Endorsements, licensing, and insurance for distributed system services
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
Building a high-performance, programmable secure coprocessor
Computer Networks: The International Journal of Computer and Telecommunications Networking - Special issue on computer network security
Fast Secure Processor for Inhibiting Software Piracy and Tampering
Proceedings of the 36th annual IEEE/ACM International Symposium on Microarchitecture
Trusted Computing Platforms: Design and Applications
Trusted Computing Platforms: Design and Applications
Tamper resistance: a cautionary note
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
Hi-index | 0.00 |
The paper begins with a short description of the situation on the software market and the various types of software piracy threatening the industry. Follows a review of the currently available methods for copy protection, with evaluation of their strong and weak points. Based on this data, a new type of hardware approach for achieving highly-efficient copy protection is suggested, followed by description of the most important issues concerning its practical implementation on a larger scale.