Добірка наукової літератури з теми "Protection of the secret of the will"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Protection of the secret of the will".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Статті в журналах з теми "Protection of the secret of the will"

1

Selly Olatersia Sembiring and Simona Bustani. "<b>PERLINDUNGAN HUKUM BERDASARKAN UNDANG-UNDANG NO. 30 TAHUN 2000 TENTANG RAHASIA DAGANG</b>." Reformasi Hukum Trisakti 6, no. 3 (2024): 1056–65. http://dx.doi.org/10.25105/refor.v6i3.19947.

Повний текст джерела
Анотація:
As one component of intellectual property rights, trade secrets have an important position in business activities in Indonesia. Problem formulation How well do the provisions of Law Number 30 of 2000 concerning Trade Secrets protect trade secret owners? And how reasonable is Law Number 30 of 2000 concerning Trade Secrets in interpreting judges' decisions No. 76/PDT.G/2021/PN.CKR on trade secret disputes the plastics industry? This research is analytical, descriptive, and is normative legal research. Deductive inference is used in qualitative analysis of existing evidence. The results and discu
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Värv, Age, Heiki Pisuke, Tõnis Mets, Elise Vasamäe, and Aleksei Kelli. "Trade Secrets in the Intellectual Property Strategies of Entrepreneurs: The Estonian Experience." Review of Central and East European Law 35, no. 4 (2010): 315–39. http://dx.doi.org/10.1163/157303510x12650378240476.

Повний текст джерела
Анотація:
AbstractSecrecy is a traditional method of knowledge protection. The protection and management of trade secrets has high strategic relevance for small transition economies. As the majority of Estonian entrepreneurs are SMEs in low-tech sectors, the implementation of adequate trade-secret protection strategy is vital. There are several advantages to trade-secret protection. First, the scope of trade-secret protection can be extensive and includes non-patentable knowledge. Second, it does not require the registration or fulfilment of any formal procedures.The Estonian high-tech sector also relie
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Tambovtsev, Andrei. "The problem of defining and interpreting the concept of ‘secret protection’ in operative-investigative activities." Vestnik of the St. Petersburg University of the Ministry of Internal Affairs of Russia 2025, no. 2 (2025): 211–17. https://doi.org/10.35750/2071-8284-2025-2-211-217.

Повний текст джерела
Анотація:
Introduction. Operative-investigative activities are inherently linked to confidential information, which may contain official secrets and must be reliably protected from unauthorised disclosure. Law enforcement practice has developed effective methods of secret protection of operative-investigative subjects, comprising a combination of regulatory, procedural, and covert-conspiratorial behaviour of keepers and users of this secret. However, there is no consensus on the interpretation of the concept of ‘secret protection’ among scholars and practitioners. This fact naturally leads to varying ap
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Aspan, Henry, Syaiful Asmi Hasibuan, and Ari Prabowo. "Legal Protection for Trade Secret Holders under the Laws of the Republic of Indonesia Number 30 of 2000 on Trade Secrets." Saudi Journal of Humanities and Social Sciences 7, no. 4 (2022): 149–54. http://dx.doi.org/10.36348/sjhss.2022.v07i04.006.

Повний текст джерела
Анотація:
Intellectual Property Rights (IPRs) are property rights that originate or are born as a result of human intellectual capabilities. With the emergence of use values and economic rewards, a thinking or conception regarding the need of legal protection for human outcomes or intellectual works develops. The term "law of confidence" refers to the legislation that evolved as a framework for protecting secret information (confidence). Trade secret violations occur when someone deliberately divulges trade secrets, breaches agreements, or violates written or unwritten responsibilities to maintain trade
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Dirkareshza, Rianda, Muhammad Fauzan, and Aulia Anjani. "Legal Protection Against Misuse Of Trade Secrets: Comparison Study Between Indonesia And France." Indonesia Law Reform Journal 5, no. 1 (2025): 62–76. https://doi.org/10.22219/ilrej.v5i1.38145.

