نتایج جستجو برای: keeping the secrets
تعداد نتایج: 16055413 فیلتر نتایج به سال:
We describe a technique for hardening services that may contain unknown security vulnerabilities. We employ artificial diversity techniques, but in contrast to previous approaches that rely on keeping secrets to provide probabilistic security properties, we develop an architectural framework that provides a high degree of assurance without needing any secrets. The framework requires an attacker...
Companies in the information industry rely on employees to protect proprietary information from the clutches of competitors. In exhorting employees to protect proprietary information, few employers consider the affect of such constraints on employees’ creativity. But, there are several reasons to believe that people may be less creative when asked to protect proprietary information. First, empl...
This essay examines the economics of patronage and the roles of asymmetric information and reputation in the early modern reorganization of scientific activities, specifically their influence upon the historical formation of key elements in the ethos and organizational structure of publicly funded open science. The emergence during the late 16th and early 17th centuries of the idea and practice...
The relevance of this article is determined by the constantly growing interest that researchers take in study cognitive linguistics and psycholinguistics how why people decide to keep or, conversely, reveal secrets. purpose our describe verbalization concept secret modern English literary fictional discourse. communicative acts hiding or revealing secrets personages’ speech have been chosen as ...
Cryptography is the science of keeping secrets. It is mainly related to data security when transmitting data over networks. During data transmission intruders may possible to acquire information without the knowledge of sender and receiver. So it needs some mechanism to prevent unauthorized access. The security system deals with Multi-Modal biometric features namely Finger-Knuckle-Print and Fin...
The purpose of this qualitative study was to describe the nature of postpartum depression (PPD) among African-American women. Twelve women, who had experienced PPD within the last three years, were interviewed for approximately one hour at two intervals. Nudist-4 software and the constant comparative method were used to analyze the data. Five themes "Stressing Out," "Feeling Down," "Losing It,"...
Users of social applications like to be notified when their friends are online. Typically, this is done by a central server keeping track of who is online and offline, as well as of all of the users’ “buddy lists”, which contain sensitive information. We present DP5, a cryptographic service that implements online presence indication in a privacy-friendly way. DP5 allows clients to register thei...
We live in a world that values justice; when a crime is committed, just punishment is expected to follow. Keeping one's misdeed secret therefore appears to be a strategic way to avoid (just) consequences. Yet, people may engage in self-punishment to right their own wrongs to balance their personal sense of justice. Thus, those who seek an escape from justice by keeping secrets may in fact end u...
silence is one of the most important elements in mystical theology, generally, and in negative theology, particularly. silence is the last stage to which the mystic or the mystical theologian reaches in talking of god. in this stage, all the linguistic methods of the mystic disappear. in this paper, firstly, we will discuss the central role of the silence in the rumi’s works. then we will argue...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید