-
1
Quantum Copy-Protection and Quantum Money
Published 2010“…One can also ask a related question, which seems to be new: can quantum states be used as copy-protected programs, which let the user evaluate some function f, but not create more programs for f? …”
Get full text
Get full text
Article -
2
Memoization Attacks and Copy Protection in Partitioned Applications
Published 2006“…Secure platforms have been proposed that protect the secrecy of application algorithms and enforce copy protection assurances. Unfortunately, these capabilities incur a sizeable performance overhead. …”
Get full text
-
3
On the Properties of Algebraic Geometric Codes as Copy Protection Codes
Published 2020-03-01Get full text
Article -
4
Copy Protection in Jet Set Willy: developing methodology for retrogame archaeology
Published 2017-04-01Subjects: Get full text
Article -
5
Cryptographic Simulation Techniques with Applications to Quantum Zero-Knowledge and Copy-Protection
Published 2022“…One of our main results is that we can adapt this non-black-box technique to the setting of quantum copy-protection to prove that it is impossible to quantum copy-protect arbitrary unlearnable functions. …”
Get full text
Thesis -
6
-
7
A Reusable Software Copy Protection Using Hash Result and Asymetrical Encryption
Published 2014-12-01Subjects: “…software copy protection, hash, asymmetrical encryption…”
Get full text
Article -
8
Online modules: novel model in serial-based method of software copy protection
Published 2013“…Since now the researchers proposed some copy protection models that all of them have weakness to protect against unauthorized copying. …”
Get full text
Thesis -
9
-
10
-
11
DATA PROTECTION TECHNOLOGIES IN THE DISTANCE LEARNING SYSTEMS
Published 2015-06-01“…There are analyzed key places that require protection and suggested possible options for their protection, such as the use of CAPTCHA for registration, protection for the IP-address and service of copy protection. Testing of the proposed security tools was piloted in terms of e-learning course "Information Technologies of Systems Analysis".…”
Get full text
Article -
12
-
13
Watermarking in WAV Files Bases on Phase Coding
Published 2011-03-01“…WAV audio files is one of these media, these media file format itself has no built in copy protection controls. Other systems must be used to prevent illegal copying called watermarking. …”
Get full text
Article -
14
THE LABELLING OF THE CONTAINERS FOR STORAGE AND TRANSPORTATION OF MEDICINAL PRODUCTS
Published 2018-02-01“…The label is additionally equipped with a diffractive element copy protection, with a surface microrelief, creating the effect of optical diffraction, and the information that should be included in bar code originally entered into the Central computer control institutions of the supporting documents provided by the supplier for each delivered batch of goods, and then by computer conversion of this information on a predefined algorithm that transforms the data from supporting documents by a specific rule that specifies a particular responsible person of the region by entering the password in the set of symbols form a bar code and produce printing batches of labels in the statement of the provider number for a label on each unit of production with application to each barcode labels, and vending facility shall review products by visual inspection of the presence of the diffraction element and the read bar code labels are scanned per unit of output with simultaneous inverse transformation according to a predefined algorithm included in the bar code information and comparing the information from supporting documents submitted by provider for each delivered batch.…”
Get full text
Article -
15
Safe and Policy Oriented Secure Android-Based Industrial Embedded Control System
Published 2020-04-01“…Herein, we adopted a hardware copy protection chip and enforced administrative security policies in the booting process and the Android application layer. …”
Get full text
Article -
16
Reconstructing the Economy: A Methodological Journey from the Surface to the Essence and Back
Published 2011-10-01“…But by the same capitalism, rigid Intellectual Property Rights and severe copy protection mechanisms enforce artificial shortage of information goods.…”
Get full text
Article -
17
-
18
-
19
mTOR Complex 2 Is Required for the Development of Prostate Cancer Induced by Pten Loss in Mice
Published 2015“…Furthermore, we find that Rictor is a haploinsufficient gene and that deleting one copy protects Pten heterozygous mice from prostate cancer. …”
Get full text
Get full text
Article