Academic literature on the topic 'Protection of the secret of the will'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Protection of the secret of the will.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Protection of the secret of the will"
Selly Olatersia Sembiring and Simona Bustani. "<b>PERLINDUNGAN HUKUM BERDASARKAN UNDANG-UNDANG NO. 30 TAHUN 2000 TENTANG RAHASIA DAGANG</b>." Reformasi Hukum Trisakti 6, no. 3 (2024): 1056–65. http://dx.doi.org/10.25105/refor.v6i3.19947.
Full textVärv, Age, Heiki Pisuke, Tõnis Mets, Elise Vasamäe, and Aleksei Kelli. "Trade Secrets in the Intellectual Property Strategies of Entrepreneurs: The Estonian Experience." Review of Central and East European Law 35, no. 4 (2010): 315–39. http://dx.doi.org/10.1163/157303510x12650378240476.
Full textTambovtsev, Andrei. "The problem of defining and interpreting the concept of ‘secret protection’ in operative-investigative activities." Vestnik of the St. Petersburg University of the Ministry of Internal Affairs of Russia 2025, no. 2 (2025): 211–17. https://doi.org/10.35750/2071-8284-2025-2-211-217.
Full textAspan, Henry, Syaiful Asmi Hasibuan, and Ari Prabowo. "Legal Protection for Trade Secret Holders under the Laws of the Republic of Indonesia Number 30 of 2000 on Trade Secrets." Saudi Journal of Humanities and Social Sciences 7, no. 4 (2022): 149–54. http://dx.doi.org/10.36348/sjhss.2022.v07i04.006.
Full textDirkareshza, Rianda, Muhammad Fauzan, and Aulia Anjani. "Legal Protection Against Misuse Of Trade Secrets: Comparison Study Between Indonesia And France." Indonesia Law Reform Journal 5, no. 1 (2025): 62–76. https://doi.org/10.22219/ilrej.v5i1.38145.
Full textChung, You Na. "Criminal law measures to protect trade secrets: focusing on the Unfair Competition Prevention and Trade Secret Protection Act." Institute for Legal Studies Chonnam National University 43, no. 2 (2023): 119–46. http://dx.doi.org/10.38133/cnulawreview.2023.43.2.119.
Full textAriyanti, Ariyanti. "Perlindungan Hukum Rahasia Perusahaan Melalui Undang-Undang No. 30 Tahun 2000 Tentang Rahasia Dagang." Bhirawa Law Journal 2, no. 2 (2021): 79–86. http://dx.doi.org/10.26905/blj.v2i2.6843.
Full textYusuf Ibrahim, Muhammad, Dyah Ochtorina Susanti, and Suhariningsih Suhariningsih. "Characteristics Of Trade Secrets As Property Rights In The Indonesian Property Law System." International Journal of Educational Research & Social Sciences 4, no. 3 (2023): 498–503. http://dx.doi.org/10.51601/ijersc.v4i3.648.
Full textOliinyk, Vasyl, Larysa Herasymenko, Olena Tykhonova, Ivan Syvodied, and Natalia Holdberh. "Criminal protection of state secrets in Ukraine and EU countries." Cuestiones Políticas 41, no. 76 (2023): 641–61. http://dx.doi.org/10.46398/cuestpol.4176.38.
Full textHabib, Yahya Abdul, and Nyi Mas Gianti Bingah Erbiana. "Implementation of Legal Protection in the Field of Pharmacy in a Juridical Review of the Implementation of Law Number 30 of 2000 Concerning Trade Secrets." International Journal of Business, Law, and Education 6, no. 1 (2025): 277–87. https://doi.org/10.56442/ijble.v6i1.1014.
Full textDissertations / Theses on the topic "Protection of the secret of the will"
Werly, Stéphane. "La protection du secret rédactionnel /." Genève [u.a.] : Schulthess, 2005. http://www.gbv.de/dms/spk/sbb/recht/toc/502310243.pdf.
Full textBitho, Théodore-Alexandre de Nika. "La protection des secrets commerciaux dans l'arbitrage commercial international." Thesis, Paris 1, 2020. http://www.theses.fr/2020PA01D001.
Full textAl, Zaidi Mazin M. "Cyber security behavioural intentions for trade secret protection." Thesis, University of Warwick, 2017. http://wrap.warwick.ac.uk/108526/.
Full textZemmouri, Catherine. "La protection du secret des sources du journaliste." Electronic Thesis or Diss., Université Paris-Panthéon-Assas, 2023. http://www.theses.fr/2023ASSA0082.
Full textGonzalez, Ruiz Diego Hernan. "Developing and protecting intellectual property in virtual projects : Trade secret protection in Telecommunications." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for industriell økonomi og teknologiledelse, 2012. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-20973.
Full textRenner, Soline. "Protection des algorithmes cryptographiques embarqués." Thesis, Bordeaux, 2014. http://www.theses.fr/2014BORD0057/document.
Full textROSSI, PHILIPPE. "Reflexions sur le fondement, l'etendue, la protection et les projets d'actualisation du secret medical." Nice, 1988. http://www.theses.fr/1988NICE6001.
Full textQuennesson, Claire. "Mineur et secret." Thesis, Bordeaux, 2017. http://www.theses.fr/2017BORD0804/document.
Full textOlivari, Medina Cecilia. "L'acceptabilité de la rupture du secret médical pour la protection d'un tiers en danger de contracter une maladie sexuellement transmissible et pour la protection d'un adolescent consommateur de substances, vue par le public chilien." Toulouse 2, 2009. http://www.theses.fr/2009TOU20090.
Full textAbravanel-Jolly, Sabine. "La protection du secret en droit des personnes et de la famille." Lyon 3, 1999. http://www.theses.fr/1999LYO33026.
Full textBooks on the topic "Protection of the secret of the will"
1955-, Cundiff Victoria A., ed. Trade secret protection and litigation: Protecting confidential business and technical information. Practising Law Institute, 1992.
Find full textCopeland, Gloria. The secret place of God's protection. Kenneth Copeland Publications, 2002.
Find full textPeterson, Gale R. Trade secret protection in an information age. Glasser LegalWorks, 1997.
Find full text(South), Korea, and Korea (South), eds. Yŏngŏp pimil pohopŏp: Trade secret protection act. Pagyŏngsa, 2012.
Find full textE, Kay Randall, Edelson Rebecca, and State Bar of California. Intellectual Property Section., eds. Trade secret litigation and protection in California. State Bar of California, 2005.
Find full textMagnan, Richard A. Copyright, patent, and trade secret protection of software. Defense Technical Information Center, 1986.
Find full textEinschlag, Michael B. Seminar material for copyright, trademark, and trade secret protection. New Jersey Institute for Continuing Legal Education, 1987.
Find full textSauveur, Paula. La protection du secret commercial dans les nuages publics de l'infonuagique (cloud computing). Éditions Y. Blais, 2013.
Find full textBook chapters on the topic "Protection of the secret of the will"
Halt, Gerald B., Robert Fesnak, John C. Donch, and Amber R. Stiles. "Trade Secret Protection." In Intellectual Property in Consumer Electronics, Software and Technology Startups. Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-7912-3_2.
Full textO’Donnell, Ryan W., John J. O’Malley, Randolph J. Huis, and Gerald B. Halt. "Trade Secret Protection." In Intellectual Property in the Food Technology Industry. Springer New York, 2008. http://dx.doi.org/10.1007/978-0-387-77389-6_2.
Full textDesaunettes-Barbero, Luc. "Conclusion: The Distinction Between the Secret Sphere and Secret Pieces of Information—The Need of a New Conceptual Model for Trade Secrets Law." In Trade Secrets Legal Protection. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-26786-4_11.
Full textMerino, Louis-Henri, and José Cabrero-Holgueras. "Secure Multi-Party Computation." In Trends in Data Protection and Encryption Technologies. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33386-6_17.
Full textArtemiev, V. P. "The Protection of the Frontiers of the U.S.S.R." In The Soviet Secret Police. Routledge, 2024. http://dx.doi.org/10.4324/9781032676319-9.
Full textDaskapan, Semir. "Dependable Security by Twisted Secret Sharing." In Security and Protection in Information Processing Systems. Springer US, 2004. http://dx.doi.org/10.1007/1-4020-8143-x_13.
Full textDesaunettes-Barbero, Luc. "The Legal Apprehension of Secret Pieces of Information as Immaterial Goods Regulation." In Trade Secrets Legal Protection. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-26786-4_10.
Full textHalt, Gerald B., Robert Fesnak, John C. Donch, and Amber R. Stiles. "Deciding Between Patent or Trade Secret Protection." In Intellectual Property in Consumer Electronics, Software and Technology Startups. Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-7912-3_8.
Full textO’Donnell, Ryan W., John J. O’Malley, Randolph J. Huis, and Gerald B. Halt. "Deciding Between Patent or Trade Secret Protection." In Intellectual Property in the Food Technology Industry. Springer New York, 2008. http://dx.doi.org/10.1007/978-0-387-77389-6_8.
Full textBent, Stephen A., Richard L. Schwaab, David G. Conlin, and Donald D. Jeffery. "Trade Secret and Other Non-Patent Protection." In Intellectual Property Rights in Biotechnology Worldwide. Palgrave Macmillan UK, 1987. http://dx.doi.org/10.1007/978-1-349-08009-0_7.
Full textConference papers on the topic "Protection of the secret of the will"
Richter, Isaac, Jie Zhou, and John Criswell. "DeTRAP: RISC-V Return Address Protection With Debug Triggers." In 2024 IEEE Secure Development Conference (SecDev). IEEE, 2024. http://dx.doi.org/10.1109/secdev61143.2024.00021.
Full textMaram, Balajee, Manikonda Srinivasa Sesha Sai, Malathy Vanniappan, T. Aditya Sai Srinivas, Pamarthi Nagaraju, and U. D. Prasan. "Protecting Medical Image Transmission: Color Secret Sharing Protocol for Enhanced Security." In 2024 International Conference on Artificial Intelligence and Quantum Computation-Based Sensor Application (ICAIQSA). IEEE, 2024. https://doi.org/10.1109/icaiqsa64000.2024.10882318.
Full textArora, Jatin, Kamal Saluja, G. S. Pradeep Ghantasala, et al. "Protecting SDIIOT Network from Key Breach Attack by using Secret Hash Chain Techniques." In 2024 Second International Conference Computational and Characterization Techniques in Engineering & Sciences (IC3TES). IEEE, 2024. https://doi.org/10.1109/ic3tes62412.2024.10877628.
Full textBotha, Craig. "Benchmarking International Cathodic Protection and Alternating Current Mitigation Standards to Determine Suitable Protection Criteria." In MECC 2023. AMPP, 2023. https://doi.org/10.5006/mecc2023-20206.
Full textLane, Rebekah, and Stephen A. Torri. "Comparing iOS and Android Anti-Virus Protection: A Survey." In 2024 Ninth International Conference On Mobile And Secure Services (MobiSecServ). IEEE, 2024. http://dx.doi.org/10.1109/mobisecserv63327.2024.10759904.
Full textRejintal, Chaitanya, and Manoranjan Kumar. "Secret image protection using image fusion." In 2016 IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT). IEEE, 2016. http://dx.doi.org/10.1109/rteict.2016.7807866.
Full textTso, Hao-Kuan, and Der-Chyuan Lou. "Medical image protection using secret sharing scheme." In the 6th International Conference. ACM Press, 2012. http://dx.doi.org/10.1145/2184751.2184860.
Full textInoue, Michiko, Tomokazu Yoneda, Muneo Hasegawa, and Hideo Fujiwara. "Partial Scan Approach for Secret Information Protection." In 2009 14th IEEE European Test Symposium (ETS). IEEE, 2009. http://dx.doi.org/10.1109/ets.2009.15.
Full textAprilPyone, MaungMaung, and Hitoshi Kiya. "Transfer Learning-Based Model Protection With Secret Key." In 2021 IEEE International Conference on Image Processing (ICIP). IEEE, 2021. http://dx.doi.org/10.1109/icip42928.2021.9506147.
Full textChen, Chao, Zhiyuan An, and Fangguo Zhang. "Shorter Post-quantum Secret Handshakes from Isogenies." In 2023 International Conference on Data Security and Privacy Protection (DSPP). IEEE, 2023. http://dx.doi.org/10.1109/dspp58763.2023.10405180.
Full textReports on the topic "Protection of the secret of the will"
Chandramouli, Ramaswamy. Secure Virtual Network Configuration for Virtual Machine (VM) Protection. National Institute of Standards and Technology, 2016. http://dx.doi.org/10.6028/nist.sp.800-125b.
Full textPappas, Mersene. Elsie's Secret. Portland State University Library, 2016. http://dx.doi.org/10.15760/honors.277.
Full textWong, Theodore M., and Jeannette M. Wing. Verifiable Secret Redistribution. Defense Technical Information Center, 2001. http://dx.doi.org/10.21236/ada458508.
Full textDang, Tri Vi, Gary Gorton, Bengt Holmström, and Guillermo Ordonez. Banks as Secret Keepers. National Bureau of Economic Research, 2014. http://dx.doi.org/10.3386/w20255.
Full textKarch, Benjamin. Field Programmable Gate Array-Based Reactor Protection Systems and Potential for Inclusion of Secure Elements to Improve Cybersecurity. Office of Scientific and Technical Information (OSTI), 2024. https://doi.org/10.2172/2480123.
Full textKarch, Benjamin, Titus Gray, and Michael Rowland. Field Programmable Gate Array-Based Reactor Protection Systems and Potential for Inclusion of Secure Elements to Improve Cybersecurity. Office of Scientific and Technical Information (OSTI), 2024. http://dx.doi.org/10.2172/2462968.
Full textSeybold, Patricia. Secret to Successful Customer Engagements. Patricia Seybold Group, 2013. http://dx.doi.org/10.1571/me09-26-13cc.
Full textGorman, Paul F. The Secret of Future Victories. Defense Technical Information Center, 1992. http://dx.doi.org/10.21236/ada250718.
Full textNottingham, M. The "secret-token" URI Scheme. RFC Editor, 2021. http://dx.doi.org/10.17487/rfc8959.
Full textRossbach, Niclas. Intelligence and data resilience: A small state perspective on digitalisation and national defence towards the 2030s. Swedish Defence University, 2024. https://doi.org/10.62061/iibr1180.
Full text