A step-by-step shrouding methodology to protect against technology transfer | IEEE Conference Publication | IEEE Xplore