Secrecy

Results: 11054



#Item
51The Cork-Ball Experiment – Part 1 The introduction of the cork-centered baseball in 1909 and 1910 was done in such secrecy and with limited bits of information, that the press had a hard time knowing what was going on,

The Cork-Ball Experiment – Part 1 The introduction of the cork-centered baseball in 1909 and 1910 was done in such secrecy and with limited bits of information, that the press had a hard time knowing what was going on,

Add to Reading List

Source URL: gallery.mailchimp.com

- Date: 2016-02-08 01:56:08
    52Preface  The Trans-Pacific Partnership (TPP) trade agreement between the United States and 11 Pacific Rim countries concluded in OctoberDespite fears about secrecy, the entire text was released soon after, months

    Preface The Trans-Pacific Partnership (TPP) trade agreement between the United States and 11 Pacific Rim countries concluded in OctoberDespite fears about secrecy, the entire text was released soon after, months

    Add to Reading List

    Source URL: piie.com

    - Date: 2016-12-14 18:55:39
      53A New Achievable Ergodic Secrecy Rate Region for the Fading Multiple Access Wiretap Channel Raef Bassily Sennur Ulukus

      A New Achievable Ergodic Secrecy Rate Region for the Fading Multiple Access Wiretap Channel Raef Bassily Sennur Ulukus

      Add to Reading List

      Source URL: www.ece.umd.edu

      - Date: 2009-10-04 11:40:44
        54Imperfect Forward Secrecy How Diffie-Hellman Fails in Practice David Adrian, Karthikeyan Bhargavan, Zakir Durumeric, Pierrick Gaudry, Matthew Green, J. Alex Halderman, Nadia Heninger, Drew Springall, Emmanuel Thom´e,

        Imperfect Forward Secrecy How Diffie-Hellman Fails in Practice David Adrian, Karthikeyan Bhargavan, Zakir Durumeric, Pierrick Gaudry, Matthew Green, J. Alex Halderman, Nadia Heninger, Drew Springall, Emmanuel Thom´e,

        Add to Reading List

        Source URL: ecc2015.math.u-bordeaux1.fr

        - Date: 2015-09-27 09:29:28
          55Simultaneous Secrecy and Reliability Amplification for a General Channel Model Russell Impagliazzo1 , Ragesh Jaiswal2 , Valentine Kabanets3 , Bruce M. Kapron4 , Valerie King4 , and Stefano Tessaro5 1

          Simultaneous Secrecy and Reliability Amplification for a General Channel Model Russell Impagliazzo1 , Ragesh Jaiswal2 , Valentine Kabanets3 , Bruce M. Kapron4 , Valerie King4 , and Stefano Tessaro5 1

          Add to Reading List

          Source URL: eprint.iacr.org

          - Date: 2016-08-05 20:17:42
            56Museum Quiz Trail Stand in the entrance to our exhibition, where you can learn about England during the Reformation: a world of secrecy and spies. Why did Henry VIII want a divorce?

            Museum Quiz Trail Stand in the entrance to our exhibition, where you can learn about England during the Reformation: a world of secrecy and spies. Why did Henry VIII want a divorce?

            Add to Reading List

            Source URL: bar-convent.org.uk

            - Date: 2016-01-22 10:46:22
              57Ending the Secrecy of Public-Private Contracts: The hidden billions by Oliver Huitson The “public private” sector is estimated to cost the taxpayer over £80bn a year. The Private Finance Initiative (PFI) alone will

              Ending the Secrecy of Public-Private Contracts: The hidden billions by Oliver Huitson The “public private” sector is estimated to cost the taxpayer over £80bn a year. The Private Finance Initiative (PFI) alone will

              Add to Reading List

              Source URL: www.opendemocracy.net

              - Date: 2015-05-20 04:26:05
                58Inside Risks Rebecca T. Mercuri and Peter G. Neumann  Security by Obscurity he belief that code secrecy can make a system more secure is commonly known as security by obscurity. Certainly, vendors have the

                Inside Risks Rebecca T. Mercuri and Peter G. Neumann Security by Obscurity he belief that code secrecy can make a system more secure is commonly known as security by obscurity. Certainly, vendors have the

                Add to Reading List

                Source URL: www.notablesoftware.com

                - Date: 2007-02-28 16:29:20
                  59

                  SECRECY AGREEMENT FOR DATA THIS AGREEMENT is effective on the date of the last signatory below, by and between ____________, having an address at ___________________________________________ _____________ hereinafter refe

                  Add to Reading List

                  Source URL: invention.uci.edu

                  - Date: 2015-03-23 15:58:12
                    60REQUEST FOR PROTECTED RECORD STATUS

                    REQUEST FOR PROTECTED RECORD STATUS

                    Add to Reading List

                    Source URL: innovation.usu.edu

                    Language: English - Date: 2015-08-04 15:56:16