Filters








734,676 Hits in 4.4 sec

Public protection of software

Amir Herzberg, Shlomit S. Pinter
1987 ACM Transactions on Computer Systems  
Technical means of protecting software from illegal duplication are required, but the available means are imperfect.  ...  One of the overwhelming problems that software producers must contend with is the unauthorized use and distribution of their products.  ...  In particular, he motivated the modified versions of the protocols that appear in the appendixes.  ... 
doi:10.1145/29868.29872 fatcat:g66bjfhuq5eddmudtpyltc6g4q

Analysis of a Multivariate Public Key Cryptosystem and Its Application in Software Copy Protection

Ning Huang
2014 Journal of Software  
We analysed and solved possible singularity for an improved MFE multivariate public key (Medium Field Multivariate Public Key Encryption) and studied the use of it in software copy protection.  ...  We used our new MFE multivariate public key cryptosystem to design an algorithm of software registration, in which a given plaintext can result in multi-cipher-text..  ...  The developments of Multivariate Public Key Cryptosystem inspired us to try to apply it in software copy protection.  ... 
doi:10.4304/jsw.9.8.2010-2017 fatcat:x6kktte57naaxjqxjjbjk6zxxa

Software module for radiological protection of the public
Программный модуль радиологической защиты населения

A.N. Menyajlo, A. Tsyb Medical Radiological Research Centre – branch of the National Medical Research Radiological Centre of the Ministry of Health of the Russian Federation (A. Tsyb MRRC), S.Yu. Chekin, S.S. Lovachev, K.A. Tumanov, A.M. Korelo, V.K. Ivanov, A. Tsyb Medical Radiological Research Centre – branch of the National Medical Research Radiological Centre of the Ministry of Health of the Russian Federation (A. Tsyb MRRC), A. Tsyb Medical Radiological Research Centre – branch of the National Medical Research Radiological Centre of the Ministry of Health of the Russian Federation (A. Tsyb MRRC), A. Tsyb Medical Radiological Research Centre – branch of the National Medical Research Radiological Centre of the Ministry of Health of the Russian Federation (A. Tsyb MRRC), A. Tsyb Medical Radiological Research Centre – branch of the National Medical Research Radiological Centre of the Ministry of Health of the Russian Federation (A. Tsyb MRRC), A. Tsyb Medical Radiological Research Centre – branch of the National Medical Research Radiological Centre of the Ministry of Health of the Russian Federation (A. Tsyb MRRC)
2020 Radiation and Risk Bulletin of the National Radiation and Epidemiological Registry  
years of life lost per radiation-induced cancer).  ...  Определение доз внутреннего облучения основывается на дозовых коэффициентах, полученных по данным Американского агентства по защите окружающей среды (United States Environmental Protection Agency (EPA)  ...  В этой работе в качестве источника для базы данных дозовых коэффициентов использовалась распространяемая МКРЗ компьютерная программа «ICRP Database of Dose Coefficients: Workers and Members of the Public  ... 
doi:10.21870/0131-3878-2020-29-2-32-48 fatcat:qktdqnpxxrdaxk5t4ojsfevcxm

New technique to blur the iris pattern for protection of personal information using the public domain software, ImageJ

Takuo Ikeda
2018 Equilibrium Research  
ImageJ New technique to blur the iris pattern for protection of personal information using the public domain software, ImageJ  ...  In order to comply with the amended act on the protection of personal information, a new technique to blur the iris pattern was developed using the public domain software, Im-ageJ.  ...  In order to comply with the amended act on the protection of personal information, a new technique to blur the iris pattern was developed using the public domain software, Im-ageJ.  ... 
doi:10.3757/jser.77.566 fatcat:rf46igejbncdhmys74n762sody

Software tool for calculating the predicted environmental concentrations (PEC) of plant protection products (PPP) in soil for permanent and annual crops: Bug fixing & update report

VITO NV, Ingeborg Joris, Stijn Van Looy, Jan Bronders
2021 EFSA Supporting Publications  
PERSAM is a software tool for predicting environmental concentrations of plant protection products (PPPs) in soil commissioned by EFSA. The PERSAM tool was first launched in 2013.  ...  In support of the EFSA Guidance Document for predicting environmental concentrations of PPPs in soil (2017), the PERSAM software tool was updated for calculating the predicted environment concentration  ...  VITO developed the PERSAM tool, a software tool for predicting environmental concentrations of plant protection products (PPPs) in soil commissioned by EFSA.  ... 
doi:10.2903/sp.efsa.2021.en-6484 fatcat:qq4fcw52w5dszoincro2kijyly

Public Protection of Software [chapter]

Amir Herzberg, Shlomit S. Pinter
Lecture Notes in Computer Science  
Technical means of protecting software from illegal duplication are required, but the available means are imperfect.  ...  One of the overwhelming problems that software producers must contend with is the unauthorized use and distribution of their products.  ...  In particular, he motivated the modified versions of the protocols that appear in the appendixes.  ... 
doi:10.1007/3-540-39799-x_14 dblp:conf/crypto/HerzbergP85 fatcat:mf56cxnu7nf6fgblvv34mphoky

Assessment of Health Impacts of PM2.5 by AirQ+ Software in the City of Sanandaj, Iran (2018-2019)

Ghorban Asgari, Social Determinants of Health Research Center (SDHRC), Department of Environmental Health Engineering, School of Public Health, Hamadan University of Medical Sciences, Hamadan, Iran., Ramin Khoshniyat, Farhad Karimi, Kamal Ebrahimi, Kazhal Habibzadeh, Samira Rahimnejad, Students Research Center, Department of Environmental Health Engineering, School of Public Health, Hamadan University of Medical Sciences, Hamadan, Iran., Department of Environmental Health Engineering, School of Vice Chancellor for Health Affairs, Kurdistan University of Medical Sciences, Sanandaj, Iran., Department of Environmental Health Engineering, School of Vice Chancellor for Health Affairs, Kurdistan University of Medical Sciences, Sanandaj, Iran., Department of Air Pollution Control of Kurdistan, Environmental Protection Agency, Sanandaj, Iran., Department of Occupational Health Engineering, Faculty of Health, Kurdistan University of Medical Sciences, Sanandaj, Iran.
2021 Journal of Advances in Environmental Health Research  
Methods: In this study, the hourly data of concentration of PM2.5 were taken from the Kurdistan Environmental Protection Agency.  ...  By AirQ+ software, the relationship between data and Relative Risk (RR), Baseline Incidence (BI), and Attributable Proportion (AP) were estimated.  ...  Acknowledgments This article's authors are grateful to Kurdistan Environmental Protection Agency, Kurdistan Center of Diseases Control, and Kurdistan University of Medical Sciences for providing data and  ... 
doi:10.32598/jaehr.9.1.1200 fatcat:q7evrzq7ubcmxbvmoctd5hwjaq

Recommendations to Patent Protection of Computer Program-Related Invention in China

Lei Dai, Dong Guo, Hao Qin
2017 Open Journal of Social Sciences  
Meanwhile, in consideration of the balance between inventor and public, the reasons for shortening the term of protection for computer program-related invention were given.  ...  Finally, emendation of publication rule of computer program-related inventions was suggested.  ...  the balance between inventor and public, the term of protection for computer program-related invention which does not comply with the rule of development of computer software should be shortened. 3) Publication  ... 
doi:10.4236/jss.2017.56013 fatcat:nf43ctf73rbthdwpkxpogdspsm

Page 300 of Communication Abstracts Vol. 19, Issue 3 [page]

1996 Communication Abstracts  
The article also examines the type of companies that are obtaining software patents, copyright protection versus patent protection, unavailability of trade secret protection in conjunction with a patent  ...  of topics and voices outside the traditionally defined area of public interest.  ... 

An Access Control Metric Suite for Class Hierarchy of Object-Oriented Software Systems

Rajender Singh Chhillar, Parveen Kajla, Usha Chhillar, Narender Kumar
2015 International Journal of Computer and Communication Engineering  
The proposed metrics provides a new way to understand and imply these concepts in research and development of the software using object-oriented approach.  ...  By successfully implemented the proposed metrics in object-oriented programing, we quantify the derived classes which directly results to reduce code, time and complexity of the object-oriented software  ...  Public Derivation Private Not accessible Not accessible Not accessible Protected Private Protected Protected Public Private Protected Public  ... 
doi:10.7763/ijcce.2015.v4.383 fatcat:yoxzc3sin5fkpgcyykq4k7tjri

Quadrisection-based task mapping on many-core processors for energy-efficient on-chip communication

Nithin Michael, Yao Wang, G. Edward Suh, Ao Tang
2013 2013 Seventh IEEE/ACM International Symposium on Networks-on-Chip (NoCS)  
coordinating the timing channel protections for different components § Publications: under submission Timing Channel Protection for Memory Controllers § Demonstrated the existence of timing channels  ...  using SecVerilog § Publications: ASPLOS'15 Full System Timing Channel Protection § Proposed Timing Compartments as a hardware abstraction to control timing channels § Added timing channel protection  ...  Showed the importance of coordinating the timing channel protections for different components § Publications: under submission Timing Channel Protection for Memory Controllers § Demonstrated the existence  ... 
doi:10.1109/nocs.2013.6558409 dblp:conf/nocs/MichaelWST13 fatcat:6isd2rxmw5cpxh6bz2ti2vsckm

A framework for secure execution of software

Antonio Maña, Javier Lopez, Juan J. Ortega, Ernesto Pimentel, Jose M. Troya
2004 International Journal of Information Security  
In this paper, we review the most relevant works related to software protection, present a taxonomy of those works and, most important, we introduce a new and robust software protection scheme.  ...  Nowadays, piracy is considered one of the major problems of software industry.  ...  When a client (C) wants to buy a protected application, requests a certificate of the public key of the software producer (SP) issued by the client card manufacturer (CCM).  ... 
doi:10.1007/s10207-004-0048-6 fatcat:rgeihd3i3nfmdjfdfqdzqrv75q

An Analysis of Metric-based Quality Design for Software Development

Mohit Kumar Sharma, Faculty of Computational Sciences, GNA University,Phagwara
2020 Indian Journal of Science and Technology  
It assist in a controlled use of public/protected members in software design to minimize complications.  ...  Software design complications can be enhanced due to more use of protected and public members as well as decreased use of the concept of encapsulation.  ...  Conflict of interest The authors declare that they have no conflicts of interest. The authors alone are responsible for the content and writing of the paper.  ... 
doi:10.17485/ijst/v13i35.1013 fatcat:whxx662clbalhnrlczbdcdz2aa

An approach to containing computer viruses

Maria M. Pozzo, Terence E. Gray
1987 Computers & security  
The protection of this mechanism in untrusted computing environments is addressed.  ...  This paper presents a mechanism for containing the spread of computer viruses by detecting at run-time whether or not an executable has been modified since its installation.  ...  Thus, protecting the integrity of the mechanism becomes a matter of protecting the algorithms and the public keys from modification.  ... 
doi:10.1016/0167-4048(87)90067-8 fatcat:sctcuhlhofg5tkhankezl6i6hy

Policies of software protection: The practice of China

Shi Guifeng, Ouyang Lingnan, Zhang Qingsheng
2005 Computer Law and Security Review  
Policies of software protection greatly embody the development of a nation's information industry and its respect for international regulations.  ...  This paper studies the software protection policies in China and some experiences which may also applicable in other Asian countries.  ...  , and the protection period is extended to 50 years counting from the end of the year of publication; In June 2000, the State Council issued the Encouraging the Development of the Software and Integrated  ... 
doi:10.1016/j.clsr.2005.06.012 fatcat:swd3toibdncatgxovauzs7zyo4
« Previous Showing results 1 — 15 out of 734,676 results