Academic literature on the topic 'Protection des IP'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Protection des IP.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Protection des IP"
McKenna, Brian. "Smart IP protection." Infosecurity Today 1, no. 3 (May 2004): 1. http://dx.doi.org/10.1016/s1742-6847(04)00049-7.
Full textMujtaba, G., and М. Zia-Ul-Haq. "The Disclosure Requirements of Software Patents: Suggestions for Developing Countries." Kutafin Law Review 11, no. 1 (April 10, 2024): 96–123. http://dx.doi.org/10.17803/2713-0533.2024.1.27.096-123.
Full textMetz, C. "IP protection and restoration." IEEE Internet Computing 4, no. 2 (2000): 97–102. http://dx.doi.org/10.1109/4236.832952.
Full textShi, Dengke. "Intellectual Property Protection of Virtual IP in the Age of Digital Economy and Its Jurisprudence Discussion." Lecture Notes in Education Psychology and Public Media 24, no. 1 (November 20, 2023): 270–75. http://dx.doi.org/10.54254/2753-7048/24/20230746.
Full textCORREIA, N. S. C., and M. C. R. MEDEIROS. "Survivability in IP-over-WDM Networks: WDM Lightpath Protection versus IP LSP Protection." Fiber and Integrated Optics 24, no. 3-4 (May 2005): 353–69. http://dx.doi.org/10.1080/01468030590923046.
Full textSaha, Debasri, and Susmita Sur-Kolay. "SoC: A Real Platform for IP Reuse, IP Infringement, and IP Protection." VLSI Design 2011 (April 5, 2011): 1–10. http://dx.doi.org/10.1155/2011/731957.
Full textNewbould, R. D., D. L. Irby, J. D. Carothers, J. J. Rodriguez, and W. T. Holman. "Watermarking ICs for IP protection." Electronics Letters 38, no. 6 (2002): 272. http://dx.doi.org/10.1049/el:20020143.
Full textBolos, Mihaela Daciana. "IP Protection and International Trade." Procedia Economics and Finance 3 (2012): 908–13. http://dx.doi.org/10.1016/s2212-5671(12)00249-3.
Full textShi, Guanming, Carl Pray, and Wenhui Zhang. "Effectiveness of Intellectual Property Protection: Survey Evidence from China." Agricultural and Resource Economics Review 41, no. 3 (December 2012): 286–97. http://dx.doi.org/10.1017/s106828050000126x.
Full textCorreia, N. S. C., and M. C. R. Medeiros. "On the Maximum Protection Problem in IP-over-WDM Networks Using IP LSP Protection." Photonic Network Communications 10, no. 1 (July 2005): 73–85. http://dx.doi.org/10.1007/s11107-004-1696-1.
Full textDissertations / Theses on the topic "Protection des IP"
Marolia, Pratik M. "Watermarking FPGA bitstream for IP protection." Thesis, Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/24804.
Full textCommittee Chair: Dr. Lee, Hsien-Hsin S.; Committee Member: Dr. Lim, Sung-Kyu; Committee Member: Dr. Yalamanchili, Sudhakar.
Lubasi, Mampi Nakutoma. "Real-time bandwidth encapsulation for IP/MPLS Protection Switching." Master's thesis, University of Cape Town, 2011. http://hdl.handle.net/11427/11816.
Full textBoni, Giacomo <1996>. "Legal Regulation and IP Rights Protection of Online games in China." Master's Degree Thesis, Università Ca' Foscari Venezia, 2021. http://hdl.handle.net/10579/19370.
Full textBuffet, Julien. "Techniques de protection contre les erreurs pour le streaming audio sur IP." Châtenay-Malabry, Ecole centrale de Paris, 2002. http://www.theses.fr/2002ECAP0857.
Full textHallbäck, Erik. "Digital Rights Management on an IP-based set-top box." Thesis, Linköping University, Department of Electrical Engineering, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-5395.
Full textDigital Rights Management (DRM) is a technology that allows service and content providers to distribute and sell digital content in a secure way. The content is encrypted and packaged with a license that is enforced before playback is allowed.
This thesis covers how a DRM system works and gives some cryptographic background. It also shows how Microsoft DRM for Network Devices can be implemented on an ip-based set-top box.
