Downloads: 124 | Views: 267
Research Paper | Computer Science & Engineering | India | Volume 3 Issue 8, August 2014 | Popularity: 6.2 / 10
Generic Method for Prevention of Software Piracy
Nadeem Sajjad, Rohit Maheshwari
Abstract: Software piracy has been major issue for software industries. They have to pay a very large amount to protect their applications. There are several insurance schemes for the protection of software. But they all are very costly and provide services for a limited period of time. This paper will demonstrate a protector tool which can be developed in any platform very easily so that the vendor can protect the software not only for being pirated but also capable of limited period expiration of software. This strategy will provide easy and low cost protection which is more effective than MAC address authentication. This tool is very useful for desktop applications which use internet for their internal working, as it provides server based authentication, but is also feasible for those applications that do not use internet as it has client side authentication also.
Keywords: Hardware Based Authentication, SMS Authentication, Software Piracy, Software Protection, Low Cost Software Protection
Edition: Volume 3 Issue 8, August 2014
Pages: 220 - 223
Make Sure to Disable the Pop-Up Blocker of Web Browser
Downloads: 656 | Views: 2004
Computer Science & Engineering, India, Volume 9 Issue 7, July 2020
Pages: 1454 - 1458Heart Disease Prediction with Machine Learning Approaches
Megha Kamboj
Downloads: 401 | Views: 720
Computer Science & Engineering, India, Volume 7 Issue 11, November 2018
Pages: 1951 - 1955Hadoop Performance Improvement using Metadata and Securing with Oauth Token
Swapnali A. Salunkhe, Amol B. Rajmane
Downloads: 386 | Views: 701
Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 1 - 3Comparative Study of Conventional Desktop Computer and Compute Stick
Aadarsh Sooraj, Sooraj G.
Downloads: 354 | Views: 700
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 629 - 632Review Paper on Secure Hashing Algorithm and Its Variants
Priyanka Vadhera, Bhumika Lall
Downloads: 336 | Views: 689
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2148 - 2152The Impact and Application of 3D Printing Technology
Thabiso Peter Mpofu, Cephas Mawere, Macdonald Mukosera