Academic literature on the topic 'Secret des sources'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Secret des sources.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Secret des sources"
Perraud, Antoine. "Secret des sources." Médium 37-38, no. 4 (2013): 213. http://dx.doi.org/10.3917/mediu.037.0213.
Full textRowson, Everett K., W. F. Ryan, and Charles B. Schmitt. "Pseudo-Aristotle, The Secret of Secrets. Sources and Influences." Journal of the American Oriental Society 107, no. 1 (1987): 188. http://dx.doi.org/10.2307/603000.
Full textJovicic, Katarina. "Trade Secret Protection in the Law of the Republic of Serbia." Pravo i privreda 60, no. 4 (2022): 655–74. http://dx.doi.org/10.55836/pip_22403a.
Full textWarusfel, Bertrand. "Le droit peut-il encore protéger le secret ?" Titre VII N° 10, no. 1 (2023): 1–10. http://dx.doi.org/10.3917/tvii.010.0001.
Full textFraise, Thomas. "Comment cacher un nuage ? L’organisation du secret des essais atmosphériques français (1957-1974)." Relations internationales 194, no. 2 (2023): 11–26. http://dx.doi.org/10.3917/ri.194.0011.
Full textNitinawarat, Sirin, and Prakash Narayan. "Secret Key Generation for Correlated Gaussian Sources." IEEE Transactions on Information Theory 58, no. 6 (2012): 3373–91. http://dx.doi.org/10.1109/tit.2012.2184075.
Full textCourpasson, David, and Dima Younes. "Double or Quits: Understanding the Links between Secrecy and Creativity in a Project Development Process." Organization Studies 39, no. 2-3 (2017): 271–95. http://dx.doi.org/10.1177/0170840617727780.
Full textBerndtsson, Tim. "Frimureriets medier: Om 1700-talsfrimureriets mediering av hemligheter i tal, handskrift och tryck." Sjuttonhundratal 14 (December 19, 2017): 17–39. http://dx.doi.org/10.7557/4.4154.
Full textLevy, Jean-Paul. "Le secret de l'enquête et de l'instruction, le recel et le secret des sources." LEGICOM 48, no. 1 (2012): 47. http://dx.doi.org/10.3917/legi.048.0047.
Full textBarnett, Robert. "The Secret Secret: Cinema, Ethnicity and Seventeenth Century Tibetan-Mongolian Relations." Inner Asia 4, no. 2 (2002): 277–346. http://dx.doi.org/10.1163/146481702793647461.
Full textDissertations / Theses on the topic "Secret des sources"
Zemmouri, Catherine. "La protection du secret des sources du journaliste." Electronic Thesis or Diss., Université Paris-Panthéon-Assas, 2023. http://www.theses.fr/2023ASSA0082.
Full textDe, Witte Parra Mona. "La protection du renseignement britannique, américain et allemand pendant la Seconde Guerre mondiale." Thesis, Reims, 2016. http://www.theses.fr/2016REIML004.
Full textLévêque, Cyrielle. "Artification de l’archive : une dialectique entre figures et absences." Thesis, Université de Lorraine, 2018. http://www.theses.fr/2018LORR0334.
Full textBrenes, Vargas Rodolfo. "Contribution à l'étude des abus de la liberté d'expression dans le domaine judiciaire : étude de politique criminelle : l'exemple de la France et du Costa Rica." Thesis, Paris 1, 2016. http://www.theses.fr/2016PA01D018.
Full textSun, Xiaole, Ivan B. Djordjevic, and Mark A. Neifeld. "Secret Key Rates and Optimization of BB84 and Decoy State Protocols Over Time-Varying Free-Space Optical Channels." IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 2016. http://hdl.handle.net/10150/621687.
Full textDarmon, Julien. "La loi du secret : la kabbale comme source de halakha chez r. Joseph Caro et les décisionnaires séfarades ultérieurs." Paris, EHESS, 2007. http://www.theses.fr/2007EHES0110.
Full textLazoul, Mohamed. "Etude de la génération paramétrique optique dans les cristaux photoniques non linéaires : application aux sources multilongueurs d'onde." Paris 13, 2013. http://scbd-sto.univ-paris13.fr/secure/edgalilee_th_2013_lazoul.pdf.
Full textFriedman, Yaron. "Les Nusayri-ʿAlawis : entre sunna et shiʿa, refus et acceptation selon les sources arabes médiévales et modernes". Paris 4, 2006. http://www.theses.fr/2006PA040012.
Full textDelbe, Jean. "L'idf45 (inhibitory diffusible factor 45 kda) : un inhibiteur de croissance secrete par les fibroblastes de souris." Paris 6, 1991. http://www.theses.fr/1991PA066459.
Full textWang, Shiping. "Peptides as amino acid sources for the synthesis of secreted proteins by mammary tissue explants and cultured mammary epithelial cells." Diss., Virginia Tech, 1994. http://hdl.handle.net/10919/39137.
Full textBooks on the topic "Secret des sources"
Snow California: Delicious destinations, secret hideaways, expert sources. GPP Travel, 2009.
Find full textQuincey, Stewart Anthony Terence, and Great Britain. Public Record Office., eds. Michael Collins: The secret file. Blackstaff, 1997.
Find full textWilkinson, Alan. The secret battle: Stoke Field, 16th June 1487. Midas of Nottingham, 1987.
Find full textNath, Chopra Pran, and Bakshi S. R. 1935-, eds. Quit India Movement: British secret documents. Interprint, 1986.
Find full textBrejc, Miha. Vmesni čas: Varnostno-informativna služba in nastajanje nove slovenske države, 1990-1993. Mladinska knjiga, 1994.
Find full textBook chapters on the topic "Secret des sources"
Mayne, Andrew. "Sources and Background." In The Secret Agent by Joseph Conrad. Macmillan Education UK, 1987. http://dx.doi.org/10.1007/978-1-349-09206-2_2.
Full textDodis, Yevgeniy, Krzysztof Pietrzak, and Bartosz Przydatek. "Separating Sources for Encryption and Secret Sharing." In Theory of Cryptography. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11681878_31.
Full textDanbury, Richard, and Judith Townend. "Can you keep a secret? Legal and technological obstacles to protecting journalistic sources 1." In Journalism, Power and Investigation. Routledge, 2019. http://dx.doi.org/10.4324/9781315181943-6.
Full textHesz, Ágnes. "Secret police informer files as sources for the study of vernacular religion under communism." In The Secret Police and the Religious Underground in Communist and Post-Communist Eastern Europe. Routledge, 2021. http://dx.doi.org/10.4324/9780429331466-14.
Full textMuramatsu, Jun, and Shigeki Miyake. "Uniform Random Number Generation and Secret Key Agreement for General Sources by Using Sparse Matrices." In Mathematical Modelling for Next-Generation Cryptography. Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-5065-7_10.
Full textKrasner, David. "Secrets and Sources." In An Actor’s Craft. Macmillan Education UK, 2012. http://dx.doi.org/10.1007/978-0-230-35772-3_5.
Full textGibson, Stevyn D. "Exploring the role and value of open source intelligence." In Secret Intelligence, 2nd ed. Routledge, 2019. http://dx.doi.org/10.4324/9780429029028-8.
Full textAzcárate, Asunción López-Varela. "Private Secrets and Open Sources." In Neglected American Women Writers of the Long Nineteenth Century. Routledge, 2019. http://dx.doi.org/10.4324/9780429201837-9.
Full textPearson, Mark. "Confidentiality, secrets, sources and disclosure." In The Communicator's Guide to Media Law and Ethics. Routledge, 2023. http://dx.doi.org/10.4324/9781003372752-8.
Full textAraújo, Hugo André Flores Fernandes. "Secrecy, War, and Communication: Challenges and Strategies of the General-Government of the State of Brazil in the Second Half of the Seventeenth Century." In Privacy at Sea. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-35847-0_8.
Full textConference papers on the topic "Secret des sources"
Prabhakaran, Vinod M., Krishnan Eswaran, and Kannan Ramchandran. "Secrecy via sources and channels — A secret key - Secret message rate tradeoff region." In 2008 IEEE International Symposium on Information Theory - ISIT. IEEE, 2008. http://dx.doi.org/10.1109/isit.2008.4595139.
Full textEswaran, Krishnan, Vinod M. Prabhakaran, and Kannan Ramchandran. "Secret communication using sources and channels." In 2008 42nd Asilomar Conference on Signals, Systems and Computers. IEEE, 2008. http://dx.doi.org/10.1109/acssc.2008.5074492.
Full textNitinawarat, Sirin. "Secret key generation for correlated Gaussian sources." In 2008 IEEE International Symposium on Information Theory - ISIT. IEEE, 2008. http://dx.doi.org/10.1109/isit.2008.4595077.
Full textReny, Jian, Lein Harnz, and Tongtong Li. "How to leak a secret from multiple sources." In MILCOM 2008 - 2008 IEEE Military Communications Conference (MILCOM). IEEE, 2008. http://dx.doi.org/10.1109/milcom.2008.4753202.
Full textLin, Pin-Hsun, Carsten R. Janda, Eduard A. Jorswieck, and Rafael F. Schaefer. "Stealthy keyless secret key generation from degraded sources." In 2017 51st Asilomar Conference on Signals, Systems, and Computers. IEEE, 2017. http://dx.doi.org/10.1109/acssc.2017.8335126.
Full textAleksandrova, Elena Mikhaylovna. "THE SECRET SOCIETY: GAME OF FAITH." In Themed collection of papers from Foreign International Scientific Conference «Trends in the development of science and Global challenges» Ьу НNRI «National development» in cooperation with AFP. April 2023. - Managua (Nicaragua). Crossref, 2023. http://dx.doi.org/10.37539/230415.2023.56.16.023.
Full textKhisti, Ashish, Suhas N. Diggavi, and Gregory Wornell. "Secret-key generation with correlated sources and noisy channels." In 2008 IEEE International Symposium on Information Theory - ISIT. IEEE, 2008. http://dx.doi.org/10.1109/isit.2008.4595138.
Full textLing, Cong, Laura Luzzi, and Matthieu R. Bloch. "Secret key generation from Gaussian sources using lattice hashing." In 2013 IEEE International Symposium on Information Theory (ISIT). IEEE, 2013. http://dx.doi.org/10.1109/isit.2013.6620701.
Full textCao, Daming, and Wei Kang. "Secret key generation from correlated sources and secure link." In 2017 9th International Conference on Wireless Communications and Signal Processing (WCSP). IEEE, 2017. http://dx.doi.org/10.1109/wcsp.2017.8171157.
Full textChan, Chung, Navin Kashyap, Praneeth Kumar Vippathalla, and Qiaoqiao Zhou. "One-Shot Perfect Secret Key Agreement for Finite Linear Sources." In 2019 IEEE International Symposium on Information Theory (ISIT). IEEE, 2019. http://dx.doi.org/10.1109/isit.2019.8849668.
Full textReports on the topic "Secret des sources"
Mcalpin, Jerry D. Information Requirements for the Secure Transportation of Radioactive Sources. Office of Scientific and Technical Information (OSTI), 2019. http://dx.doi.org/10.2172/1499300.
Full textRobitaille, George E. Small Modular Reactors: The Army's Secure Source of Energy? Defense Technical Information Center, 2012. http://dx.doi.org/10.21236/ada561802.
Full textBagnulo, M., and A. Garcia-Martinez. SEcure Neighbor Discovery (SEND) Source Address Validation Improvement (SAVI). RFC Editor, 2014. http://dx.doi.org/10.17487/rfc7219.
Full textBarton, Adam. The Secret Sauce of Development Professionals: Tools for Assessing TOR Potential to Source Scalable Learning Interventions. Research on Improving Systems of Education (RISE), 2023. http://dx.doi.org/10.35489/bsg-rise-ri_2023/054.
Full textEhud Greenspan. STAR: The Secure Transportable Autonomous Reactor System - Encapsulated Fission Heat Source. Office of Scientific and Technical Information (OSTI), 2003. http://dx.doi.org/10.2172/816808.
Full textSaydjari, Sami. Defense Advanced Research Project Agency (DARPA) Information Assurance Program: Secure Open Source OS Workshop. Defense Technical Information Center, 1999. http://dx.doi.org/10.21236/ada399895.
Full textTsvetkov, Pavel Valeryevich, Salvador B. Rodriguez, David E. ,. II Ames, and Gary Eugene Rochau. High fidelity nuclear energy system optimization towards an environmentally benign, sustainable, and secure energy source. Office of Scientific and Technical Information (OSTI), 2009. http://dx.doi.org/10.2172/992316.
Full textTsvetkov, Pavel Valeryevich, Salvador B. Rodriguez, David E. ,. II Ames, and Gary Eugene Rochau. High fidelity nuclear energy system optimization towards an environmentally benign, sustainable, and secure energy source. Office of Scientific and Technical Information (OSTI), 2010. http://dx.doi.org/10.2172/992769.
Full textLohn, Andrew. Poison in the Well: Securing the Shared Resources of Machine Learning. Center for Security and Emerging Technology, 2021. http://dx.doi.org/10.51593/2020ca013.
Full textGreenspan, Ehud. STAR: The Secure Tranportable Autonomous Reactor system, Encapsulated Fission Heat Source. Progress report for period terminating March 31, 2000. Office of Scientific and Technical Information (OSTI), 2000. http://dx.doi.org/10.2172/761826.
Full text