Full Paper View Go Back

USB-Privacy: Security To Software Using USB

Hemangi R. Patil1 , Snehal A. Nawale2 , Jayshree R. Sanap3 , Chandrashekhar M. Raut4

  1. Dept. Computer, Datta Meghe College of Engineering, Airoli, India.
  2. Dept. Computer, Datta Meghe College of Engineering, Airoli, India.
  3. Dept. Computer, Datta Meghe College of Engineering, Airoli, India.
  4. Dept. Computer, Datta Meghe College of Engineering, Airoli, India.

Correspondence should be addressed to: hemangi20p@gmail.com.


Section:Review Paper, Product Type: Isroset-Journal
Vol.5 , Issue.4 , pp.70-72, Aug-2017


Online published on Aug 30, 2017


Copyright © Hemangi R. Patil, Snehal A. Nawale, Jayshree R. Sanap, Chandrashekhar M. Raut . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Hemangi R. Patil, Snehal A. Nawale, Jayshree R. Sanap, Chandrashekhar M. Raut, “USB-Privacy: Security To Software Using USB,” International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.4, pp.70-72, 2017.

MLA Style Citation: Hemangi R. Patil, Snehal A. Nawale, Jayshree R. Sanap, Chandrashekhar M. Raut "USB-Privacy: Security To Software Using USB." International Journal of Scientific Research in Computer Science and Engineering 5.4 (2017): 70-72.

APA Style Citation: Hemangi R. Patil, Snehal A. Nawale, Jayshree R. Sanap, Chandrashekhar M. Raut, (2017). USB-Privacy: Security To Software Using USB. International Journal of Scientific Research in Computer Science and Engineering, 5(4), 70-72.

BibTex Style Citation:
@article{Patil_2017,
author = {Hemangi R. Patil, Snehal A. Nawale, Jayshree R. Sanap, Chandrashekhar M. Raut},
title = {USB-Privacy: Security To Software Using USB},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {8 2017},
volume = {5},
Issue = {4},
month = {8},
year = {2017},
issn = {2347-2693},
pages = {70-72},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=443},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=443
TI - USB-Privacy: Security To Software Using USB
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - Hemangi R. Patil, Snehal A. Nawale, Jayshree R. Sanap, Chandrashekhar M. Raut
PY - 2017
DA - 2017/08/30
PB - IJCSE, Indore, INDIA
SP - 70-72
IS - 4
VL - 5
SN - 2347-2693
ER -

245 Views    193 Downloads    128 Downloads
  
  

Abstract :
The general way of providing a security to any software or application, is, a key verification. If we share this key and try to use the software on different machines. . We can create the copies of the software. This is basically known as a `piracy`. To prevent such a illegal activities, there are many security applications present in the market nowadays. But piracy prevention can be achieved by simply making it machine specific. The software is provided with USB-drive which is when connected check for the valid machine and allow using the software only on the valid machine. This paper will explain the concept in detail.

Key-Words / Index Term :
USB (Universal Serial Bus), Machine Specific, Dongle, Piracy, Vendor

References :
[1] Cryptographic primitives. “handbook of applied cryptography” by menezes
[2] Modern cryptosystems .Jwezy Wojdylo.September 21, 2001.Cryptography, jerzy wojdylo, 9/21/01. Overview of Classical cryptography.
[3] Public-key cryptography processor, ieee j.Solid-state cir-cuits, vol. …Rsa and ecc Crypto processor.”
[4] Kryptonite-A Programmable Crypto processor
[5] Paul C. Van Oorschot Alfred J. Menezes and Scott A.Vanstone,Handbook of applied cryptography, CRC presses Inc., Florida, 1996.
[6] Bruce schneier, applied cryptography (2nd ed.), johnwiley and sons, inc., New York, 1996.

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at  support@isroset.org or view contact page for more details.

Go to Navigation