Showing 1 - 19 results of 19 for search '"Copy protection"', query time: 0.20s Refine Results
  1. 1

    Quantum Copy-Protection and Quantum Money by Aaronson, Scott

    Published 2010
    “…One can also ask a related question, which seems to be new: can quantum states be used as copy-protected programs, which let the user evaluate some function f, but not create more programs for f? …”
    Get full text
    Get full text
    Article
  2. 2

    Memoization Attacks and Copy Protection in Partitioned Applications by O'Donnell, Charles W., Suh,, G. Edward, Dijk, Marten vn, Devadas, Srinivas

    Published 2006
    “…Secure platforms have been proposed that protect the secrecy of application algorithms and enforce copy protection assurances. Unfortunately, these capabilities incur a sizeable performance overhead. …”
    Get full text
  3. 3
  4. 4
  5. 5

    Cryptographic Simulation Techniques with Applications to Quantum Zero-Knowledge and Copy-Protection by La Placa Massa, Rolando L.

    Published 2022
    “…One of our main results is that we can adapt this non-black-box technique to the setting of quantum copy-protection to prove that it is impossible to quantum copy-protect arbitrary unlearnable functions. …”
    Get full text
    Thesis
  6. 6
  7. 7

    A Reusable Software Copy Protection Using Hash Result and Asymetrical Encryption by Aswin Wibisurya, Timothy Yudi Adinugroho

    Published 2014-12-01
    Subjects: “…software copy protection, hash, asymmetrical encryption…”
    Get full text
    Article
  8. 8

    Online modules: novel model in serial-based method of software copy protection by Hakimi, Ahmad Ghadiri

    Published 2013
    “…Since now the researchers proposed some copy protection models that all of them have weakness to protect against unauthorized copying. …”
    Get full text
    Thesis
  9. 9
  10. 10

    Quantum private function evaluation by Zhu Cao

    Published 2023-01-01
    Subjects:
    Get full text
    Article
  11. 11

    DATA PROTECTION TECHNOLOGIES IN THE DISTANCE LEARNING SYSTEMS by Inna V. Herasymenko

    Published 2015-06-01
    “…There are analyzed key places that require protection and suggested possible options for their protection, such as the use of CAPTCHA for registration, protection for the IP-address and service of copy protection. Testing of the proposed security tools was piloted in terms of e-learning course "Information Technologies of Systems Analysis".…”
    Get full text
    Article
  12. 12
  13. 13

    Watermarking in WAV Files Bases on Phase Coding by Salah S. Alrawi, Rasheed Abdulshaheed, Akeel A. Alhadithy

    Published 2011-03-01
    “…WAV audio files is one of these media, these media file format itself has no built in copy protection controls. Other systems must be used to prevent illegal copying called watermarking. …”
    Get full text
    Article
  14. 14

    THE LABELLING OF THE CONTAINERS FOR STORAGE AND TRANSPORTATION OF MEDICINAL PRODUCTS by A. P. Pereverzev, B. K. Romanov

    Published 2018-02-01
    “…The label is additionally equipped with a diffractive element copy protection, with a surface microrelief, creating the effect of optical diffraction, and the information that should be included in bar code originally entered into the Central computer control institutions of the supporting documents provided by the supplier for each delivered batch of goods, and then by computer conversion of this information on a predefined algorithm that transforms the data from supporting documents by a specific rule that specifies a particular responsible person of the region by entering the password in the set of symbols form a bar code and produce printing batches of labels in the statement of the provider number for a label on each unit of production with application to each barcode labels, and vending facility shall review products by visual inspection of the presence of the diffraction element and the read bar code labels are scanned per unit of output with simultaneous inverse transformation according to a predefined algorithm included in the bar code information and comparing the information from supporting documents submitted by provider for each delivered batch.…”
    Get full text
    Article
  15. 15

    Safe and Policy Oriented Secure Android-Based Industrial Embedded Control System by Raimarius Delgado, Jaeho Park, Cheonho Lee, Byoung Wook Choi

    Published 2020-04-01
    “…Herein, we adopted a hardware copy protection chip and enforced administrative security policies in the booting process and the Android application layer. …”
    Get full text
    Article
  16. 16

    Reconstructing the Economy: A Methodological Journey from the Surface to the Essence and Back by Peter Karl Fleissner

    Published 2011-10-01
    “…But by the same capitalism, rigid Intellectual Property Rights and severe copy protection mechanisms enforce artificial shortage of information goods.…”
    Get full text
    Article
  17. 17
  18. 18
  19. 19