Simpson, Eric. "Runtime Intellectual Property Protection on Programmable Platforms." Thesis, Virginia Tech, 2007. http://hdl.handle.net/10919/32184.
Full textMaster of Science
Colombier, Brice. "Methods for protecting intellectual property of IP cores designers." Thesis, Lyon, 2017. http://www.theses.fr/2017LYSES038/document.
Full textDesigning integrated circuits is now an extremely complex task. This is why designers adopt a modular approach, where each functional block is described independently. These functional blocks, called intellectual property (IP) cores, are sold by their designers to system integrators who use them in complex projects. This division led to the rise of cases of illegal copying of IP cores. In order to fight this threat against intellectual property of lP core designers, the objective of this PhD thesis was to develop a secure remote activation scheme for IP cores, allowing the designer to know exactly how many IP cores are currently used. To achieve this, the first two contributions of thesis thesis deal with the modification of combinational logic of an IP core to make it activable. The first method allows to controllably force the outputs to a fixed logic value. The second is an efficient technique to select the nodes to controllably alter, so that the IP core is temporarily unusable. The third contribution of this thesis is a lightweight method of error correction to use with PUF (Physical Undonable Functions) responses, which are an intrinsic identifier of instances of the lP core. Reusing an error-correction protocol used in quantum key ex.change, this method is much more lightweight than error-correcting
Fan, Dian. "Scalable Video Transport over IP Networks." Scholarly Repository, 2010. http://scholarlyrepository.miami.edu/oa_dissertations/460.
Full textMüller, Karen E. "MPLS-based recovery." Thesis, Stellenbosch : Stellenbosch University, 2003. http://hdl.handle.net/10019.1/53506.
Full textENGLISH ABSTRACT: MPLS-based recovery is intended to effect rapid and complete restoration of traffic affected by a fault in a Multiprotocol Label Switching (MPLS) network. Two MPLS-based recovery models have been proposed: lP re-routing which establishes recovery paths on demand, and protection switching which works with pre-established recovery paths. lP re-routing is robust and frugal since no resources are pre-committed but it is inherently slower than protection switching which is intended to offer high reliability to premium services where fault recovery takes place at the 100 ms time scale. This thesis presents an overview of various recovery techniques and addresses the problem of how to find an in some sense optimal set of pre-established traffic engineered recovery paths, given a network with link capacities and traffic demands. We present and motivate our choice of a nonlinear objective function and optimization method for finding traffic engineered working and recovery paths. A variant of the flow deviation method is used to find and capacitate a set of optimal label switched paths. We present and evaluate two simple methods for computing a set of pre-established traffic engineered recovery paths by using the flow deviation method.
AFRIKAANSE OPSOMMING: MPLS-gebaseerde herstel is daarop gemik om verkeer wat deur 'n fout in 'n Multiprotokol Etiketwisseling (Multiprotocol Label Switching) (MPLS) netwerk geaffekteer is, vinnig en volledig te herstel. Twee MPLS-gebaseerde herstelmodelle is voorgestel: Internetprotokol-herroetering (lP rerouting) wat herstelpaaie op aanvraag tot stand bring, en beskermingsoorskakeling (protection switching) wat met voorafbeplande herstelpaaie werk. IP-herroetering is robuust en voordelig aangesien geen netwerkbronne vooraf gereserveer word nie, maar dit is inherent stadiger as beskermingsoorskakeling wat veronderstel is om 'n hoë graad van betroubaarheid aan belangrike dienste te bied waar die herstel van foute in die 100 ms tydskaal plaasvind. Hierdie tesis verskaf 'n oorsig oor verskeie hersteltegnieke en ondersoek die probleem hoe om 'n optimale versameling van voorafbeplande herstelpaaie te vind, gegee 'n netwerk met skakelkapasiteite (link capacities) en verwagte netwerkverkeer. Ons stel voor en motiveer ons keuse van 'n nie-lineêre objekfunksie en optimeringsmetode om verkeersontwerpde (traffic engineered) aktiewe en herstelpaaie te vind. 'n Variant van die vloeideviasie (flow deviation)-metode word gebruik om 'n optimale versameling van etiketwisseling (label switched) paaie te vind en om 'n optimale hoeveelheid kapasiteit aan die paaie toe te ken. Ons stel voor en evalueer twee eenvoudige metodes om 'n versameling van optimale voorafbeplande herstelpaaie te bereken deur die vloeideviasie-metode toe te pas.
