Various Methodologies Available to Secure the Software Piracy and Discussion on a New Technique to Protect the Software
Crossref DOI link: https://doi.org/10.35940/ijrte.F6995.038620
Published Online: 2020-03-30
Update policy: https://doi.org/10.35940/beiesp.crossmarkpolicy
,
Kumar, Makam Radhakrishna Nandasai
Parthipan, V