Sciweavers

1307 search results - page 12 / 262
» Follow the intellectual property
Sort
View
DEXAW
1999
IEEE
98views Database» more  DEXAW 1999»
15 years 4 months ago
Shaping the Research Agenda for Security in E-Commerce
In this paper, we overview the current state-of-the-art and future trends in network security and argue that the security requirements of electronic commerce (e-commerce) applicat...
Rolf Oppliger
ICCAD
1998
IEEE
196views Hardware» more  ICCAD 1998»
15 years 4 months ago
Analysis of watermarking techniques for graph coloring problem
We lay out a theoretical framework to evaluate watermarking techniques for intellectual property protection (IPP). Based on this framework, we analyze two watermarking techniques ...
Gang Qu, Miodrag Potkonjak
66
Voted
CORR
2010
Springer
138views Education» more  CORR 2010»
14 years 12 months ago
The Digital Signature Scheme MQQ-SIG
Abstract: This document contains the Intellectual Property Statement and the technical description of the MQQ-SIG - a new public key digital signature scheme. The complete scientif...
Danilo Gligoroski, Svein Johan Knapskog, Smile Mar...
DRM
2005
Springer
15 years 5 months ago
Hybrid static-dynamic attacks against software protection mechanisms
Advances in reverse engineering and program analyses have made software extremely vulnerable to malicious host attacks. These attacks typically take the form of intellectual prope...
Matias Madou, Bertrand Anckaert, Bjorn De Sutter, ...
ISQED
2005
IEEE
116views Hardware» more  ISQED 2005»
15 years 5 months ago
A Mask Reuse Methodology for Reducing System-on-a-Chip Cost
Today's System-on-a-Chip (SoC) design methodology provides an efficient way to develop highly integrated systems on a single chip by utilizing pre-designed intellectual prope...
Subhrajit Bhattacharya, John A. Darringer, Daniel ...