Ekrt, Ondřej. "Trademark and Design Protection of Applied Art." Thesis, Uppsala universitet, Juridiska institutionen, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-352497.
Full textBooks on the topic "Protection des IP"
American Bar Association. Section of Intellectual Property Law, ed. IP protection in China. Chicago, Illinois: American Bar Association, Section of Intellectual Property Law, 2015.
Find full textEditorial Committee of China IP Protection Handbook. China IP protection handbook. Beijing: Intellectual Property Publishing House, 2008.
Find full textBossuet, Lilian, and Lionel Torres, eds. Foundations of Hardware IP Protection. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-50380-6.
Full textM, Hyland Mark LL, Carey Louise, and Law Society of Ireland, eds. Technology and IP law. Haywards Heath, West Sussex: Tottel Pub., 2008.
Find full textLi, Meng, and David Z. Pan. A Synergistic Framework for Hardware IP Privacy and Integrity Protection. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-41247-0.
Full textVasseur, Jean-Philippe. Network recovery: Protection and restoration of optical, SONET-SDH, IP and MPLS. San Francisco, Calif: Morgan Kaufmann, 2004.
Find full textKëllezi, Pranvera, Bruce Kilpatrick, and Pierre Kobel, eds. Liability for Antitrust Law Infringements & Protection of IP Rights in Distribution. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-17550-4.
Full textMario, Pickavet, and Demeester Piet, eds. Network recovery: Protection and restoration of optical, SONET-SDH, IP, and MPLS. Amsterdam: Elsevier/Morgan Kaufmann, 2004.
Find full textWolf, Wayne Hendrix. Modern VLSI design: IP-based design. 4th ed. Upper Saddle River, NJ: Prentice Hall, 2008.
Find full textZeidman, Robert. The software IP detective's handbook: Measurement, comparison, and infringement detection. Upper Saddle River, NJ: Prentice Hall, 2011.
Find full textBook chapters on the topic "Protection des IP"
Gassmann, Oliver, Angela Beckenbauer, and Sascha Friesike. "The IP Protection Star." In Profiting from Innovation in China, 43–87. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-30592-4_4.
Full textMohammed, Shayan, Sukanta Bhattacharjee, Yong-Ak Song, Krishnendu Chakrabarty, and Ramesh Karri. "Obfuscation for IP Protection." In Security of Biochip Cyberphysical Systems, 87–109. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-93274-9_6.
Full textMohammed, Shayan, Sukanta Bhattacharjee, Yong-Ak Song, Krishnendu Chakrabarty, and Ramesh Karri. "Watermarking for IP Protection." In Security of Biochip Cyberphysical Systems, 61–85. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-93274-9_5.
Full textHeim, Irina. "The Protection of IP." In Intellectual Property Management, 37–52. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-26743-7_3.
Full textJung, Edward, and Lilian Bossuet. "IP FSM Watermarking." In Foundations of Hardware IP Protection, 65–84. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-50380-6_4.
Full textJayasankaran, N. G., A. Sanabria-Borbón, E. Sánchez-Sinencio, J. Hu, and J. Rajendran. "Analog IP Protection and Evaluation." In Emerging Topics in Hardware Security, 419–69. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-64448-2_16.
Full textZamiri Azar, Kimia, Hadi Mardani Kamali, Farimah Farahmandi, and Mark Tehranipoor. "IP Protection: A Historical View." In Understanding Logic Locking, 47–62. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-37989-5_3.
Full textTorres, Lionel, Pascal Benoit, Jérome Rampon, Renaud Perillat, Dominic Spring, Gael Paul, Stephane Bonniol, and Lilian Bossuet. "Digital Right Management for IP Protection." In Foundations of Hardware IP Protection, 1–13. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-50380-6_1.
Full textCambou, Bertrand. "Enhancing Secure Elements—Technology and Architecture." In Foundations of Hardware IP Protection, 205–31. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-50380-6_10.
