Software Protection by Combining Hash Function with Hardware Identifications. (2019). Journal of the College of Education for Women, 25(2). https://jcoeduw.uobaghdad.edu.iq/index.php/journal/article/view/774