Conferences related to Software protection

Back to Top

ICC 2021 - IEEE International Conference on Communications

IEEE ICC is one of the two flagship IEEE conferences in the field of communications; Montreal is to host this conference in 2021. Each annual IEEE ICC conference typically attracts approximately 1,500-2,000 attendees, and will present over 1,000 research works over its duration. As well as being an opportunity to share pioneering research ideas and developments, the conference is also an excellent networking and publicity event, giving the opportunity for businesses and clients to link together, and presenting the scope for companies to publicize themselves and their products among the leaders of communications industries from all over the world.


2020 IEEE Power & Energy Society General Meeting (PESGM)

The Annual IEEE PES General Meeting will bring together over 2900 attendees for technical sessions, administrative sessions, super sessions, poster sessions, student programs, awards ceremonies, committee meetings, tutorials and more


GLOBECOM 2020 - 2020 IEEE Global Communications Conference

IEEE Global Communications Conference (GLOBECOM) is one of the IEEE Communications Society’s two flagship conferences dedicated to driving innovation in nearly every aspect of communications. Each year, more than 2,900 scientific researchers and their management submit proposals for program sessions to be held at the annual conference. After extensive peer review, the best of the proposals are selected for the conference program, which includes technical papers, tutorials, workshops and industry sessions designed specifically to advance technologies, systems and infrastructure that are continuing to reshape the world and provide all users with access to an unprecedented spectrum of high-speed, seamless and cost-effective global telecommunications services.


2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)

Promote the exchange of ideas between academia and industry in the field of computer and networks dependability


2019 IEEE AUTOTESTCON

AUTOTESTCON is the world’s premier conference that brings together themilitary/aerospace automatic test industry and government/military acquirers and usersto share new technologies, discuss innovative applications, and exhibit products andservices.

  • 2018 IEEE AUTOTESTCON

    AUTOTESTCON is the world’s premier conference that brings together the military/aerospace automatic test industry and government/military acquirers and users to share new technologies, discuss innovative applications, and exhibit products and services

  • 2017 IEEE AUTOTESTCON

    IEEE AUTOTESTCON is also known as the Systems Readiness Technology Conference. This major conference and exposition provides focus on the maintenance aspects of systems readiness and providing Mission Assurance through Advanced ATE (Automatic Test Equpmenrt/Systems). This includes Maintenance Repair & Overhaul as well as factory and development automated test equipment. This conference brings military and aerospace industry principals together to share new concepts, technologies and applications in this essential field of supportability and sustainability. The conference includes a major exhibit of exciting new products from a wide variety of exhibitors, and provides the opportunity to meet with senior military and aerospace leaders to discuss their future needs and expectations and the ways in which we can satisfy those needs.

  • 2016 IEEE AUTOTESTCON

    echnical Interchange Meeting for military/aerospace automatic test industry together to share new technologies, discuss innovative applications, and exhibit products and services

  • 2015 IEEE AUTOTESTCON

    IEEE AUTOTEST is an annual Technical Interchange Meeting sponsored by the Institute of Electrical and Electronic Engineers (IEEE). This event serves to gather the military/aerospace automatic test industry together to share new technologies, discuss innovative applications, and exhibit products and services

  • 2014 IEEE AUTOTEST

    IEEE AUTOTESTCON is the world s only conference that focuses primarily on Automated Test and related technology for military, government and aerospace applications. The conference also has an expanded focus into commercial areas that share a common technical base, including aerospace, vehicle and automotive, and commercial factory test applications. Autotestcon provides a unique opportunity to discuss platform support requirements with all DoD Branches, provides hands-on experience with test equipment, and

  • 2013 IEEE AUTOTESTCON

    Content focused on automatic test systems for US military systems.

  • 2012 IEEE AUTOTESTCON

    Automated Test Systems (ATE) and related technologies such as Test Program Sets for US military and defense equipment

  • 2011 IEEE AUTOTESTCON

    Annual conference of the automatic testing industry.

  • 2010 IEEE AUTOTESTCON

    IEEE AUTOTESTCON, The Support Systems Technology Conference, is the largest conference focused on automatic test systems for military and aerospace systems, and has been held annually since 1965. It features more than 120 quality application-focused papers and 250 Exhibits. Attendance ranges between 650 and 750 registered professionals.

  • 2009 IEEE AUTOTESTCON

    Automated Test, Test Technology, and related Support Systems for Defense Systems.

