声明
DEDICATION
CHAPTER1:GENERAL INTRODUCTION
1.1Background to the study
1.2Definitions and Concepts
1.3 Reasons for software piracy
1.4 Effects of software piracy
1.5Scope of the study
1.6Organization of the thesis
CHAPTER2:LITERATURE REVIEW
2.1The ethics of piracy
2.2Types of software piracy
2.3 Possible solution
2.4 Value-chain model
2.5 Alternative methods of using value-chain models
2.6 Existing system
2.7 Softwareprotection methods
2.8 Authentication of a system
2.9 Encryption
CHAPTER3:CONCEPT AND DESIGN OF THE PROPOSED SOFTWARE PROTECTION SYSTEM
3.1 Procedure of the designed software protection system
3.2Phase 2:Generation of key
3.3Phase 3:Decryption and encapsulation
3.4Protection technique (EXE encapsulator)
CHAPTER4:EVALUATION OF THE PROPOSED SYSTEM
4.1 File encryption and decryption
CONCLUSION
参考文献
致谢
APPENDIX A
APPENDIX B