Contents
Academic literature on the topic 'Anti-piratage'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Anti-piratage.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Anti-piratage"
Belleflamme, Paul. "Numéro 17 - décembre 2003." Regards économiques, October 12, 2018. http://dx.doi.org/10.14428/regardseco.v1i0.16123.
Full textBelleflamme, Paul. "Numéro 17 - décembre 2003." Regards économiques, October 12, 2018. http://dx.doi.org/10.14428/regardseco2003.12.01.
Full textDissertations / Theses on the topic "Anti-piratage"
Bellego, Christophe. "Three empirical essays on movie admissions in the french motion picture industry." Thesis, Paris 1, 2016. http://www.theses.fr/2016PA01E060.
Full textAt the frontier between entertainment industries and cultural production, vital content provider of digital economy, the motion picture industry raises several interesting questions in the field of economics and marketing. This dissertation tackles three important empirical questions in the motion picture industry using different methods (panel data models, difference-in-differences, and structural econometrics) and brings a new theoretical development about the nested logit model. The first chapter deals with online consumer reviews, also known as electronic word of mouth (eWOM), and focuses on the extent to which prerelease information alters the effect of eWOM on movie sales. The second chapter studies the collateral damages of the French anti-piracy law known as Hadopi on box office performances of movies, by carefully ruling out alternative explanations of the result. The third chapter investigates on seasonality in the French movie industry. The analysis separately identifies and decomposes movie sales into the number and quality of available movies, underlying seasonal demand, weather shocks, and national sales promotion by estimating a three-level nested logit model of weekly demand accounting for congestion on movie theaters' screens. The model is used to identify optimal release periods depending on the types of movie
Díaz, Rizo Alán Rodrigo. "Security and Trust for Wireless Integrated Circuits." Electronic Thesis or Diss., Sorbonne université, 2023. http://www.theses.fr/2023SORUS005.
Full textThe origin of the hardware security threats is the massively globalized and outsourcing-based Integrated Circuit (IC) supply chain that we see today. The prohibitively cost of owning a first-rate semiconductor foundry forces IC design houses to go fabless and outsource their IC fabrication, assembly, and testing. Outsourcing these tasks intensifies the risk of IC piracy attacks and Hardware Trojan (HT) insertion, and both threats translate into know-how and financial losses for the IC owner. Moreover, complex Systems-on-Chip (SoCs) are built by integrating third-party Intellectual Property (IP) cores from multiple IP providers. However, SoC integrators and IP providers have an imbalanced trust relationship. While IP providers are vulnerable to IP overuse, IP cloning, and IC overproduction, SoC integrators fear integrating HT-infected IPs into their systems. We propose a locking-based design-for-security methodology. In addition, we develop an RF transceiver-specific locking methodology that consists in two spatially separated mechanisms. inserting a locking mechanism into the circuit that unlocks with a single secret key in the form of a digital word. To assess the security of wireless ICs, we propose an HT attack that leaks sensitive information from the transmitter within a legitimate transmission
Elshamy, Mohamed. "Design for security in mixed analog-digital integrated circuits." Electronic Thesis or Diss., Sorbonne université, 2021. http://www.theses.fr/2021SORUS093.
Full textRecently, the enormous cost of owning and maintaining a modern semiconductor manufacturing plant has coerced many companies to go fabless. By outsourcing the manufacturing IC/IP to third-party and often off-shore companies, the process has been extended to potentially untrustworthy companies. This has resulted in several security threats to the semiconductor industry such as counterfeiting, reverse engineering, and HTs insertion. In this thesis, we propose an anti-piracy countermeasure to protect AMS ICs/IPs, a novel HT attack for AMS ICs/IPs, and a novel PUF. More specifically, we propose an anti-piracy technique based on locking for programmable analog circuits. The proposed technique leverages the programmability fabric to implement a natural lock-less locking. We discuss its implementation and its resilience capabilities against foreseen attacks. The proposed HT attack for analog circuits leverages the test infrastructure. The HT is hidden effectively in a digital core and transfers its payload to the analog circuit via the test bus and the interface of the analog circuit to the test bus. Its key characteristic is that it is invisible in the analog domain. The proposed HT is demonstrated on two case studies. This thesis sheds light on the importance of developing new security and trust countermeasures tailored for analog circuits. The proposed PUF, called "neuron-PUF", uses a single spiking neuron as the source of entropy. Its key characteristic is that it uses a single PUF cell and temporal redundancy to generate an arbitrarily long key, which results in significant low area and power overheads compared to mainstream PUFs, such as delay-based and memory-based PUFs