• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 22
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 34
  • 34
  • 23
  • 14
  • 9
  • 8
  • 5
  • 4
  • 4
  • 4
  • 3
  • 3
  • 3
  • 3
  • 3
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

Softwarové pirátství / Software piracy

Kubec, Vojtěch January 2013 (has links)
IN ENGLISH The purpose of my thesis is to analyze phenomenon called software piracy. The thesis is composed of seven chapters, each of them dealing with different aspects of issues related to the software piracy. Chapter One is introductory and defines term software. Chapter Two examines the software piracy. The chapter consists of seven parts. Part One focuses on basic definition. Part Two investigates software piracy in cyberspace. Part Three defines individual categories of software piracy and the reasons for them. Part Four explains and describes illegal software and illegal use of software. Part Five deals with restrictions on extent of rights of author to his software related to the legal license. Part Six is focused on sociocultural aspects of software piracy and impact of these aspects on the effectiveness of legal regulation. Last Part of this Chapter is dedicated to the public research on questions relevant to the software piracy. Chapter Three is subdivided into six parts and provides an outline of relevant legal regulations for protection of software. Part One contains basic demarcation. Next Parts are dealing with the protection of software with the relevant provisions of administrative law, business law and criminal law. Finally, it is also discussed on the patentability of software....
12

The Study and Application of Computer Software Protection

Xie, Xien-Chen 20 July 2002 (has links)
As the information technology develops rapidly, the software industry also keep growing and growing. Huge amount of capital and intelligence are being invested in developing the new software. However, it has been such a big negative impact on all software developers caused by the illegal reproduction and distribution. Therefore, besides the copyright regulations, software companies have always been concentrated on how to prevent their software from being illegally reproduced by adding protection codes. As most of the companies are not willing to reveal their protection methods, it is hard to have any chance to learn from each other's techniques and experiences. As a result, this thesis is really concentrated on collecting and categorizing as many as possible the protection coding technologies and in the end, analyzing and applying those to our own programs.
13

Specification and enforcement of usage constraints for commercial software components /

DePrince, Wayne, January 2003 (has links)
Thesis (Ph. D.)--Lehigh University, 2004. / Includes vita. Includes bibliographical references (leaves 235-240).
14

Copyright in the digital age with specific reference to technological protection measures and the efficacy of exceptions.

Govender, Deshnee. January 2005 (has links)
No abstract available. / Thesis (M.A.)-University of KwaZulu-Natal, Durban, 2005.
15

Advanced methods for detection of malicious software

Volynkin, Alexander S. January 2007 (has links)
Thesis (Ph. D.)--State University of New York at Binghamton, Electrical and Computer Engineering Department, Watson School, 2007. / Includes bibliographical references.
16

Formal specification and verification of safety interlock systems : a comparative case study /

Seotsanyana, Motlatsi. January 2007 (has links)
Thesis (MSc)--University of Stellenbosch, 2007. / Bibliography. Also available via the Internet.
17

A generic attack on hashing-based software tamper resistance /

Wurster, Glenn, January 1900 (has links)
Thesis (M.C.S.) - Carleton University, 2005. / Includes bibliographical references (p. 107-115). Also available in electronic format on the Internet.
18

Automatic detection of software security vulnerabilities in executable program files

Tevis, Jay-Evan J. Hamilton, John A. January 2005 (has links) (PDF)
Dissertation (Ph.D.)--Auburn University, 2005. / Abstract. Includes bibliographic references (p.134-148).
19

Advances in low-level software protection /

Van Dyke, Colin William. January 1900 (has links)
Thesis (Ph. D.)--Oregon State University, 2006. / Printout. Includes bibliographical references (leaves 102-106). Also available on the World Wide Web.
20

Cryptography in the presence of key-dependent messages

Unknown Date (has links)
The aim of this work is to investigate a security model in which we allow an adversary to have access to functions of the secret key. In recent years, significant progress has been made in understanding the security of encryption schemes in the presence of key-dependent plaintexts or messages (known as KDM). Here, we motivate and explore the security of a setting, where an adversary against a message authentication code (MAC) or signature scheme can access signatures on key-dependent messages. We propose a way to formalize the security of message authentication schemes in the presence of key-dependent MACs (KD-EUF) and of signature schemes in the presence of key-dependent signatures (KDS). An attack on a message recognition protocol involving a MAC is presented. It turns out that the situation is quite different from key-dependent encryption: To achieve KD-EUF-security or KDS-security under non-adaptive chosen message attacks, the use of a stateful signing algorithm is inevitable even in the random oracle model. After discussing the connection between key-dependent signing and forward security, we describe a compiler which lifts any EUF-CMA secure one-time signature scheme to a forward secure signature scheme offering KDS-CMA security. Then, we discuss how aggregate signatures can be used to combine the signatures in the certificate chain used in the compiler. A natural question arises about how to combine the security definitions of KDM and KDS to come up with a signcryption scheme that is secure. We also offer a connection with Leakage-Resilient Signatures, which take into account side-channel attacks. Lastly, we present some open problems for future research. / by Madeline Gonzalez. / Thesis (Ph.D.)--Florida Atlantic University, 2009. / Includes bibliography. / Electronic reproduction. Boca Raton, Fla., 2009. Mode of access: World Wide Web.

Page generated in 0.1167 seconds