Generalized linear threshold scheme
Proceedings of CRYPTO 84 on Advances in cryptology
Rogue programs: viruses, worms and Trojan horses
Rogue programs: viruses, worms and Trojan horses
Computers under attack: intruders, worms, and viruses
Computers under attack: intruders, worms, and viruses
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '98 Proceedings of the 18th Annual International Cryptology Conference on Advances in Cryptology
A virtual image cryptosystem based upon vector quantization
IEEE Transactions on Image Processing
Hi-index | 0.00 |
Copyright protection of software program is crucial for the prosperity of software market. In this paper, we propose a dual software protection scheme. After purchasing a program from merchant, a buyer can exactly install it once. If the buyer redistributed a copy of the program, it could not be installed. Further, if the buyer could break the protection method and redistributed a copy of program, the merchant would be able to identify the traitor.