Science publishers try new tack to combat unauthorized paper sharing

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Trusted Detection of Unauthorized Filesystem Modifications to Combat Insider Tampering †

An insider-robust approach to file integrity verification is developed using interacting strata of mobile agents. Previous approaches relied upon monolithic architectures, or more recently, agent frameworks using a centralized control mechanism or common reporting repository. However, any such distinct tamperingpoint introduces vulnerabilities, especially from knowledgeable insiders capable of ...

متن کامل

Tack Hernia: A New Entity

The repair of incisional and ventral hernias by the laparoscopic method is finding its place in the general surgical field. The use of tacks and transfascial sutures is commonplace. A new hernia has been identified. Two hernias have been seen following the successful repair of incisional hernias. These did not appear to be recurrent hernias as definite findings of fascial defects were present r...

متن کامل

Efficient Secret Sharing Schemes Based on Unauthorized Subsets

We propose efficient secret sharing schemes realizing general access structures. Our proposed schemes are perfect secret sharing schemes and include Shamir’s (k, n)-threshold schemes as a special case. Furthermore, we show that a verifiable secret sharing scheme for general access structures is realized by one of the proposed schemes. key words: (k, n)-threshold scheme, general access structure...

متن کامل

An Affective Model for Unauthorized Sharing of Software

Software piracy has been studied by academics, software firms, law enforcement agents and policy makers for many years. Previous research in software piracy either did not differentiate between unauthorized copying and unauthorized sharing, or focused only on unauthorized copying. We believe the motivating factors behind the two behaviors are quite different because beneficiaries of the behavio...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Nature

سال: 2017

ISSN: 0028-0836,1476-4687

DOI: 10.1038/545145a