Conferences related to Software protection

Back to Top

ICC 2021 - IEEE International Conference on Communications

IEEE ICC is one of the two flagship IEEE conferences in the field of communications; Montreal is to host this conference in 2021. Each annual IEEE ICC conference typically attracts approximately 1,500-2,000 attendees, and will present over 1,000 research works over its duration. As well as being an opportunity to share pioneering research ideas and developments, the conference is also an excellent networking and publicity event, giving the opportunity for businesses and clients to link together, and presenting the scope for companies to publicize themselves and their products among the leaders of communications industries from all over the world.


GLOBECOM 2020 - 2020 IEEE Global Communications Conference

IEEE Global Communications Conference (GLOBECOM) is one of the IEEE Communications Society’s two flagship conferences dedicated to driving innovation in nearly every aspect of communications. Each year, more than 2,900 scientific researchers and their management submit proposals for program sessions to be held at the annual conference. After extensive peer review, the best of the proposals are selected for the conference program, which includes technical papers, tutorials, workshops and industry sessions designed specifically to advance technologies, systems and infrastructure that are continuing to reshape the world and provide all users with access to an unprecedented spectrum of high-speed, seamless and cost-effective global telecommunications services.


2020 IEEE Power & Energy Society General Meeting (PESGM)

The Annual IEEE PES General Meeting will bring together over 2900 attendees for technical sessions, administrative sessions, super sessions, poster sessions, student programs, awards ceremonies, committee meetings, tutorials and more


2019 Winter Simulation Conference (WSC)

WSC is the premier international forum for disseminating recent advances in the field of system simulation. In addition to a technical program of unsurpassed scope and quality, WSC provides the central meeting for practitioners, researchers, and vendors.


2019 IEEE International Symposium on Information Theory (ISIT)

Information theory and coding theory and their applications in communications and storage, data compression, wireless communications and networks, cryptography and security, information theory and statistics, detection and estimation, signal processing, big data analytics, pattern recognition and learning, compressive sensing and sparsity, complexity and computation theory, Shannon theory, quantum information and coding theory, emerging applications of information theory, information theory in biology.



Periodicals related to Software protection

Back to Top

Aerospace and Electronic Systems Magazine, IEEE

The IEEE Aerospace and Electronic Systems Magazine publishes articles concerned with the various aspects of systems for space, air, ocean, or ground environments.


Applied Superconductivity, IEEE Transactions on

Contains articles on the applications and other relevant technology. Electronic applications include analog and digital circuits employing thin films and active devices such as Josephson junctions. Power applications include magnet design as well asmotors, generators, and power transmission


Automatic Control, IEEE Transactions on

The theory, design and application of Control Systems. It shall encompass components, and the integration of these components, as are necessary for the construction of such systems. The word `systems' as used herein shall be interpreted to include physical, biological, organizational and other entities and combinations thereof, which can be represented through a mathematical symbolism. The Field of Interest: shall ...


Circuits and Systems for Video Technology, IEEE Transactions on

Video A/D and D/A, display technology, image analysis and processing, video signal characterization and representation, video compression techniques and signal processing, multidimensional filters and transforms, analog video signal processing, neural networks for video applications, nonlinear video signal processing, video storage and retrieval, computer vision, packet video, high-speed real-time circuits, VLSI architecture and implementation for video technology, multiprocessor systems--hardware and software-- ...


Communications Letters, IEEE

Covers topics in the scope of IEEE Transactions on Communications but in the form of very brief publication (maximum of 6column lengths, including all diagrams and tables.)



Most published Xplore authors for Software protection

Back to Top

Xplore Articles related to Software protection

Back to Top

ABYSS: ATrusted Architecture for Software Protection

1987 IEEE Symposium on Security and Privacy, 1987

ABYSS (A Basic Yorktown Security System) is an architecture for the trusted execution of application software. It supports a uniform security service across the. range of computing systems. The use of ABYSS discussed in this paper is oriented towards solving the software protection problem, especially in the lower end of the market. Both current and planned software distribution channels are ...


ASHs: application-specific handlers for high-performance messaging

IEEE/ACM Transactions on Networking, 1997

Application-specific safe message handlers (ASHs) are designed to provide applications with hardware-level network performance. ASHs are user-written code fragments that safely and efficiently execute in the kernel in response to message arrival. ASHs can direct message transfers (thereby eliminating copies) and send messages (thereby reducing send-response latency). In addition, the ASH system provides support for dynamic integrated layer processing (thereby ...


Game Analysis of Copyright Protection of Software Products under Network Condition

2009 International Conference on Environmental Science and Information Application Technology, 2009

Aiming at the phenomenon that the pirate software predominates over the software market, based on the cost characteristics and network externality of software products, this paper analyzes the situation that the software manufacturers are confronted with when taking loose and strict strategies for copyright protection of software, and offers the countermeasures to the software manufacturers.


The comparative analysis of correcting properties of switching functions

The Experience of Designing and Application of CAD Systems in Microelectronics, 2003. CADSM 2003. Proceedings of the 7th International Conference., 2003

The characteristics of absolute and relative self-correction ability of switching functions are offered and a technique of their application for an estimation and comparison of the self-correction properties level of switching functions are developed.


Feature-based Self-synchronous Audio Watermarking Technology

2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007), 2007

In order to get the robust performance for audio watermarking, a new idea called synchronous valley approach for hiding location is proposed for public audio transmission. As the audio masking principle, the computation is addressed in the low frequency coefficients in discrete wavelet transforming. Five features for seven rules are drawn from the coefficients in the self- synchronous approach. The ...



Educational Resources on Software protection

Back to Top

IEEE-USA E-Books

  • ABYSS: ATrusted Architecture for Software Protection

    ABYSS (A Basic Yorktown Security System) is an architecture for the trusted execution of application software. It supports a uniform security service across the. range of computing systems. The use of ABYSS discussed in this paper is oriented towards solving the software protection problem, especially in the lower end of the market. Both current and planned software distribution channels are supportable by the architecture, and the system is nearly transparent to legitimate users. A novel use-once authorization mechanism, called a token, is introduced as a solution to the problem of providing authorizations without direct communication. Software vendors may use the system to obtain technical enforcement of virtually any terms and conditions of the sale of their software, including such things as rental software. Software may be transferred between systems, and backed up to guard against loss in case of failure. We discuss the problem of protecting software on these systems, and offer guidelines to its solution. ABYSS is shown to be a general security base, in which many security applications may execute.

  • ASHs: application-specific handlers for high-performance messaging

    Application-specific safe message handlers (ASHs) are designed to provide applications with hardware-level network performance. ASHs are user-written code fragments that safely and efficiently execute in the kernel in response to message arrival. ASHs can direct message transfers (thereby eliminating copies) and send messages (thereby reducing send-response latency). In addition, the ASH system provides support for dynamic integrated layer processing (thereby eliminating duplicate message traversals) and dynamic protocol composition (thereby supporting modularity). ASHs offer this high degree of flexibility while still providing network performance as good as, or (if they exploit application-specific knowledge) even better than, hard-wired in-kernel implementations. A combination of user-level microbenchmarks and end-to-end system measurements using TCP demonstrates the benefits of the ASH system.

  • Game Analysis of Copyright Protection of Software Products under Network Condition

    Aiming at the phenomenon that the pirate software predominates over the software market, based on the cost characteristics and network externality of software products, this paper analyzes the situation that the software manufacturers are confronted with when taking loose and strict strategies for copyright protection of software, and offers the countermeasures to the software manufacturers.

  • The comparative analysis of correcting properties of switching functions

    The characteristics of absolute and relative self-correction ability of switching functions are offered and a technique of their application for an estimation and comparison of the self-correction properties level of switching functions are developed.

  • Feature-based Self-synchronous Audio Watermarking Technology

    In order to get the robust performance for audio watermarking, a new idea called synchronous valley approach for hiding location is proposed for public audio transmission. As the audio masking principle, the computation is addressed in the low frequency coefficients in discrete wavelet transforming. Five features for seven rules are drawn from the coefficients in the self- synchronous approach. The secrets are firstly coded with BCH technology and then hidden behind the synchronous positions by the algorithm of quantization discrete wavelet transforming. Experimental results show that the synchronous valley approach is very effective when locating the secrets in the watermarking embedding and extracting process. Meanwhile, the watermarking technology is robust to the common attacks, such as MP3 coding, re-sampling, re-quantization, echo delay, Gaussian noise and cropping.

  • Finding multimedia's fit

    None

  • A New Computer Self-immune Model against Malicious Codes

    A new computer self-immune model against malicious codes is addressed. Instead of detecting or recognizing the exact characters of malicious codes, the model gives computer system the self-immune ability against malicious codes by getting rid of the prerequisites for malicious codes to spread and do harm directly. Because the model needs no character of malicious codes, the heavy work of character code computing and detecting will be avoided and the large amount of storage space for character codes will be saved.

  • The novel design of direct LED backlight with lens caps and parabolic reflectors

    A novel design of direct LED backlight is presented. The module is composed of white light LEDs, parabolic reflectors and novel lens caps. The predicted uniformity is up to 92%.

  • Protection is a software issue

    Modern operating systems are strongly dependent on software mechanisms to protect system resources from users. This is true despite the fact that the promoters of these systems imply that their reliability and integrity derive solely from the use of a core set of protected hardware mechanisms, such as address spaces and protected supervisor mode. While typical microprocessors provide cheap and effective hardware mechanisms to protect the load word/store word interface, operating systems are forced to abstract and virtualize this interface to export a far richer set, of resources such as files, sockets, threads, and consoles. The access semantics for these resources are almost always protected by software checks and not hardware. Processor architectures simply do not provide enough fine-grained control over access to shared system resources to ensure that a program only accesses the resources to which it is allowed. Our position is that software protection mechanisms are not only necessary, but have inherent advantages over hardware for enforcing the protection requirements of an operating system. Software is flexible, explicit, precise, and in many cases, open to incredible optimizations. By contrast, hardware mechanisms are rigid, implicit, imprecise, and unoptimizable.

  • A Context-Aware Trust Establishment and Mapping Framework for Web Applications

    In order to reflect the dynamic feature of situations and of peers' behavior more accurately, context information, which contains different attributes of situations, should be considered explicitly when evaluating trust. A context- aware trust establishment framework based on Bayesian networks is proposed. In our proposal, the contextual factors are inferred statistically, not assigned in ad hoc way as most existing solutions. We also propose a Bayesian trust mapping approach between related contexts to help application agents infer the trustworthiness in an unfamiliar context from the trust information in other contexts. We argue that the relevance of contexts is specific to agents and it should not be estimated independent of agents' trust or even fixed as in other frameworks. Our approach makes the relevance measurement implicit together with trust mapping through Bayesian networks. Simulation experiments show that our system can make more accurate trust inferences than ad hoc context-aware systems.



Standards related to Software protection

Back to Top

No standards are currently tagged "Software protection"