WHLK: Framework for Software Authentication and Protection

@inproceedings{Gupta2014WHLKFF,
  title={WHLK: Framework for Software Authentication and Protection},
  author={Nishant Gupta and Shubhnandan S. Jamwal and Devanand Padha},
  year={2014}
}
In the last decade, numbers of algorithms were developed to control the piracy. In most of the existing algorithms and software registration schemes, the identity of users and software is not taken into account. After identifying the fundamental weakness of existing piracy control measures, this paper proposes the implementation and testing of WHLK Model [1] in which we introduced an integration of Software Watermarking, Hardware Parameters and License Key that can greatly reduce unauthorized… CONTINUE READING

Figures and Topics from this paper.

Citations

Publications citing this paper.

References

Publications referenced by this paper.
SHOWING 1-10 OF 19 REFERENCES

An Evaluation of the Resilience of Static Java Bytecode Watermarks Against Distortive Attacks ”

  • S. Danicic
  • Int . J . of Computer Science , International…
  • 2011

Evaluation of the Resilience of Static Java Bytecode Watermarks Against Distortive Attacks

  • J. Hamilton, S. Danicic, ”An
  • Int. J. of Computer Science, International…
  • 2011
3 Excerpts

jEdit - programmer’s text editor

  • world-wide developer team
  • , Available: http: //www.jedit.org/
  • 2010
1 Excerpt

Similar Papers

Loading similar papers…