نتایج جستجو برای: copy protection
تعداد نتایج: 227907 فیلتر نتایج به سال:
There are well-known circumstances under which unilateral refusals to license will cause harm to competition, that is, will lower consumer welfare. However, when the strategy is profitable, refusals to license also increase the returns to intellectual property, and thus limitations on them will reduce the incentives for firms to invest in innovation. The optimal balance between innovation incen...
Introduction A growing level of attention has recently been given to the automated control of potentially hazardous processes such as the overpressure or containment of dangerous substances. Several independent protection methods provide measures to reduce the risk from such hazards to personnel, the environment and assets. A significant level of this risk reduction is allocated to safety instr...
In this paper we investigate the impact of missing replay protection as well as missing integrity protection concerning a local attacker in AN.ON. AN.ON is a low latency anonymity network mostly used to anonymize web traffic. We demonstrate that both protection mechanisms are important by presenting two attacks that become feasible as soon as the mechanisms are missing. We mount both attacks on...
This chapter was originally published in the book Handbook of The Philosophy of Science: Philosophy of Ecology. The copy attached is provided by Elsevier for the author’s benefit and for the benefit of the author’s institution, for non-commercial research, and educational use. This includes without limitation use in instruction at your institution, distribution to specific colleagues, and provi...
For the security technology that has been achieved with software in the computer system and the protection of the intellectual property right of software, software protection technology is necessary. One of those techniques is called obfuscation, which converts program to make analysis difficult while preserving its function. In this paper, we examine the applicability of our program obfuscatio...
Techniques for digital image tampering are becoming widespread for the availability of low cost technology in which the image could be easily manipulated. Copy-move forgery is one of the tampering techniques that are frequently used and has recently received significant attention. But the existing methods, including block-matching and key point matching based methods, are not able to be used to...
This paper discusses the issues surrounding digital image copy prevention and proposes a scheme to provide a single-copy picture sharing mechanism. Pictures are treated as a low-stakes electronic currency without anonymity. A reversible image degradation scheme is also proposed to render the distribution of copies of the images useless.
Due to high speed computer networks, the use of digitally formatted data has increased many folds.The digital data can be duplicated and edited with great ease which has led to a need for effectivecopyright protection tools. Digital Watermarking is a technology of embedding watermark withintellectual property rights into images, videos, audios and other multimedia data by a certainalgorithm .Di...
Quantum cryptography is known for enabling functionalities that are unattainable using classical information alone. Recently, Secure Software Leasing (SSL) has emerged as one of these areas interest. Given a target circuit $C$ from class, SSL produces an encoding enables recipient to evaluate $C$, and also the originator software verify been returned -- meaning relinquished possibility any furt...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید