نتایج جستجو برای: ip piracy

تعداد نتایج: 42073  

Journal: :IEEE Computer 2003
Ahmet M. Eskicioglu

R ecent advances in digital communications and storage technologies have brought major changes for consumers. Magnetic and optical storage capacity, for example, is much higher today than it was a few years ago. Today’s basic personal computer system has 40 Gbytes of magnetic hard disk storage, and, although a DVD (digital versatile disk) is the same physical size as a CD, it’s faster and can s...

2001
Rajen Akalu Deepa Kundur

hough Holmes was not writing for a digital age and certainly not for an era of digital rights management (DRM), his remarks may hold some interesting insights for solving the DRM enigma. This article is about the similarities and differences that exist between law and engineering. It is about the nature and value of interdisciplinary research and the importance this approach will have in dealin...

Journal: :CoRR 2017
Jae-Won Jang Swaroop Ghosh

Semiconductor supply chain is increasingly getting exposed to variety of security attacks such as Trojan insertion, cloning, counterfeiting, reverse engineering (RE) and piracy of Intellectual Property (IP) due to involvement of untrusted parties. Camouflaging of gates has been proposed to hide the functionality of gates. However, gate camouflaging is associated with significant area, power and...

1998
Ang Yang Ang

Software piracy has been a widespread problem in tertiary institutions and business environment for years. This paper reports a factor analysis to explore some of the issues perceived by tertiary students. The study also attempts to determine the relationship between attitude to software piracy and age, gender, computer ownership, study area of concentration, and history of software copying to ...

Journal: :PeerJ PrePrints 2015
Nishant Gupta Shubhnandan S. Jamwal

Software piracy is the most significant and burning issue in the age of the internet. Software piracy has been a direct threat for software vendors in terms of revenue and, therefore, a number of effective and efficient techniques were employed for detection and prevention of software piracy. One of very important technique is software watermarking and using registration keys. This paper propos...

1992
Ram D. Gopal G. Lawrence Sanders

In an attempt to protect their intellectual property and compete effectively in an increasingly dynamic marketplace, software producers have employed a number of preventive and deterrent measures to counter software piracy. Conventional wisdom suggests that reducing piracy will force consumers to legitimately acquire software, thus increasing firm profits. In this paper, we develop an analytica...

Journal: :American Journal of International Law 2010

Journal: :IEEE Access 2023

Hardware obfuscating is a proactive design-for-trust technique against IC supply chain threats, i.e., IP piracy and overproduction. Many studies have evaluated numerous techniques for obfuscation purposes. Nevertheless, de-obfuscation attacks demonstrated their insufficiency. This paper proposes register-transfer (RT) level finite-state-machine (FSM) called ReTrustFSM that allows designers to o...

Journal: :The Bulletin of the National Tax Association 1925

Journal: :Bulletin of Electrical Engineering and Informatics 2022

The internet of things (IoT) describes the network physical objects equipped with sensors and other technologies to exchange data devices over Internet. Due its inherent flexibility, field-programmable gate array (FPGA) has become a viable platform for IoT development. However, various security threats such as FPGA bitstream cloning intellectual property (IP) piracy have major concern this devi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید