Journal articles on the topic 'Secret des sources'

To see the other types of publications on this topic, follow the link: Secret des sources.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Secret des sources.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Perraud, Antoine. "Secret des sources." Médium 37-38, no. 4 (2013): 213. http://dx.doi.org/10.3917/mediu.037.0213.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Rowson, Everett K., W. F. Ryan, and Charles B. Schmitt. "Pseudo-Aristotle, The Secret of Secrets. Sources and Influences." Journal of the American Oriental Society 107, no. 1 (January 1987): 188. http://dx.doi.org/10.2307/603000.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Jovicic, Katarina. "Trade Secret Protection in the Law of the Republic of Serbia." Pravo i privreda 60, no. 4 (December 24, 2022): 655–74. http://dx.doi.org/10.55836/pip_22403a.

Full text
Abstract:
The subject of this paper is analysis of trade secret protection in Serbian law, which is organized and implemented at two levels: within the business company and the proceedings before the court. By applying the dogmatic method of research, the rules of current and relevant domestic sources of law are analysed, while the comparative method is used for comparing the Serbian system of trade secret legal protection with the analogous legal system in the European Union. The starting hypothesis is that the protection of trade secrets is a strategic issue that requires thoughtful planning and organization as well as constant improvement to preserve trade secrets and use their commercial potential for as long as possible. The aim of this work is to reach the conclusions that are practically usable both for trade secrets holders and for everyone else who participates in various roles in judicial procedures for trade secret protection.
APA, Harvard, Vancouver, ISO, and other styles
4

Warusfel, Bertrand. "Le droit peut-il encore protéger le secret ?" Titre VII N° 10, no. 1 (August 24, 2023): 1–10. http://dx.doi.org/10.3917/tvii.010.0001.

Full text
Abstract:
Le secret est une pratique qui a toujours eu maille à partir avec le droit, d’autant que les exigences de transparence ou de publicité sont de plus en plus importantes dans notre société. Entre des obligations de secret et les différents droits d’information que tout État produit, existe une tension dialectique. On le constate dans de nombreux domaines (qu’il s’agisse notamment des secrets professionnels ou de celui des sources des journalistes), mais la numérisation bouscule également les périmètres de confidentialité que la loi cherche à préserver, comme le montrent les difficultés de protection des secrets de la vie privée à l’heure de la révolution numérique. Pour autant, il ne faut pas renoncer à préserver des espaces de secret protégés par la loi. On peut constater qu’il est possible et nécessaire de les redéfinir à condition d’en faire apparaître la légitimité et de les accompagner d’un encadrement suffisamment efficace pour en limiter les éventuels usages abusifs. Comme tout secret constitue une restriction de l’un de nos droits les plus fondamentaux, celui de s’exprimer et de communiquer, il est salutaire que le droit ne protège pas inconditionnellement les secrets mais qu’il ne les préserve que lorsque cela paraît légitime et proportionné.
APA, Harvard, Vancouver, ISO, and other styles
5

Fraise, Thomas. "Comment cacher un nuage ? L’organisation du secret des essais atmosphériques français (1957-1974)." Relations internationales 194, no. 2 (June 30, 2023): 11–26. http://dx.doi.org/10.3917/ri.194.0011.

Full text
Abstract:
Comment organiser le secret autour d’une activité aussi remarquable, et aussi sensible, que des essais nucléaires atmosphériques ? Comment contrôler l’information quand celle-ci est – littéralement – transportée par le vent ? Basé sur des sources primaires, cet article se penche sur le régime original de secret organisé autour des sites d’essais français entre 1957 et 1974, et sur les enjeux qu’il pose en termes de contrôle de l’information et de la démocratie. Il montre comment le souci de protéger les « secrets stratégiques » de l’arsenal français, pourtant impossibles à garder, se combinait avec celui de dissimuler des « secrets inavouables » – les mesures de radioactivité – rendant ainsi invisible l’étendue de la contamination radioactive.
APA, Harvard, Vancouver, ISO, and other styles
6

Nitinawarat, Sirin, and Prakash Narayan. "Secret Key Generation for Correlated Gaussian Sources." IEEE Transactions on Information Theory 58, no. 6 (June 2012): 3373–91. http://dx.doi.org/10.1109/tit.2012.2184075.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Courpasson, David, and Dima Younes. "Double or Quits: Understanding the Links between Secrecy and Creativity in a Project Development Process." Organization Studies 39, no. 2-3 (September 22, 2017): 271–95. http://dx.doi.org/10.1177/0170840617727780.

