Fast Secure Processor for Inhibiting Software Piracy and Tampering.
Jun YangYoutao ZhangLan GaoPublished in: MICRO (2003)
Keyphrases
- software piracy
- authentication scheme
- factors that influence
- software industry
- information systems
- digital images
- reverse engineering
- user authentication
- e government
- intellectual property protection
- smart card
- individual differences
- watermarking scheme
- intellectual property rights
- databases
- copyright protection
- developing countries
- image authentication
- end users