Return to Article Details Software Protection by Combining Hash Function with Hardware Identifications Download Download PDF