Spelling suggestions: "subject:"counterfeits"" "subject:"counterfeit""
1 |
Les capitaux migrateurs (hot money)Blumenfeld, Henri. January 1941 (has links)
Thesis--Université de Neuchâtel. Faculté de Droit. / Bibliography: p. [187]-190.
|
2 |
Abschieben falschen Geldes /Caspar, Julius. January 1896 (has links)
Thesis (doctoral)--Georg-August-Universität zu Göttingen.
|
3 |
Les capitaux migrateurs (hot money)Blumenfeld, Henri. January 1941 (has links)
Thesis--Université de Neuchâtel. Faculté de Droit. / Bibliography: p. [187]-190.
|
4 |
Die Geldfälschung im geltenden Recht und in den Entwürfen /Brunner, Eduard. January 1930 (has links)
Thesis (doctoral)--Friedrich-Alexander-Universität zu Erlangen.
|
5 |
A Statistical and Circuit Based Technique for Counterfeit Detection in Existing ICsMoudgil, Rashmi 07 June 2013 (has links)
Counterfeit Integrated Circuits (ICs) are previously used ICs that are resold as new. They have become a serious problem in modern electronic devices. They cause lower performance, reduced life span and even catastrophic failure of systems and platforms. To prevent counterfeiting and the associated revenue loss, there is need for non-invasive and inexpensive techniques to establish the authenticity of devices. We describe a technique to detect a counterfeit IC that does not have any special anti-counterfeiting mechanisms built-in prior to deployment. Our detection criterion is based on measuring path delays. The experiments show that a single path delay cannot directly reveal the age, as it is also greatly influenced by process variation and this could result in large error in classifying ICs as authentic or counterfeit. �Instead, we establish that the relationship between the delays of two or more paths is a great indicator for the age of device. The idea is to project ICs from different age groups onto the space of the path delays and train a trusted reference hyper-surface for each age group. Ideally, the hyper-surfaces do not overlap. In this way, an IC under test can be assigned to one hyper-surface based on the distance of its footprint with respect to these hyper-surfaces, thus predicting its age. In our simulations, we observe over 97% correct prediction of identifying an aged IC from a new IC. / Master of Science
|
6 |
A model for the secure management of supply chains.04 June 2008 (has links)
We live in a very demanding and increasingly computerised world. In almost any area, consumers have a wide variety of choices, yet they demand shorter lead-times, higher quality and lower costs and if a business is unable to provide for the consumer’s requirements, the consumer will look elsewhere. With little to distinguish in manufacturing quality, the efficient use and management of supply chains becomes paramount. For a long time, the counterfeiting trade has been a thorn in the side of legitimate business. Seeking only to generate maximum profit with minimum effort, they use the reputation of a legitimate business to maximize sales. The counterfeiter’s task is made easier by the lack of control mechanisms along the supply chain. This leads to a situation where materials and finished products are being misappropriated in volume and counterfeit goods are able to enter the chain, often with help from within the targeted organisation. There is no mechanism for forcing individuals and organisations to accept responsibility, allowing for the passing blame. This dissertation will examine the nature of a system aimed at defeating attempts at theft, validating an item’s authenticity and positively identifying the origin and rightful owner of an item. This dissertation will not be explicitly developing the above system and will concentrate more on the underlying factors and providing a generic model on which to base an actual system. First we examine the impact of supply chains on our day-to-day lives, the concept and the related management paradigms. Next comes the counterfeiting trade and what motivates the counterfeiter. The examination is extended to cover the workings of the so-called “Grey Market” and some steps to combat the trade. In order to facilitate an implementation, various technologies are examined for their suitability. This covers diverse technologies from biometric authentication through the Internet and cryptographic technologies to the use of Radio Frequency Identifiers. Some specific devices are discussed and user attitudes towards these technologies are gauged. Based on these technologies a model is proposed allow a supply chain to be secured. A variety of concepts, such as packaging, unpacking and sealing, are introduced and explained. These concepts are combined with the various technologies for tracking items within the chain and for enforcing nonrepudiation. Based on the model, the actors within the system are identified along with the types of information each might expect, allowing generic datasets to be developed. With the model and technologies in place a tiered theoretical implementation is formed showing how each hardware device interacts with the model to form a solution. / Prof. M.S. Olivier
|
7 |
Topics in money and bankingChang, Peter Hsiao-pen, January 2003 (has links)
Thesis (Ph. D.)--University of Texas at Austin, 2003. / Vita. Includes bibliographical references. Available also from UMI Company.
|
8 |
Topics in money and bankingChang, Peter Hsiao-pen, 1975- 29 June 2011 (has links)
Not available / text
|
9 |
The enforcement of trademark rights in the People's Republic of China /Chen, Shui, 1969- January 2002 (has links)
Trademark counterfeiting is one of the most serious problems ever encountered in China. The Chinese government, recognizing the adverse effects that counterfeiting has had on both foreign investment and the nation's economy, has begun to take steps to protect intellectual property rights. To this end, the nation amended its Trademark Law on 27 October 2001. The aims of the amendment are to improve management of trademarks, to strengthen punishment for infringements, and to further meet the requirements of the TRIPs. Although the new amendment is laudable, eliminating the problem will take time. / This thesis offers an overview of trademark enforcement in China, beginning with a historical review of China's trademark law before moving on to examine the original version of current trademark legislation, the 1982 Trademark Law. The entry into force of the WTO placed tremendous pressure on China to meet international standards, resulting in the 2001 amendment and the protection it affords to well-known trademarks, as is discussed next. Finally, an examination of the enforcement of the trademark law in China, including the status of counterfeiting, the enforcement system, and the difficulties associated with enforcing trademark rights, is undertaken. The thesis concludes that the Chinese government has made remarkable progress in its quest to combat trademark counterfeiting and that the problem will gradually be overcome as the nation continues to develop its economy and enhance its legal system.
|
10 |
The enforcement of trademark rights in the People's Republic of China /Chen, Shui, 1969- January 2002 (has links)
No description available.
|
Page generated in 0.0686 seconds