Full textColombier, Brice, Lilian Bossuet, and David Hély. "Turning Electronic Circuits Features into On-Chip Locks." In Foundations of Hardware IP Protection, 15–36. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-50380-6_2.
Full textConference papers on the topic "Protection des IP"
Dalpasso, Marcello, Alessandro Bogliolo, and Luca Benini. "Hardware/software IP protection." In the 37th conference. New York, New York, USA: ACM Press, 2000. http://dx.doi.org/10.1145/337292.337588.
Full textSu, Hui-Kai, Cheng-Shong Wu, and Yuan-Sun Chu. "IP Local Node Protection." In 2007 Second International Conference on Systems and Networks Communications (ICSNC 2007). IEEE, 2007. http://dx.doi.org/10.1109/icsnc.2007.47.
Full textCammarota, Rosario, Indranil Banerjee, and Ofer Rosenberg. "Machine learning IP protection." In ICCAD '18: IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3240765.3270589.
Full textWang, Jinwen, Yuhao Wu, Han Liu, Bo Yuan, Roger Chamberlain, and Ning Zhang. "IP Protection in TinyML." In 2023 60th ACM/IEEE Design Automation Conference (DAC). IEEE, 2023. http://dx.doi.org/10.1109/dac56929.2023.10247898.
Full textLiu, Qiang, and Haie Li. "A hierarchical IP protection approach for hard IP cores." In 2015 IEEE International Symposium on Circuits and Systems (ISCAS). IEEE, 2015. http://dx.doi.org/10.1109/iscas.2015.7168946.
Full textRampon, Jerome, Renaud Perillat, Lionel Torres, Pascal Benoit, Giorgio Di Natale, and Mario Barbareschi. "Digital Right Management for IP Protection." In 2015 IEEE Computer Society Annual Symposium on VLSI (ISVLSI). IEEE, 2015. http://dx.doi.org/10.1109/isvlsi.2015.127.
Full textLi, Qi, Mingwei Xu, Jianping Wu, Xingang Shi, Dah Ming Chiu, and Patrick P. C. Lee. "Achieving Unified Protection for IP Routing." In 2010 19th International Conference on Computer Communications and Networks ( ICCCN 2010). IEEE, 2010. http://dx.doi.org/10.1109/icccn.2010.5560122.
Full textWood, Steve, and Gordon W. Romney. "Protection methods against IP packet attacks." In the 5th conference. New York, New York, USA: ACM Press, 2004. http://dx.doi.org/10.1145/1029533.1029609.
Full textKepa, Krzysztof, Fearghal Morgan, and Krzysztof Kosciuszkiewicz. "IP protection in Partially Reconfigurable FPGAs." In 2009 International Conference on Field Programmable Logic and Applications (FPL). IEEE, 2009. http://dx.doi.org/10.1109/fpl.2009.5272250.
Full textCollini, Luca, Benjamin Tan, Christian Pilato, and Ramesh Karri. "Reconfigurable Logic for Hardware IP Protection." In ICCAD '22: IEEE/ACM International Conference on Computer-Aided Design. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3508352.3561117.
Full textReports on the topic "Protection des IP"
Hanlon, Walker, and Taylor Jaworski. Spillover Effects of IP Protection in the Inter-war Aircraft Industry. Cambridge, MA: National Bureau of Economic Research, November 2019. http://dx.doi.org/10.3386/w26490.
Full textMinero Alejandre, Gemma. Ownership of Databases: Personal Data Protection and Intellectual Property Rights on Databases. Universitätsbibliothek J. C. Senckenberg, Frankfurt am Main, 2021. http://dx.doi.org/10.21248/gups.64578.
Full textDe León, Ignacio L., and Jose Fernandez Donoso. The Costs of Using Formal Intellectual Property Rights: A Survey on Small Innovative Enterprises in Latin America. Inter-American Development Bank, September 2016. http://dx.doi.org/10.18235/0007023.
Full textThe Status and Future of Rights-Based Conservation in the Amazon of Colombia and Peru. Rights and Resources Initiative, September 2022. http://dx.doi.org/10.53892/gzum7792.
Full text