Search results
Jump to navigation
Jump to search
Page title matches
- 12 bytes (1 word) - 16:16, 8 July 2009
- ...ound or inside a building. [[Electronic warfare]] includes a wide range of concealment methods, including [[electronic attack|jamming]] sensors so they cannot de667 bytes (96 words) - 16:17, 8 July 2009
- | pagename = Concealment | abc = Concealment2 KB (226 words) - 16:15, 8 July 2009
- 167 bytes (18 words) - 16:16, 8 July 2009
- 344 bytes (47 words) - 08:11, 4 May 2024
Page text matches
- ...ound or inside a building. [[Electronic warfare]] includes a wide range of concealment methods, including [[electronic attack|jamming]] sensors so they cannot de667 bytes (96 words) - 16:17, 8 July 2009
- Article normally worn on the face, typically for protection, concealment, performance, or amusement.137 bytes (16 words) - 02:34, 11 September 2009
- ...p://www.mja.com.au/public/issues/182_02_170105/for10877_fm.html Allocation concealment and blinding] * [http://www.bmj.com/cgi/content/full/330/7499/1049 Comparison of allocation concealment]913 bytes (121 words) - 10:18, 14 December 2011
- ...encompassing what the West regards as [[camouflage]], or [[deception]], [[concealment]] and counterintelligence, but going to a conscious plan of convincing the304 bytes (41 words) - 08:11, 4 May 2024
- ..., in combination with a cryptographic algorithm, introduces or removes the concealment applied to [[plaintext]] or taken to [[ciphertext]]; [[key management]] is346 bytes (45 words) - 11:07, 30 October 2008
- | pagename = Concealment | abc = Concealment2 KB (226 words) - 16:15, 8 July 2009
- {{r|Concealment}}444 bytes (56 words) - 09:49, 20 March 2024
- {{r|Concealment}}865 bytes (109 words) - 08:19, 22 June 2024
- ...e lines of "since this is meant for [administrative - don't line the word] concealment than active confidentiality, it doesn't need any more cryptographic strengt1 KB (154 words) - 09:37, 1 April 2013
- ...tive matters such as weapons of mass destruction; they were the key to the concealment and bluffing operations with United Nations inspectors such as UNSCOM.1 KB (225 words) - 07:36, 18 March 2024
- ...pouch. Besides differing from bristletails in the number of tails and the concealment of the mouthparts, they have shallower bodies and lack compound eyes and sc2 KB (222 words) - 20:10, 14 September 2013
- ...ch shorter than that of most other guns, which allows ease of carrying and concealment, but at the cost of significantly reducing accuracy at long ranges.1 KB (232 words) - 17:09, 13 August 2010
- ...including the enhancement of meanings otherwise difficult to express, the concealment of meanings the author does not wish to make explicit, or providing memorab2 KB (310 words) - 10:35, 27 August 2013
- ...intended for NATO roles where it could be dispersed into forests and other concealment, and then rise to carry out [[close air support]] and [[battlefield air int2 KB (321 words) - 11:02, 8 April 2024
- ...ch shorter than that of most other guns, which allows ease of carrying and concealment, but at the cost of significantly reducing accuracy at long ranges.2 KB (357 words) - 15:44, 17 July 2008
- ===Concealment===8 KB (1,206 words) - 09:52, 20 March 2024
- :"Concealment" is the term used in Shannon's schema (1949 paper on secrecy systems). Thi3 KB (512 words) - 03:06, 3 February 2010
- ..., in combination with a cryptographic algorithm, introduces or removes the concealment applied to [[plaintext]] or taken to [[ciphertext]]. This discussion deals4 KB (564 words) - 23:12, 4 February 2010
- ...goes well beyond. Their usage include deception, counterintelligence and [[concealment]], as an integral part of all planning, in which the highest levels of comm4 KB (517 words) - 08:11, 4 May 2024
- ...fle typically undergoes special training, not only in marksmanship, but in concealment.6 KB (769 words) - 21:56, 25 August 2022