Return to Article Details A Reusable Software Copy Protection Using Hash Result and Asymetrical Encryption Download Download PDF