A Method of Protecting a Program from Unauthorized use that is Resistant to a Brute Force Attack | IEEE Conference Publication | IEEE Xplore