Combatting Software Piracy by Encryption and Key Management.
Douglas J. AlbertStephen P. MorsePublished in: Computer (1984)
Keyphrases
- key management
- software piracy
- wireless sensor networks
- ad hoc networks
- information systems
- factors that influence
- resource constrained
- software industry
- digital signature
- secret sharing scheme
- identity based cryptography
- e government
- key management scheme
- secret key
- key distribution
- provably secure
- elliptic curve
- security services
- secure communication
- security protocols
- developing countries
- public key cryptography
- encryption decryption
- routing protocol
- software engineering
- case study