Protecting your intellectual property against third-party infringers and patents

被引:0
|
作者
Bianco, Krista [1 ]
机构
[1] Finnegan Henderson Farabow Garrett & Dunner LLP, Washingon, DC USA
关键词
D O I
暂无
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
5-CHAL
引用
收藏
页数:1
相关论文
共 50 条
  • [31] Outside the box: Options for protecting your nanotechnology intellectual property
    McIntyre, Kristi
    ABSTRACTS OF PAPERS OF THE AMERICAN CHEMICAL SOCIETY, 2018, 256
  • [32] CHAL 45-Options for protecting your intellectual property
    Albrecht, Michael R.
    ABSTRACTS OF PAPERS OF THE AMERICAN CHEMICAL SOCIETY, 2006, 232
  • [33] Proper Laboratory Notebook Practices: Protecting Your Intellectual Property
    Jason T. Nickla
    Matthew B. Boehm
    Journal of Neuroimmune Pharmacology, 2011, 6 : 4 - 9
  • [34] Say No to Freeloader: Protecting Intellectual Property of Your Deep Model
    Wang, Lianyu
    Wang, Meng
    Fu, Huazhu
    Zhang, Daoqiang
    IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2024, 46 (12) : 11073 - 11086
  • [35] Proper Laboratory Notebook Practices: Protecting Your Intellectual Property
    Nickla, Jason T.
    Boehm, Matthew B.
    JOURNAL OF NEUROIMMUNE PHARMACOLOGY, 2011, 6 (01) : 4 - 9
  • [36] NativeProtector: Protecting Android Applications by Isolating and Intercepting Third-Party Native Libraries
    Hong, Yu-Yang
    Wang, Yu-Ping
    Yin, Jie
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, SEC 2016, 2016, 471 : 337 - 351
  • [37] A defense mechanism against hardware Trojan insertion by third-party intellectual property (IP) design blocks in AES-based secured communication system
    Noor N.Q.M.
    Daud S.M.
    International Journal of Information Technology, 2017, 9 (1) : 87 - 92
  • [38] Stay in Your Cage! A Sound Sandbox for Third-Party Libraries on Android
    Wang, Fabo
    Zhang, Yuqing
    Wang, Kai
    Liu, Peng
    Wang, Wenjie
    COMPUTER SECURITY - ESORICS 2016, PT I, 2016, 9878 : 458 - 476
  • [39] Stay in your Cage! a sound sandbox for third-party libraries on android
    Wang, Fabo
    Zhang, Yuqing
    Wang, Kai
    Liu, Peng
    Wang, Wenjie
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2016, 9878 LNCS : 458 - 476
  • [40] Protecting the privacy of third-party information: Recommendations for social and behavioral health researchers
    Lounsbury, David W.
    Reynolds, Thomas C.
    Rapkin, Bruce D.
    Robson, Mark E.
    Ostroff, Jamie
    SOCIAL SCIENCE & MEDICINE, 2007, 64 (01) : 213 - 222