Optical encryption device for software protection
An optical-based hardware encryption device for software protection is proposed. Software piracy and illegal usage require that software operation is secured through a form of hardware protection. Electronic-based hardware keys such as dongle keys may be vulnerable to attacks through reverse enginee...
| Main Authors: | Ehsan, Abang Annuar, Mohd Arip, Mohd Ridzuan, Sohaimi, Mohd Quyyum, Ghazi, Ibrahim, Abdul Aziz, Faieza |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Science and Knowledge Research Society
2016
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/14329/ http://psasir.upm.edu.my/id/eprint/14329/1/Optical%20encryption%20device%20for%20software%20protection.pdf |
Similar Items
Optical-based hardware encryption device for software protection
by: Ehsan, Abang Annuar, et al.
Published: (2015)
by: Ehsan, Abang Annuar, et al.
Published: (2015)
Plastic optical fiber couplers for portable optical access-card system / Abang Annuar Ehsan
by: Ehsan, Abang Annuar
Published: (2010)
by: Ehsan, Abang Annuar
Published: (2010)
Analysis and countermeasure to improve a low takt production item based on LPS evaluation at Hicom Teck See Sdn. Bhd.
by: Muhammad Quyyum, Sohaimi
Published: (2012)
by: Muhammad Quyyum, Sohaimi
Published: (2012)
Light database encryption design utilizing multicore processors for mobile devices
by: Alomari, Mohammad Ahmed, et al.
Published: (2019)
by: Alomari, Mohammad Ahmed, et al.
Published: (2019)
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
by: Norhidayah, Muhammad, et al.
Published: (2012)
by: Norhidayah, Muhammad, et al.
Published: (2012)
Biometric Template Protection using watermarking with hidden password encryption
by: Islam, Md. Rajibul, et al.
Published: (2008)
by: Islam, Md. Rajibul, et al.
Published: (2008)
Biometric Template Protection Using Watermarking with Hidden Password Encryption
by: Islam, Md. Rajibul, et al.
Published: (2008)
by: Islam, Md. Rajibul, et al.
Published: (2008)
A framework for GPU-accelerated AES-XTS encryption in mobile devices
by: Alomari, Mohammad Ahmed, et al.
Published: (2011)
by: Alomari, Mohammad Ahmed, et al.
Published: (2011)
Polymer material for optical devices application
by: Ibrahim, Mohd. Haniff, et al.
Published: (2004)
by: Ibrahim, Mohd. Haniff, et al.
Published: (2004)
Encryption using FPGA
by: Nor Robaini, Ibrahim
Published: (2008)
by: Nor Robaini, Ibrahim
Published: (2008)
Reliability analysis on protection devices inclusion in LV residential distribution network
by: Mohd Ikhwan, Muhammad Ridzuan, et al.
Published: (2018)
by: Mohd Ikhwan, Muhammad Ridzuan, et al.
Published: (2018)
An embedded database design and implementation of a parallel IEEE XTS storage encryption for mobile devices
by: Alomari, Mohammad Ahmed Mohammad
Published: (2017)
by: Alomari, Mohammad Ahmed Mohammad
Published: (2017)
The impact of protective grounding deviation on the surge protection device
by: H’ng, Song Tian
Published: (2022)
by: H’ng, Song Tian
Published: (2022)
Analysis for McEliece and Niederreiter Encryptions: An Alternative to Public Key Encryption
by: Chaw, Lian Foong
Published: (2018)
by: Chaw, Lian Foong
Published: (2018)
An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan
by: Syed Adnan, Syed Farid
Published: (2019)
by: Syed Adnan, Syed Farid
Published: (2019)
Embedded devices security: design and implementation of a light RDBMS encryption utilizing multi-core processors
by: Alomari, Mohammad Ahmed, et al.
Published: (2023)
by: Alomari, Mohammad Ahmed, et al.
Published: (2023)
Surge protective device for low voltage equipment.
by: Ab Kadir, Mohd Zainal Abidin, et al.
Published: (2011)
by: Ab Kadir, Mohd Zainal Abidin, et al.
Published: (2011)
CAD software for semiconductor device modeling
by: Othman, Yasmin
Published: (2004)
by: Othman, Yasmin
Published: (2004)
Image compression and encryption
by: Zainal Abidin, Zuhairiah
Published: (2003)
by: Zainal Abidin, Zuhairiah
Published: (2003)
Data Encryption Standard (DES)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
Advanced Encryption Standard (AES)
by: Mahmood Al Dabbagh, Sufyan Salim, et al.
Published: (2011)
by: Mahmood Al Dabbagh, Sufyan Salim, et al.
Published: (2011)
Enhancing selective encryption for H.264/AVC using advanced encryption standard
by: Abomhara, Mohamed, et al.
Published: (2010)
by: Abomhara, Mohamed, et al.
Published: (2010)
Thermo-optical properties of polymer planar waveguides / Mohd Kamil Abd Rahman ... [et al.]
by: Abd Rahman, Mohd Kamil, et al.
Published: (2005)
by: Abd Rahman, Mohd Kamil, et al.
Published: (2005)
Performance analysis for cloud query encryption
by: Ali Raheem, Zainalabideen, et al.
Published: (2019)
by: Ali Raheem, Zainalabideen, et al.
Published: (2019)
Video encryption using computation between H.264/AVC and AES encryption algorithm
by: Omar zakaria, Mohamed Abomhara, et al.
Published: (2011)
by: Omar zakaria, Mohamed Abomhara, et al.
Published: (2011)
An improved chaotic image encryption algorithm
by: Al-Khasawneh, Mahmoud Ahmad, et al.
Published: (2018)
by: Al-Khasawneh, Mahmoud Ahmad, et al.
Published: (2018)
Rijndael encryption technique: authentication for computer application
by: Hamid Ali, Firkhan Ali, et al.
Published: (2020)
by: Hamid Ali, Firkhan Ali, et al.
Published: (2020)
An overview of video encryption techniques
by: Abomhara, Mohamed, et al.
Published: (2010)
by: Abomhara, Mohamed, et al.
Published: (2010)
Multimedia encryption, transmission and authentication
Published: (2011)
Published: (2011)
Video streaming and encrypting algorithms
by: Abumuala, Muhammad, et al.
Published: (2011)
by: Abumuala, Muhammad, et al.
Published: (2011)
Text messaging encryption system
by: Sundara Morthty, Nirmala Devi
Published: (2012)
by: Sundara Morthty, Nirmala Devi
Published: (2012)
Impact of Encryption on Qos in Voip
by: Radmand, Pedram, et al.
Published: (2010)
by: Radmand, Pedram, et al.
Published: (2010)
A survey on the cryptanalysis of the advanced encryption standard
by: Z’aba, Muhammad Reza, et al.
Published: (2006)
by: Z’aba, Muhammad Reza, et al.
Published: (2006)
Image encryption algorithm based on chaotic mapping
by: Salleh, Mazleena, et al.
Published: (2003)
by: Salleh, Mazleena, et al.
Published: (2003)
Enhancing cloud data security using hybrid of advanced encryption standard and Blowfish encryption algorithms
by: -, Salma, et al.
Published: (2019)
by: -, Salma, et al.
Published: (2019)
An Enhanced Distribution Transforming Encoder (Dte) Of The Honey Encryption Scheme For Reinforcing Text-Based Encryption
by: Omolara, Abiodun Esther
Published: (2020)
by: Omolara, Abiodun Esther
Published: (2020)
Implementation Of FPGA Based Encryption Chip Using VHD - Data Encryption Standard (DES) Algorithm
by: Lim, Mui Liang
Published: (2006)
by: Lim, Mui Liang
Published: (2006)
An Enhanced Distribution Transforming Encoder (Dte) Of The Honey Encryption Scheme For Reinforcing Text-Based Encryption
by: Omolara, Abiodun Esther
Published: (2020)
by: Omolara, Abiodun Esther
Published: (2020)
Chaotic asymmetric encryption process for data security.
by: Kamel Arrifin, Muhammad Rezal, et al.
Published: (2008)
by: Kamel Arrifin, Muhammad Rezal, et al.
Published: (2008)
Speech enhancement in binaural hearing protection devices
by: Yong, Pei Chee
Published: (2013)
by: Yong, Pei Chee
Published: (2013)
Similar Items
-
Optical-based hardware encryption device for software protection
by: Ehsan, Abang Annuar, et al.
Published: (2015) -
Plastic optical fiber couplers for portable optical access-card system / Abang Annuar Ehsan
by: Ehsan, Abang Annuar
Published: (2010) -
Analysis and countermeasure to improve a low takt production item based on LPS evaluation at Hicom Teck See Sdn. Bhd.
by: Muhammad Quyyum, Sohaimi
Published: (2012) -
Light database encryption design utilizing multicore processors for mobile devices
by: Alomari, Mohammad Ahmed, et al.
Published: (2019) -
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
by: Norhidayah, Muhammad, et al.
Published: (2012)