Works matching DE "LEAKS (Disclosure of information)"


Results: 388
    1
    2

    ink & air.

    Published in:
    Public Relations Tactics, 2003, v. 10, n. 12, p. 4
    Publication type:
    Article
    3

    PR BLOTTER.

    Published in:
    Public Relations Tactics, 2002, v. 9, n. 10, p. 4
    Publication type:
    Article
    4
    5
    6
    7
    8
    9
    10
    11

    A Comprehensive Study of Citizen Safety App.

    Published in:
    Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 2,Part 4, p. 3067
    By:
    • Banerjee, Kakoli;
    • Kumar, Ajay;
    • K. G., Harsha;
    • P., Vinooth;
    • Kumar, Pradeep;
    • Singh, Jitendra;
    • Jain, Khushi;
    • Voolapalli, Manaswini
    Publication type:
    Article
    12
    13
    14
    15
    16
    17
    18
    19
    20
    21
    22
    23

    WikiLeaks and Realpolitik.

    Published in:
    Journal of Theoretical & Philosophical Criminology, 2012, v. 4, n. 1, p. 14
    By:
    • Steinmetz, Kevin F.
    Publication type:
    Article
    25

    Leaks and Consequences.

    Published in:
    American Scholar, 2013, v. 82, n. 4, p. 20
    By:
    • Caplan, Lincoln
    Publication type:
    Article
    26
    27
    28

    A STRATEGY FOR SECURING APDU TRANSMISSION.

    Published in:
    International Journal of Pattern Recognition & Artificial Intelligence, 2008, v. 22, n. 1, p. 33, doi. 10.1142/S0218001408006120
    By:
    • Ming-Sheng Liu;
    • Hui Liu;
    • Jian-Wu Zheng
    Publication type:
    Article
    29
    30
    31
    32
    33

    M-Score: A Misuseability Weight Measure.

    Published in:
    IEEE Transactions on Dependable & Secure Computing, 2012, v. 9, n. 3, p. 414, doi. 10.1109/TDSC.2012.17
    By:
    • Harel, Amir;
    • Shabtai, Asaf;
    • Rokach, Lior;
    • Elovici, Yuval
    Publication type:
    Article
    34

    PriPAYD: Privacy-Friendly Pay-As-You-Drive Insurance.

    Published in:
    IEEE Transactions on Dependable & Secure Computing, 2011, v. 8, n. 5, p. 742, doi. 10.1109/TDSC.2010.71
    By:
    • Troncoso, Carmela;
    • Danezis, George;
    • Kosta, Eleni;
    • Balasch, Josep;
    • Preneel, Bart
    Publication type:
    Article
    35
    36

    Leaks at the Supreme Court?

    Published in:
    American Bar Association Journal, 1979, v. 65, n. 3, p. 494
    By:
    • Keeffe, Arthur John
    Publication type:
    Article
    37
    38
    39
    40
    41
    42
    43
    44
    45
    46
    47
    48
    49

    Digital Leakage.

    Published in:
    Internal Auditor, 2002, v. 59, n. 6, p. 25
    By:
    • Kumar, Vishesh
    Publication type:
    Article
    50