software in Korea." Journal of World Intellectual Property 3, no. 4 (November 1, 2005): 467–92. http://dx.doi.org/10.1111/j.1747-1796.2000.tb00138.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Li, Chiang Ling. "The New Prc Regulation for the Protection of Computer Software." Journal of World Intellectual Property 5, no. 3 (November 1, 2005): 491–99. http://dx.doi.org/10.1111/j.1747-1796.2002.tb00167.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Menell, Peter S. "The Challenges of Reforming Intellectual Property Protection for Computer Software." Columbia Law Review 94, no. 8 (December 1994): 2644. http://dx.doi.org/10.2307/1123151.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Moldovyan, A. A., and N. A. Moldovyan. "SOFTWARE ENCRYPTION ALGORITHMS FOR TRANSPARENT PROTECTION TECHNOLOGY." Cryptologia 22, no. 1 (January 1998): 56–68. http://dx.doi.org/10.1080/0161-119891886786.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Anil, Aditya, D. K. Mohanta, D. Sinha Roy, and A. K. Panda. "Software reliability estimation of computer relaying for transmission line protection using user-oriented software reliability model." International Journal of Power and Energy Conversion 1, no. 2/3 (2009): 300. http://dx.doi.org/10.1504/ijpec.2009.027949.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

de Vuyst, Bruno, and Alea Fairchild. "Legal and Economic Justification for Software Protection." International Journal of Open Source Software and Processes 4, no. 3 (July 2012): 1–12. http://dx.doi.org/10.4018/ijossp.2012070101.

Full text
Abstract:
This article discusses legal and economic rationale in regards to open source software protection. Software programs are, under TRIPS1, protected by copyright (reference is made to the Berne Convention2). The issue with this protection is that, due to the dichotomy idea/expression that is typical for copyright protection, reverse engineering of software is not excluded, and copyright is hence found to be an insufficient protection. Hence, in the U.S., software makers have increasingly turned to patent protection. In Europe, there is an exclusion of computer programs in Article 52 (2) c) EPC (EPO, 1973), but this exclusion is increasingly narrowed and some call for abandoning the exclusion altogether. A proposal by the European Commission, made in 2002, called for a directive to allow national patent authorities to patent software in a broader way, so as to ensure further against reverse engineering; this proposal, however, was shelved in 2005 over active opposition within and outside the European parliament. In summary, open source software does not fit in any proprietary model; rather, it creates a freedom to operate. Ultimately, there is a need to rethink approaches to property law so as to allow for viable software packaging in both models.
APA, Harvard, Vancouver, ISO, and other styles
35

Suslina, Irina, and Valeriya Tarasova. "Law Protection of Computer Programs in the State of Israel." Tirosh. Jewish, Slavic & Oriental Studies 18 (2018): 206–18. http://dx.doi.org/10.31168/2658-3380.2018.18.4.2.

Full text
Abstract:
Nowadays IT sphere all over the world experiences rapid growth. This situation also refers to the State of Israel that is considered to be one of the leaders in IT-startups and IT sphere in all. The development of IT has a great influence on economy of Israel and its economic development. Application software is usually defined as a main unit in information technologies. Therefore, legal protection of software becomes one of the most important issues regarding IT sphere. Intellectual property law in Israel is mostly based on British intellectual property law. International legislation concerning intellectual property also influences Israeli IP law. As in the majority of countries, in Israel software is considered as an object of copyright law and it is protected in compliance with its provisions. Copyright law is regulated by the Copyright Act passed the Knesset in 2007. The term of protection granted by this Act shall be the life of the author and seventy years after his death. In accordance with the main principle of copyright law, software has been protected since the moment the software was created. That means that software in Israel does not subject to registration or any other procedure of its kind. It is also possible to register a logo and a unique name of software as a trademark, and this can become a substantial addition to the law protection.
APA, Harvard, Vancouver, ISO, and other styles
36

NOYA, Yoichi, Shozi MASUKO, Toshiyuki OHNISHI, and Sigeru KASAHARA. "Utilization of a Computer Using Spreadsheet Software for Radiation Protection Management." RADIOISOTOPES 41, no. 11 (1992): 577–80. http://dx.doi.org/10.3769/radioisotopes.41.11_577.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Kingston, David. "Computer Software Reviews. Environmental Protection Agency's Sampling and Analysis Methods Database." Journal of Chemical Information and Modeling 32, no. 5 (September 1, 1992): 573–74. http://dx.doi.org/10.1021/ci00009a605.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Pugh, Edward Bryn. "Legal protection of computer software against misuse ? Feasibility or fond hope?" Liverpool Law Review 9, no. 1 (March 1987): 45–67. http://dx.doi.org/10.1007/bf01207249.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Wibisurya, Aswin, and Timothy Yudi Adinugroho. "A Reusable Software Copy Protection Using Hash Result and Asymetrical Encryption." ComTech: Computer, Mathematics and Engineering Applications 5, no. 2 (December 1, 2014): 647. http://dx.doi.org/10.21512/comtech.v5i2.2215.

Full text
Abstract:
Desktop application is one of the most popular types of application being used in computer due to the one time install simplicity and the quick accessibility from the moment the computer being turned on. Limitation of the copy and usage of desktop applications has long been an important issue to application providers. For security concerns, software copy protection is usually integrated with the application. However, developers seek to reuse the copy protection component of the software. This paper proposes an approach of reusable software copy protection which consists of a certificate validator on the client computer and a certificate generator on the server. The certificate validator integrity is protected using hashing result while all communications are encrypted using asymmetrical encryption to ensure the security of this approach.
APA, Harvard, Vancouver, ISO, and other styles
40

Coneby, Randy, and Fred Gallegos. "Software Protection Techniques: Control Issues for is Auditors." EDPACS 27, no. 10 (April 2000): 1–12. http://dx.doi.org/10.1201/1079/43256.27.10.20000401/30326.1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Merling, Daniel, Steffen Lindner, and Michael Menth. "Robust LFA Protection for Software-Defined Networks (RoLPS)." IEEE Transactions on Network and Service Management 18, no. 3 (September 2021): 2570–86. http://dx.doi.org/10.1109/tnsm.2021.3090843.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Freed, Roy N. "Legal protection of software—a global view from Japan." International Review of Law, Computers & Technology 4, no. 1 (January 1989): 71–78. http://dx.doi.org/10.1080/13600869.1989.9966279.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Cash, B. "The Last Place in the World - Copyright Protection for Computer Software in New Zealand." Victoria University of Wellington Law Review 27, no. 3 (November 3, 1997): 391. http://dx.doi.org/10.26686/vuwlr.v27i3.6109.

Full text
Abstract:
Computer technology - whether it is hardware, software or the internet - is the headache that just won't go away for anyone grappling with the law of intellectual property. With the Copyright Act 1994, the New Zealand legislature attempted to meet some of the challenges but it largely avoided the issue, passing the headache onto the judiciary should any tricky issues arise. One such issue is copyright protection for computer programs. The Copyright Act 1994 makes it clear that computer programs are protected as a literary work but how far does that protection extend (or how far do we carry the fiction that a computer program is literary work)? This article attempts to second guess what level of protection our courts might provide. It argues that New Zealand has shown a willingness to protect functional items and would protect the "look and feel" of a program, providing a level of protection which courts in the United States have considered undesirable.
APA, Harvard, Vancouver, ISO, and other styles
44

Dedman, Richard. "Legal protection of software in the United Kingdom." Computer Law & Security Review 3, no. 5 (January 1988): 10–14. http://dx.doi.org/10.1016/0267-3649(88)90107-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Guifeng, Shi, Ouyang Lingnan, and Zhang Qingsheng. "Policies of software protection: The practice of China." Computer Law & Security Review 21, no. 4 (January 2005): 338–43. http://dx.doi.org/10.1016/j.clsr.2005.06.012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

May, J., G. Hughes, and A. D. Lunn. "Reliability estimation from appropriate testing of plant protection software." Software Engineering Journal 10, no. 6 (1995): 206. http://dx.doi.org/10.1049/sej.1995.0026.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Yan, Ke. "A Practical Method for Software Encryption." Applied Mechanics and Materials 571-572 (June 2014): 535–38. http://dx.doi.org/10.4028/www.scientific.net/amm.571-572.535.

Full text
Abstract:
Some technical measures should be taken for software protection in addition to the laws and regulations. Software encryption is a commonly used method. The main methods of software encryption are introduced here firstly, and the characteristics of different methods are given. Then the idea of encryption card based on computer system bus is put forward. The design of logical circuit for the concrete realization is shown and the key detection process is described. The key is generated by the port address dynamically with the encryption card. There are several key with multi port. The encryption card is difficult to decrypt and is with good stability, high reliability.
APA, Harvard, Vancouver, ISO, and other styles
48

Esteve, Asuncion. "Patent Protection of Computer-Implemented Inventions Vis-A-Vis Open Source Software." Journal of World Intellectual Property 9, no. 3 (May 2006): 276–300. http://dx.doi.org/10.1111/j.1422-2213.2006.00278.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Neophytou, J. P. "How will the scope of protection afforded to computer software be defined?" Journal of Intellectual Property Law & Practice 5, no. 12 (November 1, 2010): 837–39. http://dx.doi.org/10.1093/jiplp/jpq156.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Hinshaw, M. Joseph. "The role of standardization and interoperability in copyright protection of computer software." Communication Law and Policy 4, no. 3 (June 1999): 299–323. http://dx.doi.org/10.1080/10811689909368680.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography