Academic literature on the topic 'Protection of the secret of the will'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Protection of the secret of the will.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Protection of the secret of the will"

1

Selly Olatersia Sembiring and Simona Bustani. "<b>PERLINDUNGAN HUKUM BERDASARKAN UNDANG-UNDANG NO. 30 TAHUN 2000 TENTANG RAHASIA DAGANG</b>." Reformasi Hukum Trisakti 6, no. 3 (2024): 1056–65. http://dx.doi.org/10.25105/refor.v6i3.19947.

Full text
Abstract:
As one component of intellectual property rights, trade secrets have an important position in business activities in Indonesia. Problem formulation How well do the provisions of Law Number 30 of 2000 concerning Trade Secrets protect trade secret owners? And how reasonable is Law Number 30 of 2000 concerning Trade Secrets in interpreting judges' decisions No. 76/PDT.G/2021/PN.CKR on trade secret disputes the plastics industry? This research is analytical, descriptive, and is normative legal research. Deductive inference is used in qualitative analysis of existing evidence. The results and discu
APA, Harvard, Vancouver, ISO, and other styles
2

Värv, Age, Heiki Pisuke, Tõnis Mets, Elise Vasamäe, and Aleksei Kelli. "Trade Secrets in the Intellectual Property Strategies of Entrepreneurs: The Estonian Experience." Review of Central and East European Law 35, no. 4 (2010): 315–39. http://dx.doi.org/10.1163/157303510x12650378240476.

Full text
Abstract:
AbstractSecrecy is a traditional method of knowledge protection. The protection and management of trade secrets has high strategic relevance for small transition economies. As the majority of Estonian entrepreneurs are SMEs in low-tech sectors, the implementation of adequate trade-secret protection strategy is vital. There are several advantages to trade-secret protection. First, the scope of trade-secret protection can be extensive and includes non-patentable knowledge. Second, it does not require the registration or fulfilment of any formal procedures.The Estonian high-tech sector also relie
APA, Harvard, Vancouver, ISO, and other styles
3

Tambovtsev, Andrei. "The problem of defining and interpreting the concept of ‘secret protection’ in operative-investigative activities." Vestnik of the St. Petersburg University of the Ministry of Internal Affairs of Russia 2025, no. 2 (2025): 211–17. https://doi.org/10.35750/2071-8284-2025-2-211-217.

Full text
Abstract:
Introduction. Operative-investigative activities are inherently linked to confidential information, which may contain official secrets and must be reliably protected from unauthorised disclosure. Law enforcement practice has developed effective methods of secret protection of operative-investigative subjects, comprising a combination of regulatory, procedural, and covert-conspiratorial behaviour of keepers and users of this secret. However, there is no consensus on the interpretation of the concept of ‘secret protection’ among scholars and practitioners. This fact naturally leads to varying ap
APA, Harvard, Vancouver, ISO, and other styles
4

Aspan, Henry, Syaiful Asmi Hasibuan, and Ari Prabowo. "Legal Protection for Trade Secret Holders under the Laws of the Republic of Indonesia Number 30 of 2000 on Trade Secrets." Saudi Journal of Humanities and Social Sciences 7, no. 4 (2022): 149–54. http://dx.doi.org/10.36348/sjhss.2022.v07i04.006.

Full text
Abstract:
Intellectual Property Rights (IPRs) are property rights that originate or are born as a result of human intellectual capabilities. With the emergence of use values and economic rewards, a thinking or conception regarding the need of legal protection for human outcomes or intellectual works develops. The term "law of confidence" refers to the legislation that evolved as a framework for protecting secret information (confidence). Trade secret violations occur when someone deliberately divulges trade secrets, breaches agreements, or violates written or unwritten responsibilities to maintain trade
APA, Harvard, Vancouver, ISO, and other styles
5

Dirkareshza, Rianda, Muhammad Fauzan, and Aulia Anjani. "Legal Protection Against Misuse Of Trade Secrets: Comparison Study Between Indonesia And France." Indonesia Law Reform Journal 5, no. 1 (2025): 62–76. https://doi.org/10.22219/ilrej.v5i1.38145.

Full text
Abstract:
This research discusses the legal protection against misappropriation of trade secrets in Indonesia and France, focusing on an analysis of the protection of the right to trade secrets and a study of the consideration of the panel of judges in resolving trade secret disputes. Trade secrets are one of the intellectual assets that have strategic value for businesses. However, the potential misuse of trade secrets by former employees poses a serious threat to business continuity. This research uses a normative juridical method with a statutory approach and case studies of court decisions. The resu
APA, Harvard, Vancouver, ISO, and other styles
6

Chung, You Na. "Criminal law measures to protect trade secrets: focusing on the Unfair Competition Prevention and Trade Secret Protection Act." Institute for Legal Studies Chonnam National University 43, no. 2 (2023): 119–46. http://dx.doi.org/10.38133/cnulawreview.2023.43.2.119.

Full text
Abstract:
In the rapidly evolving high-tech industry, the significance of safeguarding trade secrets is growing exponentially as the risk of unauthorized access and information breaches continues to escalate. A “trade secret” is information, including a method of manufacture, method of sale, technical or business information useful in the conduct of business, which is not publicly known, is the subject of reasonable efforts to maintain its secrecy, and has independent economic value. The Unfair Competition Prevention and Trade Secret Protection Act in Korea serves to shield these trade secrets from infr
APA, Harvard, Vancouver, ISO, and other styles
7

Ariyanti, Ariyanti. "Perlindungan Hukum Rahasia Perusahaan Melalui Undang-Undang No. 30 Tahun 2000 Tentang Rahasia Dagang." Bhirawa Law Journal 2, no. 2 (2021): 79–86. http://dx.doi.org/10.26905/blj.v2i2.6843.

Full text
Abstract:
One of the company's assets that have high economic value is trade secrets. The object of a company's trade secrets can be in the form of written or unwritten information that must consistently be kept secret and has economic value in order to be able to be used to compete with other business actors. The company owner's efforts to maintain the confidentiality of his company information are very important, because if the party is negligent, the existence of trade secrets can fall as Intellectual Property. This study examines the advantages and disadvantages of protecting company secrets with a
APA, Harvard, Vancouver, ISO, and other styles
8

Yusuf Ibrahim, Muhammad, Dyah Ochtorina Susanti, and Suhariningsih Suhariningsih. "Characteristics Of Trade Secrets As Property Rights In The Indonesian Property Law System." International Journal of Educational Research & Social Sciences 4, no. 3 (2023): 498–503. http://dx.doi.org/10.51601/ijersc.v4i3.648.

Full text
Abstract:
This research reports on a legal study of trade secrets which are part of the Intellectual Property Rights system. Legal protection is given to trade secrets in order for trade secret right holders to be able to create a climate that encourages creation and innovation to advance Indonesian industry in order to compete in the scope of national and international business. A trade secret is information that the law considers to be a property. The classification of information as a trade secret must have economic value, be unknown to the public and kept confidential by the owner. There is a proble
APA, Harvard, Vancouver, ISO, and other styles
9

Oliinyk, Vasyl, Larysa Herasymenko, Olena Tykhonova, Ivan Syvodied, and Natalia Holdberh. "Criminal protection of state secrets in Ukraine and EU countries." Cuestiones Políticas 41, no. 76 (2023): 641–61. http://dx.doi.org/10.46398/cuestpol.4176.38.

Full text
Abstract:
The aim of the study was to outline the differences between certain aspects of the system of state secrets protection in Ukraine and some countries of the European Union EU, which provides the basis for determining the directions of improvement of the national system of state secrets protection. The following general scientific methods were used in the article: analysis and synthesis, deduction and induction, analogy. As a result of the research, the following aspects of criminal protection of state secret in Ukraine and the EU countries identified for comparison were considered: definition of
APA, Harvard, Vancouver, ISO, and other styles
10

Habib, Yahya Abdul, and Nyi Mas Gianti Bingah Erbiana. "Implementation of Legal Protection in the Field of Pharmacy in a Juridical Review of the Implementation of Law Number 30 of 2000 Concerning Trade Secrets." International Journal of Business, Law, and Education 6, no. 1 (2025): 277–87. https://doi.org/10.56442/ijble.v6i1.1014.