Full text
Abstract:
Most studies on the links between secrecy and creativity have focused on individual sources of creativity and the impact of organizational management on creative initiatives. However, because of their very focus on individual practices of concealment and personal creative capacities, they have paid scant attention to collective interactions occurring around secrets. In this paper, we illuminate some mechanisms through which the creative work achieved in secret by scientists is enhanced by the exceptional character of their situation within the company. Coping with these exceptional circumstances leads the group to increase commitment, cohesion and efficiency. We theorize creativity as a result of the multiplication of social interactions among individuals and the social consequences of working and cooperating in secret. We show that secrecy can help rather than be detrimental to organizations when it is analysed as a social fabric of interactions around work and common feelings triggered by the risks of working in secret.
APA, Harvard, Vancouver, ISO, and other styles
8

Berndtsson, Tim. "Frimureriets medier: Om 1700-talsfrimureriets mediering av hemligheter i tal, handskrift och tryck." Sjuttonhundratal 14 (December 19, 2017): 17–39. http://dx.doi.org/10.7557/4.4154.

Full text
Abstract:
Masonic Media: On Mediation of Secrets in Speech, Handwriting and Print within Eighteenth Century Freemasonry.This article deals with 18th century Freemasonry as a platform for mediation of secrets. First it discusses different theoretical aspects that can be applied when studying the phenomenon of initiatory orders with communication in focus. But it also uses different masonic sources in order to investigate some of the techniques used to mediate secrets, most notably ciphers and hieroglyphs. Aligning myself with Linda Simonis’ system theoretical view of masonry, I show that masonry depended on a distinction between secret and disclosure in order to make new candidates pass from profane to initiate. In order to distribute – but also in a sense create – secrets, the masons made use of several techniques such as vows of silence, locked archives, ciphers and hieroglyphs which were used either to enclose information (at the level of the medium) or encode it (at the level of meaning). Through use of such techniques the masonic organisations – with their sharp borders between inside and outside – can itself be conceived as mediums for the “secret of masonry”. This in turn put masonry into opposition to the transparency ideal of the Enlightenment.
APA, Harvard, Vancouver, ISO, and other styles
9

Levy, Jean-Paul. "Le secret de l'enquête et de l'instruction, le recel et le secret des sources." LEGICOM 48, no. 1 (2012): 47. http://dx.doi.org/10.3917/legi.048.0047.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Barnett, Robert. "The Secret Secret: Cinema, Ethnicity and Seventeenth Century Tibetan-Mongolian Relations." Inner Asia 4, no. 2 (2002): 277–346. http://dx.doi.org/10.1163/146481702793647461.

Full text
Abstract:
AbstractThe Secret History of the Potala Palace, a 1989 film about Mongol-Tibetan relations in the seventeenth century, was a milestone in the still tentative development of Tibetan film, with significant Tibetan participation and close attention to Tibetan sources of history. This paper suggests possible reasons for the withdrawal of the film from circulation, and proposes ways of reading film in the context of contested versions of ethnicity.
APA, Harvard, Vancouver, ISO, and other styles
11

Zhou, Qiaoqiao, and Chung Chan. "Secret Key Generation for Minimally Connected Hypergraphical Sources." IEEE Transactions on Information Theory 66, no. 7 (July 2020): 4226–44. http://dx.doi.org/10.1109/tit.2020.2971215.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Khisti, Ashish, Suhas N. Diggavi, and Gregory W. Wornell. "Secret-Key Generation Using Correlated Sources and Channels." IEEE Transactions on Information Theory 58, no. 2 (February 2012): 652–70. http://dx.doi.org/10.1109/tit.2011.2173629.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Levchenko, Oleksandr, Anna Levchenko, and Tetiana Nemchenko. "Protection of Commercial Secrets in the Context of Strategic Management of Economic Security of the Organization in the Context of Digitalization of the Economy." Central Ukrainian Scientific Bulletin. Economic Sciences, no. 7(40) (2021): 20–30. http://dx.doi.org/10.32515/2663-1636.2021.7(40).20-30.

Full text
Abstract:
The article substantiates the relevance of developing the mechanism for protecting commercial secrets of the organization in the system of strategic management of economic security of the organization, taking into account the transformational changes in the economy. Using the methods of synthesis and analysis, logical and generalizing methods, the authors determined the essence and basic features of the concept of "commercial secret" in both legal and scientific literature. The most common threats to commercial secrets have been identified and the sources of threats to the leakage of confidential information have been identified, taking into account the digitalization of economic processes. Four areas of protection of commercial secrets of an organization have been identified: legal, organizational, technical and psychological. The importance of providing valuable information in the strategic perspective of commercial secrets for the formation of the basis for its protection in future were highlighted, as well as those responsible for protecting this information with the consolidation of duties and responsibilities in collective and employment agreements were identified. In the context of formation of an effective system of strategic management of economic security of organizations in the conditions of transformational changes the directions of improvement of protection of a commercial secret are offered. Taking into account a growing share of cyber fraud and transition to the preservation of information mainly on digital media, the urgency of enhanced protection increases. Thus, the formation of information security using advanced technologies and equipment, attracting highly qualified specialists in this field, monitoring to identify potential sources of information leakage and eliminate them. Considering that most common source of disclosure of trade secrets is the staff of the organization, it is proposed to form a long-term loyalty of employees and their understanding of the importance of protecting confidential information, the introduction of socially oriented personnel strategy.
APA, Harvard, Vancouver, ISO, and other styles
14

Yachongka, Vamoua, Hideki Yagi, and Yasutada Oohama. "Biometric Identification Systems with Noisy Enrollment for Gaussian Sources and Channels." Entropy 23, no. 8 (August 15, 2021): 1049. http://dx.doi.org/10.3390/e23081049.

Full text
Abstract:
In the present paper, we investigate the fundamental trade-off of identification, secret-key, storage, and privacy-leakage rates in biometric identification systems for remote or hidden Gaussian sources. We use a technique of converting the system to one where the data flow is in one-way direction to derive the capacity region of these rates. Also, we provide numerical calculations of three different examples for the system. The numerical results imply that it seems hard to achieve both high secret-key and small privacy-leakage rates simultaneously.
APA, Harvard, Vancouver, ISO, and other styles
15

Temchin, Sergei. "An Interpolation from Avicenna’s The Canon of Medicine in the Ruthenian Translation of The Secret of Secrets." Slavistica Vilnensis 65, no. 1 (September 24, 2020): 10–19. http://dx.doi.org/10.15388/slavviln.2020.65(1).32.

Full text
Abstract:
The Ruthenian translation of the medieval treatise Secretum Secretorum (“The Secret of Secrets”) was made in Kiev during the second half of the 15th century from a Hebrew version that dates back to late 13th‒early 14th centuries, when it was translated from the Arabic original, which probably originated in its final form during the 10th century. The Ruthenian translation contains certain interpolations that had been already present in the Hebrew version before it was translated into Ruthenian. They had been extracted from several Arabic and Hebrew sources, such as the treatise Al-Mansuri by Abū Bakr Muhammad ibn Zakariyā al-Rāzī (865‒925) and the treatises On Poisons, On Coitus, and On Asthma by Maimonides (1135/1138‒1204).The author argues that the same Ruthenian translation also contains a minor (one-page long) interpolation that through Hebrew mediation goes back to The Canon of Medicine written in Arabic by Avicenna (980‒1037). It is still to be established which of the seven known Medieval Hebrew translations and/or the around 30 commentaries on it (all unpublished) was used as the immediate source for the Kievan translation. Nevertheless, the newly identified Arabic origin of this particular interpolation to the Ruthenian version of the treatise The Secret of Secrets sheds some light on the prehistory of this particular text’s portion and compliments the list of sources used by the Hebrew-to-Ruthenian translators in Kiev during the second half of the 15th century.
APA, Harvard, Vancouver, ISO, and other styles
16

Gassaway, Bob M. "Are Secret Sources in the News Media Really Necessary?" Newspaper Research Journal 9, no. 3 (March 1988): 69–77. http://dx.doi.org/10.1177/073953298800900307.

Full text
Abstract:
Fifteen people who said they had acted as confidential news sources for journalists were interviewed Most said they had been providing confidential information for years as a way of letting the public know things. A majority of the sources said journalists faced with pressure to identify their sources should “ask me to reconsider an agreement” of confidentiality.
APA, Harvard, Vancouver, ISO, and other styles
17

Oz-Salzberger, Fania, and Eli Salzberger. "The Secret German Sources of the Israeli Supreme Court." Israel Studies 3, no. 2 (October 1998): 159–92. http://dx.doi.org/10.2979/isr.1998.3.2.159.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Oz-Salzberger, Fania, and Eli Salzberger. "The Secret German Sources of the Israeli Supreme Court." Israel Studies 3, no. 2 (1998): 159–92. http://dx.doi.org/10.1353/is.2005.0085.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Michalon, Barthélémy, and Benjamin Puybareau. "Secret d’État et secret des sources : comment des journalistes enquêtent-ils sur le renseignement en France ?" Cultures & conflits, no. 114-115 (December 20, 2019): 227–62. http://dx.doi.org/10.4000/conflits.21231.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Mandzhikova, Larisa B. "Документы секретного делопроизводства Совета Астраханского калмыцкого управления (1836–1848 гг.)." Бюллетень Калмыцкого научного центра Российской академии наук, no. 3 (December 25, 2023): 92–110. http://dx.doi.org/10.22162/2587-6503-2023-3-27-92-110.

Full text
Abstract:
Introduction. In the course of the activities of the Council of the Astrakhan Kalmyk Administration, which carried out the administrative management of Kalmykia in the period from 1836 to 1848, the documents were created for general office work and for secret ones as well. In the archival fund I-3 “Council of the Astrakhan Kalmyk Administration” of the National Archive of the Republic of Kalmykia, three files containing “secret cases” have been preserved; their study will make it possible to analyze and determine the nature of the issues considered in secret records management. The purpose of the article is to study archival documents classified as “secret” related to fund I-3 “Council of the Astrakhan Kalmyk Administration”, to explore the peculiarities of conducting secret office work in pre-revolutionary Kalmykia as well as to introduce newly identified archival documents into scientific circulation. Results. Documents created during the activities of the Kalmyk Administration Council and containing “secret” information are unique sources for studying the issues of organizing work with documents of a secret nature in one of the outskirts of pre-revolutionary Russia.
APA, Harvard, Vancouver, ISO, and other styles
21

Wang, Zichi. "Multisource Data Hiding in Digital Images." Symmetry 14, no. 5 (April 27, 2022): 890. http://dx.doi.org/10.3390/sym14050890.

Full text
Abstract:
In this paper, we propose a new data-hiding framework: multisource data hiding, in which multiple senders (multiple sources) are able to transmit different secret data to a receiver via the same cover image symmetrically. We propose two multisource data-hiding schemes, i.e., separable and anonymous, according to different applications. In the separable scheme, the receiver can extract the secret data transmitted by all senders using the symmetrical data-hiding key. A sender is unable to know the content of the secret data that is not transmitted by them (non-source sender). In the anonymous scheme, it is unnecessary to extract all secret data on the receiver side. The content extracted by the receiver is a co-determined result of the secret data transmitted by all senders. Details of the secret data are unknown to the receiver and the non-source senders. In addition, the two proposed schemes achieve multisource data hiding without decreasing the undetectability of data hiding.
APA, Harvard, Vancouver, ISO, and other styles
22

Bassi, Germán, Pablo Piantanida, and Shlomo Shamai (Shitz). "The Secret Key Capacity of a Class of Noisy Channels with Correlated Sources." Entropy 21, no. 8 (July 26, 2019): 732. http://dx.doi.org/10.3390/e21080732.

Full text
Abstract:
This paper investigates the problem of secret key generation over a wiretap channel when the terminals observe correlated sources. These sources are independent of the main channel and the users overhear them before the transmission takes place. A novel outer bound is proposed and, employing a previously reported inner bound, the secret key capacity is derived under certain less-noisy conditions on the channel or source components. This result improves upon the existing literature where the more stringent condition of degradedness is required. Furthermore, numerical evaluation of the achievable scheme and previously reported results for a binary model are presented; a comparison of the numerical bounds provides insights on the benefit of the chosen scheme.
APA, Harvard, Vancouver, ISO, and other styles
23

Muramatsu, J., K. Yoshimura, K. Arai, and P. Davis. "Secret Key Capacity for Optimally Correlated Sources Under Sampling Attack." IEEE Transactions on Information Theory 52, no. 11 (November 2006): 5140–51. http://dx.doi.org/10.1109/tit.2006.883552.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

James, Ryan, Jeffrey Emenheiser, and James Crutchfield. "Unique Information and Secret Key Agreement." Entropy 21, no. 1 (December 24, 2018): 12. http://dx.doi.org/10.3390/e21010012.

Full text
Abstract:
The partial information decomposition (PID) is a promising framework for decomposing a joint random variable into the amount of influence each source variable X i has on a target variable Y, relative to the other sources. For two sources, influence breaks down into the information that both X 0 and X 1 redundantly share with Y, what X 0 uniquely shares with Y, what X 1 uniquely shares with Y, and finally what X 0 and X 1 synergistically share with Y. Unfortunately, considerable disagreement has arisen as to how these four components should be quantified. Drawing from cryptography, we consider the secret key agreement rate as an operational method of quantifying unique information. Secret key agreement rate comes in several forms, depending upon which parties are permitted to communicate. We demonstrate that three of these four forms are inconsistent with the PID. The remaining form implies certain interpretations as to the PID’s meaning—interpretations not present in PID’s definition but that, we argue, need to be explicit. Specifically, the use of a consistent PID quantified using a secret key agreement rate naturally induces a directional interpretation of the PID. We further reveal a surprising connection between third-order connected information, two-way secret key agreement rate, and synergy. We also consider difficulties which arise with a popular PID measure in light of the results here as well as from a maximum entropy viewpoint. We close by reviewing the challenges facing the PID.
APA, Harvard, Vancouver, ISO, and other styles
25

Yılmaz, Hacı. "The concept of secret in Anatolian Alewism Anadolu Aleviliği’nde sır kavramı." Journal of Human Sciences 14, no. 2 (July 5, 2017): 2200. http://dx.doi.org/10.14687/jhs.v14i2.4692.

Full text
Abstract:
Groups embracing ideas that do not conform to the ideas prevalent in the society, may choose to keep some of their views secret from the rest of the society in order to avoid outside pressure. Alawites in the Islamic world have developed a similar reflex both to protect themselves from outside pressure and to maintain discipline within their own group. This paper tackles the notion of secret based on a passage found in the introduction of a Futuwwat Namah we came across in the Futuwwat Namah collection Number 8602 in the National Library Manuscripts Collection. The passage tells about how the Prophet disclosed to Ali some of the secrets he received during his dialogue with God in the Night of Ascension. Protecting this secret was deemed very important and although the nature of the secret is not to be found in any written or oral source, measures were taken to protect it from non-Alawites and penalties were set for those would reveal it. In this paper, the passage in question is transliterated in Modern Turkish Alphabet and presented to the reader. Also, there is a discussion of the nature of this secret and what this secret could be in the light of written Alawite sources namely Buyruks of Imam Jafar and Sheikh Safi and some modern works.Extended English abstract is in the end of PDF (TURKISH) file. ÖzetToplumun genel düşüncesi dışında fikirlere sahip olan gruplar dışarıdan gelebilecek baskılara maruz kalmamak için görüşlerinden en azından bazılarını toplumun diğer bireylerinden gizleme yoluna gitmişlerdir. İslam dünyasının içinde yer alan Aleviler hem kendilerini dış baskılardan koruyabilmek hem de kendi grup disiplinlerini sağlayabilmek adına bu yönde refleks geliştirmişlerdir. İşte bu araştırma, Milli Kütüphane Yazmaları arasında 8602 numaralı Fütüvvetname Mecmuası’nda yer alan bir fütüvvetnamenin baş kısmındaki Hz. Peygamber’in Miraç’ta Tanrı ile konuşmalarından bir kısmını Hz. Ali’ye sır olarak verilmesini anlatan bölümden hareketle Alevilikteki sır kavramı üzerinde durmaktadır. Başkalarından gizlenmesine büyük önem verilen sırrın mahiyeti ne sözlü ne de yazılı kaynaklarda yer almamasına rağmen, Alevi olmayanlardan bunların korunması hususunda bazı tedbirler alınmış, hatta sırrı açıklayanlar için bazı cezalar öngörülmüştür. Burada hem bahsedilen kısım Türkçeye aktarılarak okuyucuya sunulmuş hem de Aleviliğin yazılı kaynakları olan İmam Cafer ve Şeyh Safi Buyrukları başta olmak üzere modern çalışmalar ışığında sırrın mahiyeti tartışılmıştır.
APA, Harvard, Vancouver, ISO, and other styles
26

Kreilkamp, Ivan. "Meat, Flesh, Skin: The Carnality Of The Secret Agent." Studies in the Novel 56, no. 1 (March 2024): 21–40. http://dx.doi.org/10.1353/sdn.2024.a921057.

Full text
Abstract:
Abstract: This essay considers Conrad’s novel The Secret Agent in relation to what I will suggest are several relevant intertexts or sources for it—including Upton Sinclair’s famous muckraking 1906 exposé of the conditions in the Chicago stockyards, The Jungle , as well as Classical mythological tales depicting “cannibal feasts.” I point to these sources in order to argue that Conrad uses the novel to consider the question of the overlap between the direct violence of terrorism and the less direct violence of meat production. The novel, I suggest, can be read as an extended meditation on the embodied nature of human flesh.
APA, Harvard, Vancouver, ISO, and other styles
27

Ownby, David. "The Heaven and Earth Society as Popular Religion." Journal of Asian Studies 54, no. 4 (November 1995): 1023–46. http://dx.doi.org/10.2307/2059958.

Full text
Abstract:
The profound disdain with which most governments—Qing, Republican, Communist, or, in the case of Southeast Asia, colonial—have treated Chinese secret societies, as well as the undeniable involvement of many of these societies in violent and criminal activities, have obscured the religious elements at the core of the early Heaven and Earth Society (Tiandihui), the most widespread and well-known of Chinese secret societies. The vast historiography treating Chinese secret societies, often grounded in documents produced by hostile governments, has in large measure reproduced the image of secret societies contained in these documents, even if not all scholars have embraced the moral and legal assumptions of their sources. Consequently, society practices and symbols which would be treated as religious in other contexts are frequently dismissed as epiphenomenal or “esoteric” (Stanton 1900, 9; Morgan I960, 5), or as functional means of unifying “dissident” groups (Yang 1961, 61–64).
APA, Harvard, Vancouver, ISO, and other styles
28

Matveev, Ivan, and Ilia Safonov. "From Iris Image to Embedded Code: System of Methods." Algorithms 16, no. 2 (February 6, 2023): 87. http://dx.doi.org/10.3390/a16020087.

Full text
Abstract:
Passwords are ubiquitous in today’s world, as are forgetting and stealing them. Biometric signs are harder to steal and impossible to forget. This paper presents a complete system of methods that takes a secret key and the iris image of the owner as input and generates a public key, suitable for storing insecurely. It is impossible to obtain source data (i.e., secret key or biometric traits) from the public key without the iris image of the owner, the irises of other persons will not help. At the same time, when the iris image of the same person is presented the secret key is restored. The system has been tested on several iris image databases from public sources. It allows storing 65 bits of the secret key, with zero possibility to unlock it with the impostor’s iris and 10.4% probability to reject the owner in one attempt.
APA, Harvard, Vancouver, ISO, and other styles
29

Amidon, Debra M. "Dialogue with Customers: Secret to Innovation Strategy." International Journal of Innovation Management 01, no. 01 (March 1997): 73–87. http://dx.doi.org/10.1142/s136391969700005x.

Full text
Abstract:
Enterprises are discovering a rededication to customers in ways rarely practised other than by the entrepreneurial firm. However, quality and restructuring methodologies have returned executives to their own raison d'etre by positioning customers at the heart of business survival. At the same time, cross-boundary alliances are demanding new partnering techniques with all stakeholders, including customers. New initiatives are commonplace, but are generally without an understanding that something is fundamentally different between customer satisfaction and the success of your customers. This article introduces the concepts in ways that are easily practised. Simply stated, treat your customers as sources of knowledge, not someone to whom you solely deliver products and services. By practising value-system (rather than value-chain) strategies, companies can take advantage of the business opportunities afforded by a collaborative economy. Similarly, by defining Strategic Business Network (SBN's) rather than Strategic Business Units (SBU's), companies can leverage all available knowledge sources. Most importantly, a symbiotic relationship with consumers, customers or clients can help a company envision products and services for unarticulated needs and unserved markets. Companies which are practising new ways of interfacing with customers are realising significant business results. A profile of customer innovation at Steelcase North America provides an illustration of this new partnering relationship.
APA, Harvard, Vancouver, ISO, and other styles
30

Kara, György. "On some sources of Sagang Sechen’s Teachings (1662)." Acta Orientalia Academiae Scientiarum Hungaricae 73, no. 4 (December 17, 2020): 603–15. http://dx.doi.org/10.1556/062.2020.00031.

