Secrecy

Results: 11054



#Item
51

The Cork-Ball Experiment – Part 1 The introduction of the cork-centered baseball in 1909 and 1910 was done in such secrecy and with limited bits of information, that the press had a hard time knowing what was going on,

Add to Reading List

Source URL: gallery.mailchimp.com

- Date: 2016-02-08 01:56:08
    52

    Preface The Trans-Pacific Partnership (TPP) trade agreement between the United States and 11 Pacific Rim countries concluded in OctoberDespite fears about secrecy, the entire text was released soon after, months

    Add to Reading List

    Source URL: piie.com

    - Date: 2016-12-14 18:55:39
      53

      A New Achievable Ergodic Secrecy Rate Region for the Fading Multiple Access Wiretap Channel Raef Bassily Sennur Ulukus

      Add to Reading List

      Source URL: www.ece.umd.edu

      - Date: 2009-10-04 11:40:44
        54

        Imperfect Forward Secrecy How Diffie-Hellman Fails in Practice David Adrian, Karthikeyan Bhargavan, Zakir Durumeric, Pierrick Gaudry, Matthew Green, J. Alex Halderman, Nadia Heninger, Drew Springall, Emmanuel Thom´e,

        Add to Reading List

        Source URL: ecc2015.math.u-bordeaux1.fr

        - Date: 2015-09-27 09:29:28
          55

          Simultaneous Secrecy and Reliability Amplification for a General Channel Model Russell Impagliazzo1 , Ragesh Jaiswal2 , Valentine Kabanets3 , Bruce M. Kapron4 , Valerie King4 , and Stefano Tessaro5 1

          Add to Reading List

          Source URL: eprint.iacr.org

          - Date: 2016-08-05 20:17:42
            56

            Museum Quiz Trail Stand in the entrance to our exhibition, where you can learn about England during the Reformation: a world of secrecy and spies. Why did Henry VIII want a divorce?

            Add to Reading List

            Source URL: bar-convent.org.uk

            - Date: 2016-01-22 10:46:22
              57

              Ending the Secrecy of Public-Private Contracts: The hidden billions by Oliver Huitson The “public private” sector is estimated to cost the taxpayer over £80bn a year. The Private Finance Initiative (PFI) alone will

              Add to Reading List

              Source URL: www.opendemocracy.net

              - Date: 2015-05-20 04:26:05
                58

                Inside Risks Rebecca T. Mercuri and Peter G. Neumann Security by Obscurity he belief that code secrecy can make a system more secure is commonly known as security by obscurity. Certainly, vendors have the

                Add to Reading List

                Source URL: www.notablesoftware.com

                - Date: 2007-02-28 16:29:20
                  59

                  SECRECY AGREEMENT FOR DATA THIS AGREEMENT is effective on the date of the last signatory below, by and between ____________, having an address at ___________________________________________ _____________ hereinafter refe

                  Add to Reading List

                  Source URL: invention.uci.edu

                  - Date: 2015-03-23 15:58:12
                    60Secrecy / Security / Prevention / Intellectual property law / Confidentiality / Source / Safety / Trade secret / National security / Information security

                    REQUEST FOR PROTECTED RECORD STATUS

                    Add to Reading List

                    Source URL: innovation.usu.edu

                    Language: English - Date: 2015-08-04 15:56:16
                    UPDATE