نتایج جستجو برای: is called trade secret however

تعداد نتایج: 7611914  

2007
Katsuro Inoue

In this paper, we propose a scheme, named Software Tag, of software trade and development for improvement of traceability and transparency. Empirical data is collected during development, and processed into two types, open tag and secret tag, composing a software tag which is finally delivered to software purchaser.

Journal: :CoRR 2012
Youssef Bassil

Steganography is the art and science of writing hidden messages in such a way that no one apart from the sender and the receiver would realize that a secret communicating is taking place. Unlike cryptography which only scrambles secret data keeping them overt, steganography covers secret data into medium files such as image files and transmits them in total secrecy avoiding drawing eavesdropper...

2012
Tarik Kaced

Secret sharing deals with splitting a secret data between several participants. The participants are organized within an access structure consisting of groups that may gain access to the secret. The goal is to provide each participant with a piece of information such that the following two requirements are met: 1. Recoverability: a qualified group can recover the secret, 2. Privacy: any other g...

Journal: :Journal of Clinical Investigation 2010

Journal: :Eos, Transactions American Geophysical Union 2006

2003
Fred von Lohmann

What this is not: The following discussion focuses only on U.S. copyright law. While noncopyright principles may also be mentioned, this discussion does not attempt to examine other legal principles that might apply to P2P filesharing, including patent, trademark, trade secret, or unfair competition. Nothing contained herein constitutes legal advice—please discuss your individual situation with...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید