2,096 results on '"Christopher Wolf"'
Search Results
2. United States Tax court's order in the case of CHRISTOPHER WOLF Petitioners v COMMISSIONER OF INTERNAL REVENUE, Respondent (Docket No. 926-24L )
3. Christopher Wolf (2013), 'The Privacy Bill of Rights: What Are the Expectations for 2013?', Data Protection Law and Policy, 10, pp. 4-5.
4. Viral Hate: Containing Its Spread on the Internet. By Abraham H. Foxman and Christopher Wolf. Palgrave Macmillan, 2013. 256 pages. Hardback $19
5. Marine habitat use and movement in response to ocean warming by a threatened forest-nesting seabird
6. Viral Hate: Containing Its Spread on the Internet. By Abraham H. Foxman and Christopher Wolf. Palgrave Macmillan, 2013. 256 pages. Hardback $19
7. An environmental and socially just climate mitigation pathway for a planet in peril
8. Glimmers of hope in large carnivore recoveries
9. Restoring Asia’s roar: Opportunities for tiger recovery across the historic range
10. Overseas Shipholding names Christopher Wolf and Susan Allan to senior executive roles
11. Q&A: What the FTC recommendations mean for online privacy; An interview with Christopher Wolf of the Future of Privacy Forum
12. Overseas Shipholding Group, Inc. Announces Resignation of CFO Christopher Wolf
13. THE JOURNAL OF POLITICS, vol. 3, núm. 2. A theory of U.S. Constitutional History (Una teoría acerca de la Historia Constitucional de Estados Unidos) Christopher Wolf
14. #Eggs: social and online media-derived perceptions of egg-laying hen housing
15. James Beller Jr., Christopher Wolf
16. Influence of patient and tumor characteristics on therapy persistence with letrozole in postmenopausal women with advanced breast cancer: results of the prospective observational EvAluate-TM study
17. Many risky feedback loops amplify the need for climate action
18. Statement by Christopher Wolf, Proskauer Rose LLP, Counsel for Ambassador Joseph Wilson and Valerie Plame Wilson
19. National Press Club to Host 'NEWSMAKER' Media Briefing on Online Safety With Christopher Wolf, Brent Olsen and Stephen Balkam
20. Personal Story: Interview With Attorney Christopher Wolf
21. World Scientists’ Warning of a Climate Emergency 2022
22. Back of the Book: Interview With Privacy Attorney Christopher Wolf
23. Statement by Christopher Wolf, President of Hands Off The Internet, On Today's Report by the Consumer Federation of America and Other Groups Calling for Increased Regulation of Internet Access Via Cable
24. The Following Statement from Hands off the Internet President Christopher Wolf, Concerning the Portland Internet Access Case Being Argued Today
25. Tactile One-Time Pad: Leakage-Resilient Authentication for Smartphones.
26. Advanced Algebraic Attack on Trivium.
27. Rewilding the American West
28. Are we eating the world's megafauna to extinction?
29. Climate-driven variation in dispersal ability predicts responses to forest fragmentation in birds
30. Continuous Authentication on Mobile Devices by Analysis of Typing Motion Behavior.
31. Building a Framework for Mode Effect Estimation in United States Presidential Election Polls
32. Six steps to integrate climate mitigation with adaptation for social justice
33. The evolution, ecology, and conservation of hummingbirds and their interactions with flowering plants
34. Public Perceptions of Veterinarians from Social and Online Media Listening
35. Welt-weites Wählen am Beispiel der IACR.
36. Quantifying the security of graphical passwords: the case of android unlock patterns.
37. Large species within carnivora are large carnivores
38. Rewilding the world's large carnivores
39. Correction to ‘Rewilding the world's large carnivores’
40. Cryptanalysis of Enhanced TTS, STS and All Its Variants, or: Why Cross-Terms Are Important.
41. Solving Underdetermined Systems of Multivariate Quadratic Equations Revisited.
42. PermissionWatcher: Creating User Awareness of Application Permissions in Mobile Systems.
43. Worry and Wisdom: A Qualitative Study of Transgender Elders' Perspectives on Aging
44. Roots of Square: Cryptanalysis of Double-Layer Square and Square+.
45. Small Public Keys and Fast Verification for $\mathcal{M}$ ultivariate $\mathcal{Q}$ uadratic Public Key Systems.
46. Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices.
47. Sicherheitsanalyse von Kreditkarten am Beispiel von EMV.
48. Time-Area Optimized Public-Key Engines: -Cryptosystems as Replacement for Elliptic Curves?.
49. l-Invertible Cycles for Multivariate Quadratic (MQ) Public Key Cryptography.
50. The Belgian Electronic Identity Card (Overview).
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.