  • 2008 IEEE AUTOTESTCON

    All theoretical and application aspects for an appropriate topic dealing with system readiness, in general, and automatic test technology, in particular. In keeping with our conference theme "Surpassing the Limits-Forging Ahead" our focus will be on new ideas and concepts, unusual testing solutions, and future technologies, e.g. ATE Architectures, Artificial Intelligence in Test, ATE/TPS Development Techniques, ATE/TPS Management, BIT/BIST

  • 2007 IEEE AUTOTESTCON

  • 2006 IEEE AUTOTESTCON

  • 2005 IEEE AUTOTESTCON

  • 2004 IEEE AUTOTESTCON

  • 2003 IEEE AUTOTESTCON

  • 2002 IEEE AUTOTESTCON

  • 2001 IEEE AUTOTESTCON

  • 2000 IEEE AUTOTESTCON

  • AUTOTESTCON '99

  • AUTOTESTCON '98

  • AUTOTESTCON '97

  • AUTOTESTCON '96


More Conferences

Periodicals related to Software protection

Back to Top

Aerospace and Electronic Systems Magazine, IEEE

The IEEE Aerospace and Electronic Systems Magazine publishes articles concerned with the various aspects of systems for space, air, ocean, or ground environments.


Applied Superconductivity, IEEE Transactions on

Contains articles on the applications and other relevant technology. Electronic applications include analog and digital circuits employing thin films and active devices such as Josephson junctions. Power applications include magnet design as well asmotors, generators, and power transmission


Automatic Control, IEEE Transactions on

The theory, design and application of Control Systems. It shall encompass components, and the integration of these components, as are necessary for the construction of such systems. The word `systems' as used herein shall be interpreted to include physical, biological, organizational and other entities and combinations thereof, which can be represented through a mathematical symbolism. The Field of Interest: shall ...


Circuits and Systems for Video Technology, IEEE Transactions on

Video A/D and D/A, display technology, image analysis and processing, video signal characterization and representation, video compression techniques and signal processing, multidimensional filters and transforms, analog video signal processing, neural networks for video applications, nonlinear video signal processing, video storage and retrieval, computer vision, packet video, high-speed real-time circuits, VLSI architecture and implementation for video technology, multiprocessor systems--hardware and software-- ...


Communications Letters, IEEE

Covers topics in the scope of IEEE Transactions on Communications but in the form of very brief publication (maximum of 6column lengths, including all diagrams and tables.)


More Periodicals

Most published Xplore authors for Software protection

Back to Top

Xplore Articles related to Software protection

Back to Top

ABYSS: ATrusted Architecture for Software Protection

1987 IEEE Symposium on Security and Privacy, 1987

ABYSS (A Basic Yorktown Security System) is an architecture for the trusted execution of application software. It supports a uniform security service across the. range of computing systems. The use of ABYSS discussed in this paper is oriented towards solving the software protection problem, especially in the lower end of the market. Both current and planned software distribution channels are ...


ASHs: application-specific handlers for high-performance messaging

IEEE/ACM Transactions on Networking, 1997

Application-specific safe message handlers (ASHs) are designed to provide applications with hardware-level network performance. ASHs are user-written code fragments that safely and efficiently execute in the kernel in response to message arrival. ASHs can direct message transfers (thereby eliminating copies) and send messages (thereby reducing send-response latency). In addition, the ASH system provides support for dynamic integrated layer processing (thereby ...


Game Analysis of Copyright Protection of Software Products under Network Condition

2009 International Conference on Environmental Science and Information Application Technology, 2009

Aiming at the phenomenon that the pirate software predominates over the software market, based on the cost characteristics and network externality of software products, this paper analyzes the situation that the software manufacturers are confronted with when taking loose and strict strategies for copyright protection of software, and offers the countermeasures to the software manufacturers.


The comparative analysis of correcting properties of switching functions

The Experience of Designing and Application of CAD Systems in Microelectronics, 2003. CADSM 2003. Proceedings of the 7th International Conference., 2003

The characteristics of absolute and relative self-correction ability of switching functions are offered and a technique of their application for an estimation and comparison of the self-correction properties level of switching functions are developed.


Feature-based Self-synchronous Audio Watermarking Technology

2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007), 2007

In order to get the robust performance for audio watermarking, a new idea called synchronous valley approach for hiding location is proposed for public audio transmission. As the audio masking principle, the computation is addressed in the low frequency coefficients in discrete wavelet transforming. Five features for seven rules are drawn from the coefficients in the self- synchronous approach. The ...


More Xplore Articles

Educational Resources on Software protection

Back to Top

IEEE-USA E-Books

  • ABYSS: ATrusted Architecture for Software Protection

    ABYSS (A Basic Yorktown Security System) is an architecture for the trusted execution of application software. It supports a uniform security service across the. range of computing systems. The use of ABYSS discussed in this paper is oriented towards solving the software protection problem, especially in the lower end of the market. Both current and planned software distribution channels are supportable by the architecture, and the system is nearly transparent to legitimate users. A novel use-once authorization mechanism, called a token, is introduced as a solution to the problem of providing authorizations without direct communication. Software vendors may use the system to obtain technical enforcement of virtually any terms and conditions of the sale of their software, including such things as rental software. Software may be transferred between systems, and backed up to guard against loss in case of failure. We discuss the problem of protecting software on these systems, and offer guidelines to its solution. ABYSS is shown to be a general security base, in which many security applications may execute.

  • ASHs: application-specific handlers for high-performance messaging

    Application-specific safe message handlers (ASHs) are designed to provide applications with hardware-level network performance. ASHs are user-written code fragments that safely and efficiently execute in the kernel in response to message arrival. ASHs can direct message transfers (thereby eliminating copies) and send messages (thereby reducing send-response latency). In addition, the ASH system provides support for dynamic integrated layer processing (thereby eliminating duplicate message traversals) and dynamic protocol composition (thereby supporting modularity). ASHs offer this high degree of flexibility while still providing network performance as good as, or (if they exploit application-specific knowledge) even better than, hard-wired in-kernel implementations. A combination of user-level microbenchmarks and end-to-end system measurements using TCP demonstrates the benefits of the ASH system.

  • Game Analysis of Copyright Protection of Software Products under Network Condition

    Aiming at the phenomenon that the pirate software predominates over the software market, based on the cost characteristics and network externality of software products, this paper analyzes the situation that the software manufacturers are confronted with when taking loose and strict strategies for copyright protection of software, and offers the countermeasures to the software manufacturers.

  • The comparative analysis of correcting properties of switching functions

    The characteristics of absolute and relative self-correction ability of switching functions are offered and a technique of their application for an estimation and comparison of the self-correction properties level of switching functions are developed.

  • Feature-based Self-synchronous Audio Watermarking Technology

    In order to get the robust performance for audio watermarking, a new idea called synchronous valley approach for hiding location is proposed for public audio transmission. As the audio masking principle, the computation is addressed in the low frequency coefficients in discrete wavelet transforming. Five features for seven rules are drawn from the coefficients in the self- synchronous approach. The secrets are firstly coded with BCH technology and then hidden behind the synchronous positions by the algorithm of quantization discrete wavelet transforming. Experimental results show that the synchronous valley approach is very effective when locating the secrets in the watermarking embedding and extracting process. Meanwhile, the watermarking technology is robust to the common attacks, such as MP3 coding, re-sampling, re-quantization, echo delay, Gaussian noise and cropping.

  • Finding multimedia's fit

    None

  • A New Computer Self-immune Model against Malicious Codes

    A new computer self-immune model against malicious codes is addressed. Instead of detecting or recognizing the exact characters of malicious codes, the model gives computer system the self-immune ability against malicious codes by getting rid of the prerequisites for malicious codes to spread and do harm directly. Because the model needs no character of malicious codes, the heavy work of character code computing and detecting will be avoided and the large amount of storage space for character codes will be saved.

  • The novel design of direct LED backlight with lens caps and parabolic reflectors

    A novel design of direct LED backlight is presented. The module is composed of white light LEDs, parabolic reflectors and novel lens caps. The predicted uniformity is up to 92%.

  • Protection is a software issue

    Modern operating systems are strongly dependent on software mechanisms to protect system resources from users. This is true despite the fact that the promoters of these systems imply that their reliability and integrity derive solely from the use of a core set of protected hardware mechanisms, such as address spaces and protected supervisor mode. While typical microprocessors provide cheap and effective hardware mechanisms to protect the load word/store word interface, operating systems are forced to abstract and virtualize this interface to export a far richer set, of resources such as files, sockets, threads, and consoles. The access semantics for these resources are almost always protected by software checks and not hardware. Processor architectures simply do not provide enough fine-grained control over access to shared system resources to ensure that a program only accesses the resources to which it is allowed. Our position is that software protection mechanisms are not only necessary, but have inherent advantages over hardware for enforcing the protection requirements of an operating system. Software is flexible, explicit, precise, and in many cases, open to incredible optimizations. By contrast, hardware mechanisms are rigid, implicit, imprecise, and unoptimizable.

  • A Context-Aware Trust Establishment and Mapping Framework for Web Applications

    In order to reflect the dynamic feature of situations and of peers' behavior more accurately, context information, which contains different attributes of situations, should be considered explicitly when evaluating trust. A context- aware trust establishment framework based on Bayesian networks is proposed. In our proposal, the contextual factors are inferred statistically, not assigned in ad hoc way as most existing solutions. We also propose a Bayesian trust mapping approach between related contexts to help application agents infer the trustworthiness in an unfamiliar context from the trust information in other contexts. We argue that the relevance of contexts is specific to agents and it should not be estimated independent of agents' trust or even fixed as in other frameworks. Our approach makes the relevance measurement implicit together with trust mapping through Bayesian networks. Simulation experiments show that our system can make more accurate trust inferences than ad hoc context-aware systems.



Standards related to Software protection

Back to Top

No standards are currently tagged "Software protection"


Jobs related to Software protection

Back to Top