Essays about: "thesis for IP"

Showing result 11 - 15 of 436 essays containing the words thesis for IP.

  1. 11. Locating the Unlocated : An Examination of Choice of Law and Consumer Protection in Cryptocurrency Trading

    University essay from Uppsala universitet/Juridiska institutionen

    Author : Laura Fernandez Gomero; [2023]
    Keywords : Private International Law; Conflicts of Laws; Rome I Regulation; Choice of Law; Qualification; Applicable Law; Crypto-assets; Cryptocurrency; Blockchain; Decentralized Ledger Technology; Crypto Exchanges; Crypto Trading; Consumer Contracts; Consumer Protection; Cross-border Contracts; Lunar Block; MiCA; Internationell privaträtt; IP-rätt; lagval; gränsöverskridande avtal; kryptotillgångar; kryptovalutor; Bitcoin; blockkedjeteknologi; kryptohandel; kvalifikation; konsumentskydd; Lunar Block; Rom I-förordningen; MiFID II; MiCA;

    Abstract : Disputes involving emerging technology, often leave a grey area on applicable law, as it is unlocated in the physical world. The problem with crypto-assets is partly driven by their underlying technology, allowing for the assets to be distributed in an international, digital sphere, and making it hard to pinpoint their territorial location and solve legal issues. READ MORE

  2. 12. EU Copyright and Trade Mark Law: a unifying lens for the protection of Fashion Designs? : Analysis and research into a better understanding of the concepts of originality and distinctiveness

    University essay from Stockholms universitet/Juridiska institutionen

    Author : Laureen Schuldt; [2023]
    Keywords : ;

    Abstract : As one of the largest and most important sectors, the fashion industry holds a significant position in the global economy. Consequently, ensuring legal protection for fashion designs is of utmost importance to designers and fashion brands alike. As sui generis regime, EU design rights are tailored to the protection of fashion. READ MORE

  3. 13. Securing SDN Data Plane:Investigating the effects of IP SpoofingAttacks on SDN Switches and its Mitigation : Simulation of IP spoofing using Mininet

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : SHIVAKUMAR YADAV JABBU; ANIRUDH SAI MADIRAJU; [2023]
    Keywords : Software Defined Networking; IP Spoofing; Flooding; DDoS Attacks; Data Plane; Mininet;

    Abstract : Background:Software-Defined Networking (SDN) represents a network architecture that offers a separate control and data layer, facilitating its rapid deployment and utilization for diverse purposes. However, despite its ease of implementation, SDN is susceptible to numerous security attacks, primarily stemming from its centralized nature. READ MORE

  4. 14. Power Estimation Tool for Digital Front-End 5G Radio ASIC

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Rajnandini Bhutada; [2023]
    Keywords : 5G; ASIC; DFE; Carrier Aggregation; Digital Pre-Distortion; Downlink; Uplink; Power Consumption; Power Model; Yield Analysis.;

    Abstract : Application Specific Integrated Circuits (ASICs) are critical to delivering on 5G’s promises of high speed, low latency, and expanded capacity. Digital Front-End (DFE) ASICs are particularly important components because they enhance crucial signal processing activities. READ MORE

  5. 15. Investigating the Effectiveness of Stealthy Hijacks against Public Route Collectors : Is AS-Path Prepending Enough to Hide from Public Route Collectors?

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Kunyu Wang; [2023]
    Keywords : BGP; BGP Hijack; Stealthy IP prefix hijacking; AS-Path Prepending; BGP monitoring; BGP; BGP Hijack; Stealthy IP prefix hijacking; AS-Path Prepending; BGP-övervakning;

    Abstract : BGP hijacking is a threat to network organizations because traditional BGP protocols were not designed with security in mind. Currently, research to combat hijacking is being done by detecting hijacking in real time from Public Route Collectors. READ MORE