This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Software Authorization Systems
September/October 1986 (vol. 3 no. 5)
pp. 34-41
P.A. Suhler, University of Texas at Austin
For every piece of business software sold, at least one illegal copy exists. This article describes and classifies software-protection methods.
Citation:
P.A. Suhler, N. Bagherzadeh, M. Malek, N. Iscoe, "Software Authorization Systems," IEEE Software, vol. 3, no. 5, pp. 34-41, Sept.-Oct. 1986, doi:10.1109/MS.1986.234396
Usage of this product signifies your acceptance of the Terms of Use.