Full text
Abstract:
The protection of trade secrets in the pharmaceutical sector is very important. Various trade secret crimes in the pharmaceutical sector, such as theft of drug prescriptions and counterfeiting of medicines, continue to increase. Another impact of trade secret crimes in the pharmaceutical sector is the medical risk of counterfeiting drugs consumed by the public. However, on the one hand, victims who have trade secret rights in the pharmaceutical sector are still few to report allegations related to trade secret violations. In addition, law enforcement has not been optimal in responding to every
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Protection of the secret of the will"

1

Werly, Stéphane. "La protection du secret rédactionnel /." Genève [u.a.] : Schulthess, 2005. http://www.gbv.de/dms/spk/sbb/recht/toc/502310243.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bitho, Théodore-Alexandre de Nika. "La protection des secrets commerciaux dans l'arbitrage commercial international." Thesis, Paris 1, 2020. http://www.theses.fr/2020PA01D001.

Full text
Abstract:
L'importance des secrets d'affaires dans l'essor de l'économie mondiale n'est plus à démontrer. Ils sont, selon les indicateurs les plus fiables, la partie la plus importante du patrimoine des sociétés qui détiennent les plus grandes fortunes du monde. Mais force est de constater que leur protection dans l'arbitrage commercial international est peu effective. Ils sont victimes de divulgations licites ou illicites qui les exposent. Pour une meilleure protection des secrets d'affaires durant une procédure arbitrale, des mesures correctives sont nécessaires. Ces mesures doivent concourir à redéfi
APA, Harvard, Vancouver, ISO, and other styles
3

Al, Zaidi Mazin M. "Cyber security behavioural intentions for trade secret protection." Thesis, University of Warwick, 2017. http://wrap.warwick.ac.uk/108526/.

Full text
Abstract:
Trade secrets have become an important aspect of competitive advantage for new and established businesses in the new digital economy. This is particularly true in corporate venturing, where most corporates rely on new entrepreneurial ventures with creative ideas to drive innovation and fuel growth. In this manner, these corporates run corporate venturing units such as corporate accelerators to support entrepreneurs creating new ventures. During the accelerated pace of venturing, trade secrets become the core intangible asset that requires protection for any new venture. Yet, people remain the
APA, Harvard, Vancouver, ISO, and other styles
4

Zemmouri, Catherine. "La protection du secret des sources du journaliste." Electronic Thesis or Diss., Université Paris-Panthéon-Assas, 2023. http://www.theses.fr/2023ASSA0082.

Full text
Abstract:
La liberté d’expression et de communication est une liberté fondamentale est un des éléments clé de la démocratie. Elle est donc à ce titre depuis longtemps protégée, pourtant l’un de ses piliers, la protection du secret des sources du journaliste a longtemps été ignorée et n’est aujourd’hui encore qu’imparfaitement reconnue. Cet état de fait est principalement lié à des raisons politiques. Ce refus et cette reconnaissance partielle et tardive s’expliquent beaucoup par le fait que les enquêtes journalistiques d’intérêt public peuvent viser potentiellement des hommes politiques. Une reconnaissa
APA, Harvard, Vancouver, ISO, and other styles
5

Gonzalez, Ruiz Diego Hernan. "Developing and protecting intellectual property in virtual projects : Trade secret protection in Telecommunications." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for industriell økonomi og teknologiledelse, 2012. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-20973.

Full text
Abstract:
This thesis is intended to develop a comprehensive understanding of how trade secrets can be used as a means to protect knowledge developed through projects conducted in the telecommunications sector. At the same time, the study explores which mechanisms should be employed to regulate access and utilization of trade secrets when their disclosure is inevitable to accomplish project requirements. Telecommunication firms are large and globally distributed organizations whose business operations rely upon interoperability and close collaboration with different parties. This suggests that conductin
APA, Harvard, Vancouver, ISO, and other styles
6

Renner, Soline. "Protection des algorithmes cryptographiques embarqués." Thesis, Bordeaux, 2014. http://www.theses.fr/2014BORD0057/document.

Full text
Abstract:
Depuis la fin des années 90, les cryptosystèmes implantés sur carte à puce doivent faire face à deux grandes catégories d'attaques : les attaques par canaux cachés et les attaques par injection de fautes. Pour s'en prémunir, des contre-mesures sont élaborées, puis validées en considérant un modèle d'attaquant bien défini. Les travaux réalisés dans cette thèse se concentrent sur la protection des cryptosystèmes symétriques contre les attaques par canaux cachés. Plus précisément, on s'intéresse aux contre-mesures de masquage permettant de se prémunir des attaques statistiques d'ordre supérieur p
APA, Harvard, Vancouver, ISO, and other styles
7

ROSSI, PHILIPPE. "Reflexions sur le fondement, l'etendue, la protection et les projets d'actualisation du secret medical." Nice, 1988. http://www.theses.fr/1988NICE6001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Quennesson, Claire. "Mineur et secret." Thesis, Bordeaux, 2017. http://www.theses.fr/2017BORD0804/document.

Full text
Abstract:
Le secret est une notion ancienne, ancrée dans notre législation, qui est généralement le fait des majeurs. Relier le mineur au secret suppose de préciser comment la minorité influe sur le droit au secret dont toute personne - y compris lorsqu’elle est mineure - est titulaire, qu'il s'agisse de l'étendue du droit au secret plutôt plus réduite que pour les majeurs, que de l'exercice de ce droit qui, comme tout droit du mineur est différent et plus complexe.Garder un savoir caché suppose un certain degré de capacité. Or, le statut particulier reconnu au mineur, sujet de droit vulnérable soumis à
APA, Harvard, Vancouver, ISO, and other styles
9

Olivari, Medina Cecilia. "L'acceptabilité de la rupture du secret médical pour la protection d'un tiers en danger de contracter une maladie sexuellement transmissible et pour la protection d'un adolescent consommateur de substances, vue par le public chilien." Toulouse 2, 2009. http://www.theses.fr/2009TOU20090.

Full text
Abstract:
Nous avons étudié les facteurs qui déterminent l’acceptabilité de la rupture de la confidentialité médicale dans deux types de situation: a) La rupture de la confidentialité pour la protection d'un tiers en danger de contracter une infection sexuellement transmissible. B) La rupture de la confidentialité pour la protection d'un patient adolescent consommateur de drogues. Trois cent cinquante sept personnes chiliennes ont jugé du degré d'acceptabilité de la rupture de la confidentialité. Dans le cas de la rupture de la confidentialité pour la protection d'un tiers en danger, deux cent participa
APA, Harvard, Vancouver, ISO, and other styles
10

Abravanel-Jolly, Sabine. "La protection du secret en droit des personnes et de la famille." Lyon 3, 1999. http://www.theses.fr/1999LYO33026.

Full text
Abstract:
La place de plus en plus importante accordee a la volonte individuelle incite a s'interroger sur la protection du secret en droit des personnes et de la famille, matieres par excellence ou le secret necessaire a l'existence de l'individu peut exister. Pour en faire l'analyse, il est propose tout d'abord de rechercher l'objet de ce secret. Cette recherche passe par l'identification de tous les secrets proteges en droit des personnes et de la famille. L'etude montre que si certaines matieres sont exclusives de secrets proteges parce qu'elles sont d'ordre public de direction, les autres en sont p
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Protection of the secret of the will"

1

Werly, Stéphane. La protection du secret rédactionnel. Schulthess, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

1955-, Cundiff Victoria A., ed. Trade secret protection and litigation: Protecting confidential business and technical information. Practising Law Institute, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Copeland, Gloria. The secret place of God's protection. Kenneth Copeland Publications, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Peterson, Gale R. Trade secret protection in an information age. Glasser LegalWorks, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

(South), Korea, and Korea (South), eds. Yŏngŏp pimil pohopŏp: Trade secret protection act. Pagyŏngsa, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

E, Kay Randall, Edelson Rebecca, and State Bar of California. Intellectual Property Section., eds. Trade secret litigation and protection in California. State Bar of California, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Magnan, Richard A. Copyright, patent, and trade secret protection of software. Defense Technical Information Center, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Goldstein, Arnold S. Asset protection secrets. Garrett Pub., 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Einschlag, Michael B. Seminar material for copyright, trademark, and trade secret protection. New Jersey Institute for Continuing Legal Education, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sauveur, Paula. La protection du secret commercial dans les nuages publics de l'infonuagique (cloud computing). Éditions Y. Blais, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Protection of the secret of the will"

1

Halt, Gerald B., Robert Fesnak, John C. Donch, and Amber R. Stiles. "Trade Secret Protection." In Intellectual Property in Consumer Electronics, Software and Technology Startups. Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-7912-3_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

O’Donnell, Ryan W., John J. O’Malley, Randolph J. Huis, and Gerald B. Halt. "Trade Secret Protection." In Intellectual Property in the Food Technology Industry. Springer New York, 2008. http://dx.doi.org/10.1007/978-0-387-77389-6_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Desaunettes-Barbero, Luc. "Conclusion: The Distinction Between the Secret Sphere and Secret Pieces of Information—The Need of a New Conceptual Model for Trade Secrets Law." In Trade Secrets Legal Protection. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-26786-4_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Merino, Louis-Henri, and José Cabrero-Holgueras. "Secure Multi-Party Computation." In Trends in Data Protection and Encryption Technologies. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33386-6_17.

Full text
Abstract:
AbstractSecure multi-party computation enables a group of parties to compute a function while jointly keeping their private inputs secret. The term “secure” indicates the latter property where the private inputs used for computation are kept secret from all other parties. A significant benefit of using secure multi-party computation is that many constructed protocols are information-theoretically secure, avoiding many problems using cryptographic hardness assumptions. Some notable use cases are secure auctions, privacy-preserving network security monitoring, spam filtering on encrypted emails,
APA, Harvard, Vancouver, ISO, and other styles
5

Artemiev, V. P. "The Protection of the Frontiers of the U.S.S.R." In The Soviet Secret Police. Routledge, 2024. http://dx.doi.org/10.4324/9781032676319-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Daskapan, Semir. "Dependable Security by Twisted Secret Sharing." In Security and Protection in Information Processing Systems. Springer US, 2004. http://dx.doi.org/10.1007/1-4020-8143-x_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Desaunettes-Barbero, Luc. "The Legal Apprehension of Secret Pieces of Information as Immaterial Goods Regulation." In Trade Secrets Legal Protection. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-26786-4_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Halt, Gerald B., Robert Fesnak, John C. Donch, and Amber R. Stiles. "Deciding Between Patent or Trade Secret Protection." In Intellectual Property in Consumer Electronics, Software and Technology Startups. Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-7912-3_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

O’Donnell, Ryan W., John J. O’Malley, Randolph J. Huis, and Gerald B. Halt. "Deciding Between Patent or Trade Secret Protection." In Intellectual Property in the Food Technology Industry. Springer New York, 2008. http://dx.doi.org/10.1007/978-0-387-77389-6_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bent, Stephen A., Richard L. Schwaab, David G. Conlin, and Donald D. Jeffery. "Trade Secret and Other Non-Patent Protection." In Intellectual Property Rights in Biotechnology Worldwide. Palgrave Macmillan UK, 1987. http://dx.doi.org/10.1007/978-1-349-08009-0_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Protection of the secret of the will"

1

Richter, Isaac, Jie Zhou, and John Criswell. "DeTRAP: RISC-V Return Address Protection With Debug Triggers." In 2024 IEEE Secure Development Conference (SecDev). IEEE, 2024. http://dx.doi.org/10.1109/secdev61143.2024.00021.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Maram, Balajee, Manikonda Srinivasa Sesha Sai, Malathy Vanniappan, T. Aditya Sai Srinivas, Pamarthi Nagaraju, and U. D. Prasan. "Protecting Medical Image Transmission: Color Secret Sharing Protocol for Enhanced Security." In 2024 International Conference on Artificial Intelligence and Quantum Computation-Based Sensor Application (ICAIQSA). IEEE, 2024. https://doi.org/10.1109/icaiqsa64000.2024.10882318.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Arora, Jatin, Kamal Saluja, G. S. Pradeep Ghantasala, et al. "Protecting SDIIOT Network from Key Breach Attack by using Secret Hash Chain Techniques." In 2024 Second International Conference Computational and Characterization Techniques in Engineering & Sciences (IC3TES). IEEE, 2024. https://doi.org/10.1109/ic3tes62412.2024.10877628.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Botha, Craig. "Benchmarking International Cathodic Protection and Alternating Current Mitigation Standards to Determine Suitable Protection Criteria." In MECC 2023. AMPP, 2023. https://doi.org/10.5006/mecc2023-20206.

Full text
Abstract:
Abstract From time-to-time international standards are withdrawn, amended, updated or new standards are introduced that change the current thinking on existing subject matter. This paper demonstrates the complex process of reviewing several prominent Cathodic Protection and Alternating Current Mitigation standards and then attempting to benchmark suitable protection criteria. Today common Right of Way issues exist due to the convergence of pipelines, high voltage powerlines, telecommunications and other services that produce an environment conducive to rapid corrosion on previously secure pipe
APA, Harvard, Vancouver, ISO, and other styles
5

Lane, Rebekah, and Stephen A. Torri. "Comparing iOS and Android Anti-Virus Protection: A Survey." In 2024 Ninth International Conference On Mobile And Secure Services (MobiSecServ). IEEE, 2024. http://dx.doi.org/10.1109/mobisecserv63327.2024.10759904.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Rejintal, Chaitanya, and Manoranjan Kumar. "Secret image protection using image fusion." In 2016 IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT). IEEE, 2016. http://dx.doi.org/10.1109/rteict.2016.7807866.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Tso, Hao-Kuan, and Der-Chyuan Lou. "Medical image protection using secret sharing scheme." In the 6th International Conference. ACM Press, 2012. http://dx.doi.org/10.1145/2184751.2184860.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Inoue, Michiko, Tomokazu Yoneda, Muneo Hasegawa, and Hideo Fujiwara. "Partial Scan Approach for Secret Information Protection." In 2009 14th IEEE European Test Symposium (ETS). IEEE, 2009. http://dx.doi.org/10.1109/ets.2009.15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

AprilPyone, MaungMaung, and Hitoshi Kiya. "Transfer Learning-Based Model Protection With Secret Key." In 2021 IEEE International Conference on Image Processing (ICIP). IEEE, 2021. http://dx.doi.org/10.1109/icip42928.2021.9506147.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Chen, Chao, Zhiyuan An, and Fangguo Zhang. "Shorter Post-quantum Secret Handshakes from Isogenies." In 2023 International Conference on Data Security and Privacy Protection (DSPP). IEEE, 2023. http://dx.doi.org/10.1109/dspp58763.2023.10405180.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Protection of the secret of the will"

1

Chandramouli, Ramaswamy. Secure Virtual Network Configuration for Virtual Machine (VM) Protection. National Institute of Standards and Technology, 2016. http://dx.doi.org/10.6028/nist.sp.800-125b.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Pappas, Mersene. Elsie's Secret. Portland State University Library, 2016. http://dx.doi.org/10.15760/honors.277.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wong, Theodore M., and Jeannette M. Wing. Verifiable Secret Redistribution. Defense Technical Information Center, 2001. http://dx.doi.org/10.21236/ada458508.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Dang, Tri Vi, Gary Gorton, Bengt Holmström, and Guillermo Ordonez. Banks as Secret Keepers. National Bureau of Economic Research, 2014. http://dx.doi.org/10.3386/w20255.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Karch, Benjamin. Field Programmable Gate Array-Based Reactor Protection Systems and Potential for Inclusion of Secure Elements to Improve Cybersecurity. Office of Scientific and Technical Information (OSTI), 2024. https://doi.org/10.2172/2480123.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Karch, Benjamin, Titus Gray, and Michael Rowland. Field Programmable Gate Array-Based Reactor Protection Systems and Potential for Inclusion of Secure Elements to Improve Cybersecurity. Office of Scientific and Technical Information (OSTI), 2024. http://dx.doi.org/10.2172/2462968.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Seybold, Patricia. Secret to Successful Customer Engagements. Patricia Seybold Group, 2013. http://dx.doi.org/10.1571/me09-26-13cc.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Gorman, Paul F. The Secret of Future Victories. Defense Technical Information Center, 1992. http://dx.doi.org/10.21236/ada250718.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Nottingham, M. The "secret-token" URI Scheme. RFC Editor, 2021. http://dx.doi.org/10.17487/rfc8959.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Rossbach, Niclas. Intelligence and data resilience: A small state perspective on digitalisation and national defence towards the 2030s. Swedish Defence University, 2024. https://doi.org/10.62061/iibr1180.

Full text
Abstract:
Due to the increased reliance of governments on digital data, it is probably safe to suggest that, without it, there would be no state left to defend. Because, without data, there might not even be a continuity of government, and consequently no state, in a time of crisis. Hence, this paper looks at critical national digital data as a key feature of national security. This paper shows why and how the protection of digitalised critical national data is important for a country’s defence at different levels of conflict, both below and above the threshold of armed conflict. This issue can be studi
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!