Повний текст джерела
Анотація:
This research discusses the legal protection against misappropriation of trade secrets in Indonesia and France, focusing on an analysis of the protection of the right to trade secrets and a study of the consideration of the panel of judges in resolving trade secret disputes. Trade secrets are one of the intellectual assets that have strategic value for businesses. However, the potential misuse of trade secrets by former employees poses a serious threat to business continuity. This research uses a normative juridical method with a statutory approach and case studies of court decisions. The resu
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Chung, You Na. "Criminal law measures to protect trade secrets: focusing on the Unfair Competition Prevention and Trade Secret Protection Act." Institute for Legal Studies Chonnam National University 43, no. 2 (2023): 119–46. http://dx.doi.org/10.38133/cnulawreview.2023.43.2.119.

Повний текст джерела
Анотація:
In the rapidly evolving high-tech industry, the significance of safeguarding trade secrets is growing exponentially as the risk of unauthorized access and information breaches continues to escalate. A “trade secret” is information, including a method of manufacture, method of sale, technical or business information useful in the conduct of business, which is not publicly known, is the subject of reasonable efforts to maintain its secrecy, and has independent economic value. The Unfair Competition Prevention and Trade Secret Protection Act in Korea serves to shield these trade secrets from infr
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Ariyanti, Ariyanti. "Perlindungan Hukum Rahasia Perusahaan Melalui Undang-Undang No. 30 Tahun 2000 Tentang Rahasia Dagang." Bhirawa Law Journal 2, no. 2 (2021): 79–86. http://dx.doi.org/10.26905/blj.v2i2.6843.

Повний текст джерела
Анотація:
One of the company's assets that have high economic value is trade secrets. The object of a company's trade secrets can be in the form of written or unwritten information that must consistently be kept secret and has economic value in order to be able to be used to compete with other business actors. The company owner's efforts to maintain the confidentiality of his company information are very important, because if the party is negligent, the existence of trade secrets can fall as Intellectual Property. This study examines the advantages and disadvantages of protecting company secrets with a
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Yusuf Ibrahim, Muhammad, Dyah Ochtorina Susanti, and Suhariningsih Suhariningsih. "Characteristics Of Trade Secrets As Property Rights In The Indonesian Property Law System." International Journal of Educational Research & Social Sciences 4, no. 3 (2023): 498–503. http://dx.doi.org/10.51601/ijersc.v4i3.648.

Повний текст джерела
Анотація:
This research reports on a legal study of trade secrets which are part of the Intellectual Property Rights system. Legal protection is given to trade secrets in order for trade secret right holders to be able to create a climate that encourages creation and innovation to advance Indonesian industry in order to compete in the scope of national and international business. A trade secret is information that the law considers to be a property. The classification of information as a trade secret must have economic value, be unknown to the public and kept confidential by the owner. There is a proble
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Oliinyk, Vasyl, Larysa Herasymenko, Olena Tykhonova, Ivan Syvodied, and Natalia Holdberh. "Criminal protection of state secrets in Ukraine and EU countries." Cuestiones Políticas 41, no. 76 (2023): 641–61. http://dx.doi.org/10.46398/cuestpol.4176.38.

Повний текст джерела
Анотація:
The aim of the study was to outline the differences between certain aspects of the system of state secrets protection in Ukraine and some countries of the European Union EU, which provides the basis for determining the directions of improvement of the national system of state secrets protection. The following general scientific methods were used in the article: analysis and synthesis, deduction and induction, analogy. As a result of the research, the following aspects of criminal protection of state secret in Ukraine and the EU countries identified for comparison were considered: definition of
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Habib, Yahya Abdul, and Nyi Mas Gianti Bingah Erbiana. "Implementation of Legal Protection in the Field of Pharmacy in a Juridical Review of the Implementation of Law Number 30 of 2000 Concerning Trade Secrets." International Journal of Business, Law, and Education 6, no. 1 (2025): 277–87. https://doi.org/10.56442/ijble.v6i1.1014.

Повний текст джерела
Анотація:
The protection of trade secrets in the pharmaceutical sector is very important. Various trade secret crimes in the pharmaceutical sector, such as theft of drug prescriptions and counterfeiting of medicines, continue to increase. Another impact of trade secret crimes in the pharmaceutical sector is the medical risk of counterfeiting drugs consumed by the public. However, on the one hand, victims who have trade secret rights in the pharmaceutical sector are still few to report allegations related to trade secret violations. In addition, law enforcement has not been optimal in responding to every
Стилі APA, Harvard, Vancouver, ISO та ін.
Більше джерел

Дисертації з теми "Protection of the secret of the will"

1

Werly, Stéphane. "La protection du secret rédactionnel /." Genève [u.a.] : Schulthess, 2005. http://www.gbv.de/dms/spk/sbb/recht/toc/502310243.pdf.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Bitho, Théodore-Alexandre de Nika. "La protection des secrets commerciaux dans l'arbitrage commercial international." Thesis, Paris 1, 2020. http://www.theses.fr/2020PA01D001.

Повний текст джерела
Анотація:
L'importance des secrets d'affaires dans l'essor de l'économie mondiale n'est plus à démontrer. Ils sont, selon les indicateurs les plus fiables, la partie la plus importante du patrimoine des sociétés qui détiennent les plus grandes fortunes du monde. Mais force est de constater que leur protection dans l'arbitrage commercial international est peu effective. Ils sont victimes de divulgations licites ou illicites qui les exposent. Pour une meilleure protection des secrets d'affaires durant une procédure arbitrale, des mesures correctives sont nécessaires. Ces mesures doivent concourir à redéfi
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Al, Zaidi Mazin M. "Cyber security behavioural intentions for trade secret protection." Thesis, University of Warwick, 2017. http://wrap.warwick.ac.uk/108526/.

Повний текст джерела
Анотація:
Trade secrets have become an important aspect of competitive advantage for new and established businesses in the new digital economy. This is particularly true in corporate venturing, where most corporates rely on new entrepreneurial ventures with creative ideas to drive innovation and fuel growth. In this manner, these corporates run corporate venturing units such as corporate accelerators to support entrepreneurs creating new ventures. During the accelerated pace of venturing, trade secrets become the core intangible asset that requires protection for any new venture. Yet, people remain the
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Zemmouri, Catherine. "La protection du secret des sources du journaliste." Electronic Thesis or Diss., Université Paris-Panthéon-Assas, 2023. http://www.theses.fr/2023ASSA0082.

Повний текст джерела
Анотація:
La liberté d’expression et de communication est une liberté fondamentale est un des éléments clé de la démocratie. Elle est donc à ce titre depuis longtemps protégée, pourtant l’un de ses piliers, la protection du secret des sources du journaliste a longtemps été ignorée et n’est aujourd’hui encore qu’imparfaitement reconnue. Cet état de fait est principalement lié à des raisons politiques. Ce refus et cette reconnaissance partielle et tardive s’expliquent beaucoup par le fait que les enquêtes journalistiques d’intérêt public peuvent viser potentiellement des hommes politiques. Une reconnaissa
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Gonzalez, Ruiz Diego Hernan. "Developing and protecting intellectual property in virtual projects : Trade secret protection in Telecommunications." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for industriell økonomi og teknologiledelse, 2012. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-20973.

Повний текст джерела
Анотація:
This thesis is intended to develop a comprehensive understanding of how trade secrets can be used as a means to protect knowledge developed through projects conducted in the telecommunications sector. At the same time, the study explores which mechanisms should be employed to regulate access and utilization of trade secrets when their disclosure is inevitable to accomplish project requirements. Telecommunication firms are large and globally distributed organizations whose business operations rely upon interoperability and close collaboration with different parties. This suggests that conductin
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Renner, Soline. "Protection des algorithmes cryptographiques embarqués." Thesis, Bordeaux, 2014. http://www.theses.fr/2014BORD0057/document.

Повний текст джерела
Анотація:
Depuis la fin des années 90, les cryptosystèmes implantés sur carte à puce doivent faire face à deux grandes catégories d'attaques : les attaques par canaux cachés et les attaques par injection de fautes. Pour s'en prémunir, des contre-mesures sont élaborées, puis validées en considérant un modèle d'attaquant bien défini. Les travaux réalisés dans cette thèse se concentrent sur la protection des cryptosystèmes symétriques contre les attaques par canaux cachés. Plus précisément, on s'intéresse aux contre-mesures de masquage permettant de se prémunir des attaques statistiques d'ordre supérieur p
Стилі APA, Harvard, Vancouver, ISO та ін.
7

ROSSI, PHILIPPE. "Reflexions sur le fondement, l'etendue, la protection et les projets d'actualisation du secret medical." Nice, 1988. http://www.theses.fr/1988NICE6001.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Quennesson, Claire. "Mineur et secret." Thesis, Bordeaux, 2017. http://www.theses.fr/2017BORD0804/document.

Повний текст джерела
Анотація:
Le secret est une notion ancienne, ancrée dans notre législation, qui est généralement le fait des majeurs. Relier le mineur au secret suppose de préciser comment la minorité influe sur le droit au secret dont toute personne - y compris lorsqu’elle est mineure - est titulaire, qu'il s'agisse de l'étendue du droit au secret plutôt plus réduite que pour les majeurs, que de l'exercice de ce droit qui, comme tout droit du mineur est différent et plus complexe.Garder un savoir caché suppose un certain degré de capacité. Or, le statut particulier reconnu au mineur, sujet de droit vulnérable soumis à
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Olivari, Medina Cecilia. "L'acceptabilité de la rupture du secret médical pour la protection d'un tiers en danger de contracter une maladie sexuellement transmissible et pour la protection d'un adolescent consommateur de substances, vue par le public chilien." Toulouse 2, 2009. http://www.theses.fr/2009TOU20090.

Повний текст джерела
Анотація:
Nous avons étudié les facteurs qui déterminent l’acceptabilité de la rupture de la confidentialité médicale dans deux types de situation: a) La rupture de la confidentialité pour la protection d'un tiers en danger de contracter une infection sexuellement transmissible. B) La rupture de la confidentialité pour la protection d'un patient adolescent consommateur de drogues. Trois cent cinquante sept personnes chiliennes ont jugé du degré d'acceptabilité de la rupture de la confidentialité. Dans le cas de la rupture de la confidentialité pour la protection d'un tiers en danger, deux cent participa
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Abravanel-Jolly, Sabine. "La protection du secret en droit des personnes et de la famille." Lyon 3, 1999. http://www.theses.fr/1999LYO33026.

Повний текст джерела
Анотація:
La place de plus en plus importante accordee a la volonte individuelle incite a s'interroger sur la protection du secret en droit des personnes et de la famille, matieres par excellence ou le secret necessaire a l'existence de l'individu peut exister. Pour en faire l'analyse, il est propose tout d'abord de rechercher l'objet de ce secret. Cette recherche passe par l'identification de tous les secrets proteges en droit des personnes et de la famille. L'etude montre que si certaines matieres sont exclusives de secrets proteges parce qu'elles sont d'ordre public de direction, les autres en sont p
Стилі APA, Harvard, Vancouver, ISO та ін.
Більше джерел

Книги з теми "Protection of the secret of the will"

1

Werly, Stéphane. La protection du secret rédactionnel. Schulthess, 2005.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

1955-, Cundiff Victoria A., ed. Trade secret protection and litigation: Protecting confidential business and technical information. Practising Law Institute, 1992.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Copeland, Gloria. The secret place of God's protection. Kenneth Copeland Publications, 2002.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Peterson, Gale R. Trade secret protection in an information age. Glasser LegalWorks, 1997.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

(South), Korea, and Korea (South), eds. Yŏngŏp pimil pohopŏp: Trade secret protection act. Pagyŏngsa, 2012.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

E, Kay Randall, Edelson Rebecca, and State Bar of California. Intellectual Property Section., eds. Trade secret litigation and protection in California. State Bar of California, 2005.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Magnan, Richard A. Copyright, patent, and trade secret protection of software. Defense Technical Information Center, 1986.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Goldstein, Arnold S. Asset protection secrets. Garrett Pub., 1993.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Einschlag, Michael B. Seminar material for copyright, trademark, and trade secret protection. New Jersey Institute for Continuing Legal Education, 1987.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Sauveur, Paula. La protection du secret commercial dans les nuages publics de l'infonuagique (cloud computing). Éditions Y. Blais, 2013.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Більше джерел

Частини книг з теми "Protection of the secret of the will"

1

Halt, Gerald B., Robert Fesnak, John C. Donch, and Amber R. Stiles. "Trade Secret Protection." In Intellectual Property in Consumer Electronics, Software and Technology Startups. Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-7912-3_2.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

O’Donnell, Ryan W., John J. O’Malley, Randolph J. Huis, and Gerald B. Halt. "Trade Secret Protection." In Intellectual Property in the Food Technology Industry. Springer New York, 2008. http://dx.doi.org/10.1007/978-0-387-77389-6_2.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Desaunettes-Barbero, Luc. "Conclusion: The Distinction Between the Secret Sphere and Secret Pieces of Information—The Need of a New Conceptual Model for Trade Secrets Law." In Trade Secrets Legal Protection. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-26786-4_11.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Merino, Louis-Henri, and José Cabrero-Holgueras. "Secure Multi-Party Computation." In Trends in Data Protection and Encryption Technologies. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33386-6_17.

Повний текст джерела
Анотація:
AbstractSecure multi-party computation enables a group of parties to compute a function while jointly keeping their private inputs secret. The term “secure” indicates the latter property where the private inputs used for computation are kept secret from all other parties. A significant benefit of using secure multi-party computation is that many constructed protocols are information-theoretically secure, avoiding many problems using cryptographic hardness assumptions. Some notable use cases are secure auctions, privacy-preserving network security monitoring, spam filtering on encrypted emails,
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Artemiev, V. P. "The Protection of the Frontiers of the U.S.S.R." In The Soviet Secret Police. Routledge, 2024. http://dx.doi.org/10.4324/9781032676319-9.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Daskapan, Semir. "Dependable Security by Twisted Secret Sharing." In Security and Protection in Information Processing Systems. Springer US, 2004. http://dx.doi.org/10.1007/1-4020-8143-x_13.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Desaunettes-Barbero, Luc. "The Legal Apprehension of Secret Pieces of Information as Immaterial Goods Regulation." In Trade Secrets Legal Protection. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-26786-4_10.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Halt, Gerald B., Robert Fesnak, John C. Donch, and Amber R. Stiles. "Deciding Between Patent or Trade Secret Protection." In Intellectual Property in Consumer Electronics, Software and Technology Startups. Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-7912-3_8.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

O’Donnell, Ryan W., John J. O’Malley, Randolph J. Huis, and Gerald B. Halt. "Deciding Between Patent or Trade Secret Protection." In Intellectual Property in the Food Technology Industry. Springer New York, 2008. http://dx.doi.org/10.1007/978-0-387-77389-6_8.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Bent, Stephen A., Richard L. Schwaab, David G. Conlin, and Donald D. Jeffery. "Trade Secret and Other Non-Patent Protection." In Intellectual Property Rights in Biotechnology Worldwide. Palgrave Macmillan UK, 1987. http://dx.doi.org/10.1007/978-1-349-08009-0_7.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Тези доповідей конференцій з теми "Protection of the secret of the will"

1

Richter, Isaac, Jie Zhou, and John Criswell. "DeTRAP: RISC-V Return Address Protection With Debug Triggers." In 2024 IEEE Secure Development Conference (SecDev). IEEE, 2024. http://dx.doi.org/10.1109/secdev61143.2024.00021.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Maram, Balajee, Manikonda Srinivasa Sesha Sai, Malathy Vanniappan, T. Aditya Sai Srinivas, Pamarthi Nagaraju, and U. D. Prasan. "Protecting Medical Image Transmission: Color Secret Sharing Protocol for Enhanced Security." In 2024 International Conference on Artificial Intelligence and Quantum Computation-Based Sensor Application (ICAIQSA). IEEE, 2024. https://doi.org/10.1109/icaiqsa64000.2024.10882318.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Arora, Jatin, Kamal Saluja, G. S. Pradeep Ghantasala, et al. "Protecting SDIIOT Network from Key Breach Attack by using Secret Hash Chain Techniques." In 2024 Second International Conference Computational and Characterization Techniques in Engineering & Sciences (IC3TES). IEEE, 2024. https://doi.org/10.1109/ic3tes62412.2024.10877628.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Botha, Craig. "Benchmarking International Cathodic Protection and Alternating Current Mitigation Standards to Determine Suitable Protection Criteria." In MECC 2023. AMPP, 2023. https://doi.org/10.5006/mecc2023-20206.

Повний текст джерела
Анотація:
Abstract From time-to-time international standards are withdrawn, amended, updated or new standards are introduced that change the current thinking on existing subject matter. This paper demonstrates the complex process of reviewing several prominent Cathodic Protection and Alternating Current Mitigation standards and then attempting to benchmark suitable protection criteria. Today common Right of Way issues exist due to the convergence of pipelines, high voltage powerlines, telecommunications and other services that produce an environment conducive to rapid corrosion on previously secure pipe
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Lane, Rebekah, and Stephen A. Torri. "Comparing iOS and Android Anti-Virus Protection: A Survey." In 2024 Ninth International Conference On Mobile And Secure Services (MobiSecServ). IEEE, 2024. http://dx.doi.org/10.1109/mobisecserv63327.2024.10759904.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Rejintal, Chaitanya, and Manoranjan Kumar. "Secret image protection using image fusion." In 2016 IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT). IEEE, 2016. http://dx.doi.org/10.1109/rteict.2016.7807866.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Tso, Hao-Kuan, and Der-Chyuan Lou. "Medical image protection using secret sharing scheme." In the 6th International Conference. ACM Press, 2012. http://dx.doi.org/10.1145/2184751.2184860.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Inoue, Michiko, Tomokazu Yoneda, Muneo Hasegawa, and Hideo Fujiwara. "Partial Scan Approach for Secret Information Protection." In 2009 14th IEEE European Test Symposium (ETS). IEEE, 2009. http://dx.doi.org/10.1109/ets.2009.15.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

AprilPyone, MaungMaung, and Hitoshi Kiya. "Transfer Learning-Based Model Protection With Secret Key." In 2021 IEEE International Conference on Image Processing (ICIP). IEEE, 2021. http://dx.doi.org/10.1109/icip42928.2021.9506147.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Chen, Chao, Zhiyuan An, and Fangguo Zhang. "Shorter Post-quantum Secret Handshakes from Isogenies." In 2023 International Conference on Data Security and Privacy Protection (DSPP). IEEE, 2023. http://dx.doi.org/10.1109/dspp58763.2023.10405180.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Звіти організацій з теми "Protection of the secret of the will"

1

Chandramouli, Ramaswamy. Secure Virtual Network Configuration for Virtual Machine (VM) Protection. National Institute of Standards and Technology, 2016. http://dx.doi.org/10.6028/nist.sp.800-125b.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Pappas, Mersene. Elsie's Secret. Portland State University Library, 2016. http://dx.doi.org/10.15760/honors.277.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Wong, Theodore M., and Jeannette M. Wing. Verifiable Secret Redistribution. Defense Technical Information Center, 2001. http://dx.doi.org/10.21236/ada458508.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Dang, Tri Vi, Gary Gorton, Bengt Holmström, and Guillermo Ordonez. Banks as Secret Keepers. National Bureau of Economic Research, 2014. http://dx.doi.org/10.3386/w20255.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Karch, Benjamin. Field Programmable Gate Array-Based Reactor Protection Systems and Potential for Inclusion of Secure Elements to Improve Cybersecurity. Office of Scientific and Technical Information (OSTI), 2024. https://doi.org/10.2172/2480123.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Karch, Benjamin, Titus Gray, and Michael Rowland. Field Programmable Gate Array-Based Reactor Protection Systems and Potential for Inclusion of Secure Elements to Improve Cybersecurity. Office of Scientific and Technical Information (OSTI), 2024. http://dx.doi.org/10.2172/2462968.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Seybold, Patricia. Secret to Successful Customer Engagements. Patricia Seybold Group, 2013. http://dx.doi.org/10.1571/me09-26-13cc.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Gorman, Paul F. The Secret of Future Victories. Defense Technical Information Center, 1992. http://dx.doi.org/10.21236/ada250718.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Nottingham, M. The "secret-token" URI Scheme. RFC Editor, 2021. http://dx.doi.org/10.17487/rfc8959.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Rossbach, Niclas. Intelligence and data resilience: A small state perspective on digitalisation and national defence towards the 2030s. Swedish Defence University, 2024. https://doi.org/10.62061/iibr1180.

Повний текст джерела
Анотація:
Due to the increased reliance of governments on digital data, it is probably safe to suggest that, without it, there would be no state left to defend. Because, without data, there might not even be a continuity of government, and consequently no state, in a time of crisis. Hence, this paper looks at critical national digital data as a key feature of national security. This paper shows why and how the protection of digitalised critical national data is important for a country’s defence at different levels of conflict, both below and above the threshold of armed conflict. This issue can be studi
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!