921 resultados para Secret marriages
Resumo:
Mode of access: Internet.
Resumo:
We extend our earlier work on ways in which defining sets of combinatorial designs can be used to create secret sharing schemes. We give an algorithm for classifying defining sets or designs according to their security properties and summarise the results of this algorithm for many small designs. Finally, we discuss briefly how defining sets can be applied to variations of the basic secret sharing scheme.
Resumo:
I offer a new cartography of ethical resistance. I argue that there is an uncharted interaction between managerial secrecy and organizational silence, which may exponentially increase the incidence of corruption in ways not yet understood. Current methods used to raise levels of moral conduct in business and government practice appear blind to this powerful duo. Extensive literature reviews of secrecy and silence scholarships form the background for an early stage conceptual layout of the co-production of secrecy and silence.
Resumo:
It is shown that in some cases it is possible to reconstruct a block design D uniquely from incomplete knowledge of a minimal defining set for D. This surprising result has implications for the use of minimal defining sets in secret sharing schemes.
Resumo:
Beginning with the sole literary text that does figure at any length in the first volume of Foucault's history--Diderot's Les Bijoux indiscrets, which dates from 1748--Cryle examines some semiotic routines involved in that telling of secrets, and to understand more about scientia sexualis through its literary development. He tries to show that narratives of the time tended to gather the mysterious, the unknown, and the generally inscrutable in the same functional place, holding them close to a thematics of the sexual. And returns to eighteenth-century texts from time to time in order to mark this as a fundamental shift in the literary constitution of sexual knowledge.
Resumo:
Considers ability of beneficiaries to trace into unauthorised profits following ruling in Sinclair v Versaille and other recent case law.
Resumo:
The paper has been presented at the International Conference Pioneers of Bulgarian Mathematics, Dedicated to Nikola Obreshkoff and Lubomir Tschakaloff , Sofia, July, 2006. The material in this paper was presented in part at the 11th Workshop on Selected Areas in Cryptography (SAC) 2004
Resumo:
We propose a new approach to the generation of an alphabet for secret key exchange relying on small variations in the cavity length of an ultra-long fiber laser. This new concept is supported by experimental results showing how the radio-frequency spectrum of the laser can be exploited as a carrier to exchange information. The test bench for our proof of principle is a 50 km-long fiber laser linking two users, Alice and Bob, where each user can randomly add an extra 1 km-long segment of fiber. The choice of laser length is driven by two independent random binary values, which makes such length become itself a random variable. The security of key exchange is ensured whenever the two independent random choices lead to the same laser length and, hence, to the same free spectral range.
Resumo:
This paper aims to describe the results of three rounds of secret shopping conducted at the Hubert Library of Florida International University, and how the results affected and were affected by changes made to circulation desk student training programs.
Resumo:
In 2011 the Reference Department at the Glenn Hubert Library (HL), Biscayne Bay Campus, Florida International University (FIU) moved to a joint ser-vice desk with the circulation desk. Shortly after the move reference librarians became concerned with the misinformation that the circulation department’s work-study students sometimes provided to patrons. As a result, we felt a Secret Shopping program would be a good method to evaluate the information provided. Furthermore, it was seen as a method of improving customer service and com-paring the self-perceptions of service to patrons’ perceptions.
Resumo:
General note: Title and date provided by Bettye Lane.