نتایج جستجو برای: copy protection

تعداد نتایج: 227907  

2003
Paul C. van Oorschot

We provide a selective survey on software protection, including approaches to software tamper resistance, obfuscation, software diversity, and white-box cryptography. We review the early literature in the area plus recent activities related to trusted platforms, and discuss challenges and future directions.

2017
Georgi Karadzhov Tsvetomila Mihaylova Yasen Kiprov Georgi Georgiev Ivan Koychev Preslav Nakov

Users posting online expect to remain anonymous unless they have logged in, which is often needed for them to be able to discuss freely on various topics. Preserving the anonymity of a text’s writer can be also important in some other contexts, e.g., in the case of witness protection or anonymity programs. However, each person has his/her own style of writing, which can be analyzed using stylom...

2008
Sang Hoo Bae Pilsik Choi

The purpose of this paper is to investigate how different types of demand structure affect firms’ optimal pricing and private copy protection (DRM) level of digital products. We construct a model where the equilibrium prices and protection levels are dependent upon the two parameters: public copy protection of digital products and degree of compatibility of DRM in terms of hacking technology. W...

2002
Christoph Busch Paolo Nesi Martin Schmucker Marius B. Spinu

Content protection for multimedia data is widely recognized especially for data types that are frequently distributed, sold or shared using the Internet. Particularly music industry dealing with audio files realized the necessity for content protection. Distribution of music sheets will face the same problems. Digital watermarking techniques provide a certain level of protection for these music...

2007
Bin Fu Sai Aravalli John Abraham

In this paper, we propose an architecture that protects software by the hardware. The protection hardware can reside on the local machine in the form of a chip or on a remote server on the same network. We show that such a protection method can be combined with the code obfuscation method and develop two obfuscation methods for the proposed software protection architecture.

2011
Alex Sen Gupta Ben McNeil

This chapter was originally published in the book The Future of the World's Climate. The copy attached is provided by Elsevier for the author's benefit and for the benefit of the author's institution, for non-commercial research, and educational use. This includes without limitation use in instruction at your institution, distribution to specific colleagues, and providing a copy to your institu...

2000
Michael Nicholson Michael W Nicholson

I analyze the manner in which multinational enterprises facilitate technology transfer from the North to the South, and the role played by the protection of intellectual property. Different industries respond to changes in intellectual property protection (IPP) regimes differently, and will alter their mode of entry accordingly. Firms with complex but easily imitable products will tend to inter...

2016
HONGYAN DUI LIWEI CHEN

Importance measures are being widely used in risk-informed applications to characterize the importance of component failures, human errors, common cause failures, etc. In order to decrease the impact of external factors and increase the system survivability, a multilevel protection is applied to its components or subsystems. Each level of protection can have multiple states from perfect protect...

Journal: :Discrete Applied Mathematics 2011
Jonelle Hook Garth Isaak

The graph Ramsey number R(G,H) is the smallest integer r such that every 2-coloring of the edges of Kr contains either a red copy of G or a blue copy of H . We find the largest star that can be removed from Kr such that the underlying graph is still forced to have a red G or a blue H . Thus, we introduce the star-critical Ramsey number r∗(G,H) as the smallest integer k such that every 2-colorin...

2008
Laura Arnaiz Lara García Federico Alvarez José Manuel Menéndez Guillermo Cisneros

In the present paper a novel system for scalable and personalised media management and its architecture is presented. The proposed solution is based on the creation of a secure and adaptable content delivery architecture and the underlying mechanisms to ensure the correct content management which, along with the content protection mechanisms, can be useful for, on one hand, ensuring user privac...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید