Journal articles on the topic 'Secret des sources'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Secret des sources.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Perraud, Antoine. "Secret des sources." Médium 37-38, no. 4 (2013): 213. http://dx.doi.org/10.3917/mediu.037.0213.
Full textRowson, Everett K., W. F. Ryan, and Charles B. Schmitt. "Pseudo-Aristotle, The Secret of Secrets. Sources and Influences." Journal of the American Oriental Society 107, no. 1 (January 1987): 188. http://dx.doi.org/10.2307/603000.
Full textJovicic, Katarina. "Trade Secret Protection in the Law of the Republic of Serbia." Pravo i privreda 60, no. 4 (December 24, 2022): 655–74. http://dx.doi.org/10.55836/pip_22403a.
Full textWarusfel, Bertrand. "Le droit peut-il encore protéger le secret ?" Titre VII N° 10, no. 1 (August 24, 2023): 1–10. http://dx.doi.org/10.3917/tvii.010.0001.
Full textFraise, Thomas. "Comment cacher un nuage ? L’organisation du secret des essais atmosphériques français (1957-1974)." Relations internationales 194, no. 2 (June 30, 2023): 11–26. http://dx.doi.org/10.3917/ri.194.0011.
Full textNitinawarat, Sirin, and Prakash Narayan. "Secret Key Generation for Correlated Gaussian Sources." IEEE Transactions on Information Theory 58, no. 6 (June 2012): 3373–91. http://dx.doi.org/10.1109/tit.2012.2184075.
Full textCourpasson, David, and Dima Younes. "Double or Quits: Understanding the Links between Secrecy and Creativity in a Project Development Process." Organization Studies 39, no. 2-3 (September 22, 2017): 271–95. http://dx.doi.org/10.1177/0170840617727780.
Full textBerndtsson, Tim. "Frimureriets medier: Om 1700-talsfrimureriets mediering av hemligheter i tal, handskrift och tryck." Sjuttonhundratal 14 (December 19, 2017): 17–39. http://dx.doi.org/10.7557/4.4154.
Full textLevy, Jean-Paul. "Le secret de l'enquête et de l'instruction, le recel et le secret des sources." LEGICOM 48, no. 1 (2012): 47. http://dx.doi.org/10.3917/legi.048.0047.
Full textBarnett, Robert. "The Secret Secret: Cinema, Ethnicity and Seventeenth Century Tibetan-Mongolian Relations." Inner Asia 4, no. 2 (2002): 277–346. http://dx.doi.org/10.1163/146481702793647461.
Full textZhou, Qiaoqiao, and Chung Chan. "Secret Key Generation for Minimally Connected Hypergraphical Sources." IEEE Transactions on Information Theory 66, no. 7 (July 2020): 4226–44. http://dx.doi.org/10.1109/tit.2020.2971215.
Full textKhisti, Ashish, Suhas N. Diggavi, and Gregory W. Wornell. "Secret-Key Generation Using Correlated Sources and Channels." IEEE Transactions on Information Theory 58, no. 2 (February 2012): 652–70. http://dx.doi.org/10.1109/tit.2011.2173629.
Full textLevchenko, Oleksandr, Anna Levchenko, and Tetiana Nemchenko. "Protection of Commercial Secrets in the Context of Strategic Management of Economic Security of the Organization in the Context of Digitalization of the Economy." Central Ukrainian Scientific Bulletin. Economic Sciences, no. 7(40) (2021): 20–30. http://dx.doi.org/10.32515/2663-1636.2021.7(40).20-30.
Full textYachongka, Vamoua, Hideki Yagi, and Yasutada Oohama. "Biometric Identification Systems with Noisy Enrollment for Gaussian Sources and Channels." Entropy 23, no. 8 (August 15, 2021): 1049. http://dx.doi.org/10.3390/e23081049.
Full textTemchin, Sergei. "An Interpolation from Avicenna’s The Canon of Medicine in the Ruthenian Translation of The Secret of Secrets." Slavistica Vilnensis 65, no. 1 (September 24, 2020): 10–19. http://dx.doi.org/10.15388/slavviln.2020.65(1).32.
Full textGassaway, Bob M. "Are Secret Sources in the News Media Really Necessary?" Newspaper Research Journal 9, no. 3 (March 1988): 69–77. http://dx.doi.org/10.1177/073953298800900307.
Full textOz-Salzberger, Fania, and Eli Salzberger. "The Secret German Sources of the Israeli Supreme Court." Israel Studies 3, no. 2 (October 1998): 159–92. http://dx.doi.org/10.2979/isr.1998.3.2.159.
Full textOz-Salzberger, Fania, and Eli Salzberger. "The Secret German Sources of the Israeli Supreme Court." Israel Studies 3, no. 2 (1998): 159–92. http://dx.doi.org/10.1353/is.2005.0085.
Full textMichalon, Barthélémy, and Benjamin Puybareau. "Secret d’État et secret des sources : comment des journalistes enquêtent-ils sur le renseignement en France ?" Cultures & conflits, no. 114-115 (December 20, 2019): 227–62. http://dx.doi.org/10.4000/conflits.21231.
Full textMandzhikova, Larisa B. "Документы секретного делопроизводства Совета Астраханского калмыцкого управления (1836–1848 гг.)." Бюллетень Калмыцкого научного центра Российской академии наук, no. 3 (December 25, 2023): 92–110. http://dx.doi.org/10.22162/2587-6503-2023-3-27-92-110.
Full textWang, Zichi. "Multisource Data Hiding in Digital Images." Symmetry 14, no. 5 (April 27, 2022): 890. http://dx.doi.org/10.3390/sym14050890.
Full textBassi, Germán, Pablo Piantanida, and Shlomo Shamai (Shitz). "The Secret Key Capacity of a Class of Noisy Channels with Correlated Sources." Entropy 21, no. 8 (July 26, 2019): 732. http://dx.doi.org/10.3390/e21080732.
Full textMuramatsu, J., K. Yoshimura, K. Arai, and P. Davis. "Secret Key Capacity for Optimally Correlated Sources Under Sampling Attack." IEEE Transactions on Information Theory 52, no. 11 (November 2006): 5140–51. http://dx.doi.org/10.1109/tit.2006.883552.
Full textJames, Ryan, Jeffrey Emenheiser, and James Crutchfield. "Unique Information and Secret Key Agreement." Entropy 21, no. 1 (December 24, 2018): 12. http://dx.doi.org/10.3390/e21010012.
Full textYılmaz, Hacı. "The concept of secret in Anatolian Alewism Anadolu Aleviliği’nde sır kavramı." Journal of Human Sciences 14, no. 2 (July 5, 2017): 2200. http://dx.doi.org/10.14687/jhs.v14i2.4692.
Full textKreilkamp, Ivan. "Meat, Flesh, Skin: The Carnality Of The Secret Agent." Studies in the Novel 56, no. 1 (March 2024): 21–40. http://dx.doi.org/10.1353/sdn.2024.a921057.
Full textOwnby, David. "The Heaven and Earth Society as Popular Religion." Journal of Asian Studies 54, no. 4 (November 1995): 1023–46. http://dx.doi.org/10.2307/2059958.
Full textMatveev, Ivan, and Ilia Safonov. "From Iris Image to Embedded Code: System of Methods." Algorithms 16, no. 2 (February 6, 2023): 87. http://dx.doi.org/10.3390/a16020087.
Full textAmidon, Debra M. "Dialogue with Customers: Secret to Innovation Strategy." International Journal of Innovation Management 01, no. 01 (March 1997): 73–87. http://dx.doi.org/10.1142/s136391969700005x.
Full textKara, György. "On some sources of Sagang Sechen’s Teachings (1662)." Acta Orientalia Academiae Scientiarum Hungaricae 73, no. 4 (December 17, 2020): 603–15. http://dx.doi.org/10.1556/062.2020.00031.
Full textEttinger, David. "Sources: Spies, Wiretaps, and Secret Operations: An Encyclopedia of American Espionage." Reference & User Services Quarterly 51, no. 1 (September 1, 2011): 82. http://dx.doi.org/10.5860/rusq.51n1.82.
Full textLevchenko, I., А. Firsov, L. Snigur, and E. Ivanchenko. "PERFECTION OF METHODOLOGY OF ESTIMATION OF EFFICIENCY OF SUBSYSTEM OF REARWARD SECRET SERVICE IN THE SEPARATE MECHANIZED BRIGADE DURING CONDUCT OF BATTLE ACTIONS." Collection of scientific works of Odesa Military Academy 2, no. 14 (January 25, 2021): 156–63. http://dx.doi.org/10.37129/2313-7509.2020.14.2.156-163.
Full textSekga, Comfort, and Mhlambululi Mafu. "Tripartite Quantum Key Distribution Implemented with Imperfect Sources." Optics 3, no. 3 (June 21, 2022): 191–208. http://dx.doi.org/10.3390/opt3030019.
Full textKinsella, Helen M. "Sex as the secret: counterinsurgency in Afghanistan." International Theory 11, no. 1 (December 18, 2018): 26–47. http://dx.doi.org/10.1017/s1752971918000210.
Full textVan Netten, Djoeke. "Spaces on Ships." TSEG - The Low Countries Journal of Social and Economic History 18, no. 3 (November 29, 2021): 107–24. http://dx.doi.org/10.52024/tseg.11044.
Full textMakarov, A. V., N. Yu Gusevskaya, and A. S. Petrov. "Counteraction to High Treason in Russian Legislation of the Second Half of the 19th — Early 20th Centuries." Nauchnyi dialog, no. 1 (January 27, 2021): 337–56. http://dx.doi.org/10.24224/2227-1295-2021-1-337-356.
Full textKruglyakov, Sergey V. "Realization of the Socio-Legal Function by Appointed Advocate in Criminal and Civil Cases Involving State Secrets." Общество: политика, экономика, право, no. 2 (February 21, 2024): 94–103. http://dx.doi.org/10.24158/pep.2024.2.10.
Full textBeglov, Alexey. "Special Services and Religious Organizations in the Soviet State: Collaboration Mechanisms, Survival Strategies, Sources." ISTORIYA 13, no. 6 (116) (2022): 0. http://dx.doi.org/10.18254/s207987840021686-3.
Full textKozák, Jan A. "A Minister to the Secret Fire: Pavel Hošekʼs take on J. R. R. Tolkien (review)." CENTRAL EUROPEAN JOURNAL FOR CONTEMPORARY RELIGION 4, no. 1 (April 11, 2022): 71–75. http://dx.doi.org/10.14712/25704893.2021.4.
Full textNOGAJ, Adam. "TECHNICAL SOURCES OF OBTAINING INTELLIGENCE INFORMATION." Scientific Journal of the Military University of Land Forces 162, no. 4 (October 1, 2011): 109–32. http://dx.doi.org/10.5604/01.3001.0002.3202.
Full textWATANABE, Shun, and Yasutada OOHAMA. "Secret Key Agreement from Correlated Gaussian Sources by Rate Limited Public Communication." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E93-A, no. 11 (2010): 1976–83. http://dx.doi.org/10.1587/transfun.e93.a.1976.
Full textXu, Yinfei, and Daming Cao. "Secret Key Generation From Vector Gaussian Sources With Public and Private Communications." IEEE Transactions on Information Theory 67, no. 8 (August 2021): 5420–31. http://dx.doi.org/10.1109/tit.2021.3086536.
Full textDuclert, Vincent. "Des archives pour Dreyfus. Du secret des dossiers � la transparence des sources." Sigila N�25, no. 1 (2010): 151. http://dx.doi.org/10.3917/sigila.025.0151.
Full textWatanabe, S., and Y. Oohama. "Secret Key Agreement From Vector Gaussian Sources by Rate Limited Public Communication." IEEE Transactions on Information Forensics and Security 6, no. 3 (September 2011): 541–50. http://dx.doi.org/10.1109/tifs.2011.2132130.
Full textBoche, H., and G. Janßen. "Distillation of secret-key from a class of compound memoryless quantum sources." Journal of Mathematical Physics 57, no. 8 (August 2016): 082201. http://dx.doi.org/10.1063/1.4960217.
Full textIzzo, Massimo. "The Origin of The Secret of the Golden Flower: Sources and Translations." Journal of Daoist Studies 16, no. 1 (2023): 81–104. http://dx.doi.org/10.1353/dao.2023.0004.
Full textWang, Di. "Heroic Mother and Wise Wife." Inner Asia 23, no. 2 (November 18, 2021): 212–32. http://dx.doi.org/10.1163/22105018-12340172.
Full textSEMENIUK, O. "Criminological analysis of threats in the sphere of protection of state secrets." INFORMATION AND LAW, no. 2(17) (June 29, 2016): 106–13. http://dx.doi.org/10.37750/2616-6798.2016.2(17).272909.
Full textChan, Alfred L., and Andrew J. Nathan. "The Tiananmen Papers Revisited." China Quarterly 177 (March 2004): 190–214. http://dx.doi.org/10.1017/s0305741004000116.
Full textVeszprémy, Márton. "Astrologers and the Hungarian State Security Agency." Polish Journal of the Arts and Culture New Series, no. 17 (1/2023) (May 2023): 53–67. http://dx.doi.org/10.4467/24506249pj.23.004.18997.
Full text