Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 211,204,959 papers from all fields of science
Search
Sign In
Create Free Account
Software blacklist
Known as:
Blacklist (disambiguation)
, Software blacklisting
Software blacklisting is a tool used by manufacturers of software and music on CD and DVD to prevent copying. Essentially the software on the disc…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
5 relations
Blacklist (computing)
Copy protection
Debugger
Patch (computing)
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Practical Byte-Granular Memory Blacklisting using Califorms
Hiroshi Sasaki
,
Miguel A. Arroyo
,
M. T. I. Ziad
,
Koustubha Bhat
,
Kanad Sinha
,
S. Sethumadhavan
Micro
2019
Corpus ID: 174799235
Recent rapid strides in memory safety tools and hardware have improved software quality and security. While coarse-grained memory…
Expand
2016
2016
Tokenisation Blacklisting Using Linkable Group Signatures
A. Umar
,
Iakovos Gurulian
,
K. Mayes
,
K. Markantonakis
Security and Privacy in Communication Networks
2016
Corpus ID: 16123101
Payment cards make use of a Primary Account Number (PAN) that is normally used by merchants to uniquely identify users, and if…
Expand
2013
2013
EXTENDEDNYMBLE: METHOD FOR TRACKINGMISBEHAVINGUSERS ANONYMOSLYWHILEBLOCKING
D. Prasad
,
D. Reddy
,
Banoth Samya
2013
Corpus ID: 13911030
We have many of anonymizing networks which provide users to access services of server anonymously. Anonymity has received…
Expand
2013
2013
Watchdogs that do not Bite, Nets that do not Catch, and "Perps" Policing Themselves: Why Anti-Corruption Multi-Level Governance Efforts Fail in the Philippines.
Grace R. Yllana
2013
Corpus ID: 168703754
ii ACKNOWLEDGEMENTS v CHAPTER ONE 1
2012
2012
Bootstrapping Communications into an Anti-Censorship System
P. Lincoln
,
Ian A. Mason
,
+6 authors
D. Boneh
IEEE Symposium on Foundations of Computational…
2012
Corpus ID: 7787457
Adversary-resistant communication bootstrapping is a fundamental problem faced by many circumvention (anti-censorship) systems…
Expand
2011
2011
Enhancing the sense of community and learning experience using self-paced instruction and peer tutoring in a computer-laboratory course
Vasa Buraphadeja
,
Jirang Kumnuanta
2011
Corpus ID: 55175836
In its second decade of education reform and its third cycle of national ICT master plans, Thailand struggles to transform its…
Expand
2010
2010
All Done and Dusted? Reflections on the EU Standard of Judicial Protection Against UN Blacklisting after the ECJ’s Kadi Decision
F. Ebert
,
V. Azarova
2010
Corpus ID: 155263752
On 3 September 2008 the European Court of Justice (ECJ) handed down its decision in the joint cases of Kadi and Al Barakaat (C…
Expand
2008
2008
Medienrecht- Kein Blacklisting ganzer Mailserver zur Spam-Abwehr
Lg Lüneburg
2008
Corpus ID: 170012791
Highly Cited
2004
Highly Cited
2004
Energy-efficient forwarding strategies for geographic routing in lossy wireless sensor networks
K. Seada
,
M. Zúñiga
,
A. Helmy
,
B. Krishnamachari
ACM International Conference on Embedded…
2004
Corpus ID: 13160521
Recent experimental studies have shown that wireless links in real sensor networks can be extremely unreliable, deviating to a…
Expand
2002
2002
Observations and diagnostic tools for data assimilation: October 1998
H. Järvinen
2002
Corpus ID: 62909600
The purpose of the observation preprocessing and screening is to produce a clean array of observations in an easily accessible…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE