نتایج جستجو برای: ip piracy

تعداد نتایج: 42073  

Journal: :IMAPS symposia and conferences 2023

The chips used in modern electronic devices are mainly manufactured and packaged by Outsourced Semiconductor Assembly Test (OSAT) facilities potentially vulnerable to hardware attacks. Due the complexity of global supply chain, it is difficult track full fabrication process foundries or intellectual property (IP) owners. Additionally, design for fabricating packaging chip made IP owners remains...

2011
J. Todd McDonald Yong C. Kim

The ability to protect critical cyber infrastructure remains a multi-faceted problem facing both the commercial sector and the federal government. Hardware intellectual property (IP) embedded within application-specific integrated circuits and programmable logic devices are subject to adversarial analysis in the form of subversion, piracy, and reverse engineering. We consider the effect of tran...

Journal: :CoRR 2010
Pere Manils Chaabane Abdelberi Stevens Le Blond Mohamed Ali Kâafar Claude Castelluccia Arnaud Legout Walid Dabbous

Privacy of users in P2P networks goes far beyond their current usage and is a fundamental requirement to the adoption of P2P protocols for legal usage. In a climate of cold war between these users and anti-piracy groups, more and more users are moving to anonymizing networks in an attempt to hide their identity. However, when not designed to protect users information, a P2P protocol would leak ...

Journal: :Information Economics and Policy 2010
Pilsik Choi Sang Hoo Bae Jongbyung Jun

The purpose of this paper is to investigate how different types of strategic interaction affect firms’ optimal levels of digital rights management (DRM). In our game-theoretical duopoly model, the firms do not directly compete with prices, but they become interdependent while coping with digital piracy. Our analysis shows that (1) stricter public copy protection by the government leads to lower...

Journal: :IACR Cryptology ePrint Archive 2017
Muhammad Yasin Bodhisatwa Mazumdar Ozgur Sinanoglu Jeyavijayan Rajendran

With the adoption of a globalized and distributed IC design flow, IP piracy, reverse engineering, and counterfeiting threats are becoming more prevalent. Logic obfuscation techniques including logic locking and IC camouflaging have been developed to address these emergent challenges. A major challenge for logic locking and camouflaging techniques is to resist Boolean satisfiability (SAT) based ...

Journal: :J. of Management Information Systems 2003
Ramnath K. Chellappa Shivendu Shivendu

Even if bandwidth on the Internet is limited, compression technologies have made online music piracy a foremost problem in intellectual copyright protection. However, due to significantly larger sizes of video files, movies are still largely pirated by duplicating DVDs, VCDs, and other physical media. In the case of DVDs, movie studios have historically maintained different technology codes or ...

2011
Rahul Potharaju Jeff Seibert Sonia Fahmy Cristina Nita-Rotaru

1 The arms race between copyright agencies and P2P users is an ongoing and evolving struggle. On the one hand, content providers are using several techniques to stealthily find unauthorized distribution of copyrighted work in order to deal with the problem of Internet piracy. On the other hand, P2P users are relying increasingly on blacklists and anonymization methods in order to avoid detectio...

2011
Cheolho Yoon

Since digital piracy has posed a significant threat to the development of the software industry and the growth of the digital media industry, it has, for the last decade, held considerable interest for researchers and practitioners. This article will propose an integrated model that combines the theory of planned behavior (TPB) and ethics theory, the two theories that are most often used in dig...

2014
WOJCIECH HARDY MICHAŁ KRAWCZYK JOANNA TYROWICZ Justyna Kossak

Internet Piracy and Book Sales: A Field Experiment Michal Krawczyk Widespread Internet piracy continues to fuel the debate about the appropriate level of copyright enforcement. In this project we used experimental methods to study the effect which underlies calls for stringent anti-piracy measures, namely that infringement has detrimental impact on legal sales. Focusing on the book industry, we...

Journal: :JGIM 2010
Trevor T. Moores

This article examines the relationship between Hofstede’s national culture indices (IDV, PSI, MAS, and UAI), economic wealth (GNI), and national software piracy rates (SPR). Although a number of studies have already examined this relationship, the contribution of this article is two-fold. First, we develop a path model that highlights not only the key factors that promote software piracy, but a...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید