期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
司法实践中的技术秘密点认定方法
1
作者 许新元 《争议解决》 2024年第3期157-162,共6页
在侵犯商业秘密的技术案件中,秘密点的举证与确定是最为关键的一环。基于现有规范中秘密点尚无准确定义的现状,本文提出应当以“不为公众所知悉”的技术信息为基础确定秘密点。基于技术秘密案件与专利案件保护对象的相似性,本文对比了... 在侵犯商业秘密的技术案件中,秘密点的举证与确定是最为关键的一环。基于现有规范中秘密点尚无准确定义的现状,本文提出应当以“不为公众所知悉”的技术信息为基础确定秘密点。基于技术秘密案件与专利案件保护对象的相似性,本文对比了秘密点确定与专利法中技术方案及技术特征的异同,提出应当在司法实践中引入诉讼协商机制,以便更有效率、更准确的完成技术秘密点认定。 展开更多
关键词 术秘密 秘密 秘密点认定
下载PDF
Set (k, n)-Exactly covering problem
2
作者 吴振寰 Gao +2 位作者 Ying Wu Zhehui 《High Technology Letters》 EI CAS 2010年第4期433-436,共4页
With the ( k, n )-threshold scheme of secret sharing in the field of information security technology as an application background, the concept of set ( k, n )-exact cover is presented in this paper. It is a modifi... With the ( k, n )-threshold scheme of secret sharing in the field of information security technology as an application background, the concept of set ( k, n )-exact cover is presented in this paper. It is a modification of the original concept of set covering problem. It is also different from the concept of exact cover defined by J.E. Hopcmft. Some properties of (k, n ) -exact cover are investigated; a sufficient condition for a set to be ( k, n ) -exactly coverable is given. It follows that a feasible assignment scheme of a set for the ( k, n) -exact eover is obtained if this set satisfies the sufficient condition. 展开更多
关键词 SET k n) -exact cover exactly covering match feasible assignment
下载PDF
Two-Step Efficient Deterministic Secure Quantum Communication Using Three-Qubit W State
3
作者 袁好 周军 +2 位作者 张刚 魏相飞 刘向远 《Communications in Theoretical Physics》 SCIE CAS CSCD 2011年第6期984-988,共5页
A two-step deterministic secure quantum communication (DSQC) scheme using blocks of three-qubit W state is proposed. In this scheme, the secret messages can be encoded by employing four two-particle unitary operatio... A two-step deterministic secure quantum communication (DSQC) scheme using blocks of three-qubit W state is proposed. In this scheme, the secret messages can be encoded by employing four two-particle unitary operations and directly decoded by utilizing the corresponding measurements in Bell basis or single-particle basis. Comparing with most previous DSQC protocols, the present scheme has a high total efficiency, which comes up to 50%. Apart from this, it has still the advantages of high capacity as each W state can carry two bits of secret information, and high intrinsic efficiency because almost all the instances are useful. Furthermore, the security of this communication can be ensured by the decoy particle checking technique and the two-step transmitting idea. 展开更多
关键词 deterministic secret quantum communication three-qubit W states decoy particle checking technique two-step transmitting idea
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部