Full text
Abstract:
AbstractNine of the seventy-nine alliterative quatrains of Sagang Sechen’s great gnomic poem are revisited, their possible literary sources suggested, their interpretation revised. Seven of them go back, entirely or partially, to Sa-skya Paṇḍita’s Subhāṣitaratnanidhi, one to the Janapoṣanabindhu, one of Nāgārjuna’s nītiśāstras, and one uses a comparison known from the Secret History. Parallels are quoted from Sonom Gara’s and the Oirat Zaya Paṇḍita’s prose translations of the Subhāṣitaratnanidhi. Also discussed are the rare word küčigei and the possible identity of Sonom Gara and Suonanqilo.
APA, Harvard, Vancouver, ISO, and other styles
31

Ettinger, David. "Sources: Spies, Wiretaps, and Secret Operations: An Encyclopedia of American Espionage." Reference & User Services Quarterly 51, no. 1 (September 1, 2011): 82. http://dx.doi.org/10.5860/rusq.51n1.82.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Levchenko, I., А. Firsov, L. Snigur, and E. Ivanchenko. "PERFECTION OF METHODOLOGY OF ESTIMATION OF EFFICIENCY OF SUBSYSTEM OF REARWARD SECRET SERVICE IN THE SEPARATE MECHANIZED BRIGADE DURING CONDUCT OF BATTLE ACTIONS." Collection of scientific works of Odesa Military Academy 2, no. 14 (January 25, 2021): 156–63. http://dx.doi.org/10.37129/2313-7509.2020.14.2.156-163.

Full text
Abstract:
In the article the improved methodology of evaluation of efficiency of subsystem of rearward secret service offers in the separate mechanized brigade that can be used for the evaluation of efficiency of the system of the rearward providing of the separate mechanized brigade during the conduct of battle actions. On efficiency of implementation of tasks from rearward secret service basic influence is carried out degree of full strength by the personnel of group of rearward secret service and their knowledge on speciality, organization of connection with a senior chief, realization of order in relation to realization of rearward secret service, the state of transport vehicles on that comes true rearward secret service, terms, season, daypart. All of it can carry out substantial influence on implementation of tasks from rearward secret service. The improved methodology of evaluation of efficiency of subsystem of rearward secret service is given in the separate mechanized brigade that can be used for the evaluation of efficiency of the system of the rearward providing of the separate mechanized brigade during the conduct of battle actions. During research of process of the rearward providing of troops an important theoretical and practical task is an estimation of efficiency of subsystem of rearward secret service in the separate mechanized brigade during the conduct of battle actions. The certain going near the decision of this task were worked out in a number of sources. However, experience of anti-terror operation on territory Donetsk and Luhansk areas, other armed conflicts of the last decades testifies to the necessity of perfection of methodology of estimation of efficiency of subsystem of rearward secret service that would take into account changes in requirements to the subsystem of rearward secret service in the separate mechanized brigade during, and promoted efficiency of the system of the rearward providing on the whole. Keywords: separate mechanized brigade, rearward providing, efficiency of subsystem rearward secret service, reconnaissance group, method of expert evaluation, objects of rearward secret service.
APA, Harvard, Vancouver, ISO, and other styles
33

Sekga, Comfort, and Mhlambululi Mafu. "Tripartite Quantum Key Distribution Implemented with Imperfect Sources." Optics 3, no. 3 (June 21, 2022): 191–208. http://dx.doi.org/10.3390/opt3030019.

Full text
Abstract:
Multipartite quantum key distribution (QKD) is a promising area of quantum networks that provides unconditional secret keys among multiple parties, enabling only legitimate users to decrypt the encrypted message. However, security proofs of existing multipartite QKD typically assume perfect state preparation devices of legitimate users and neglect the relative rotation of reference frames. These presumptions are, nevertheless, very difficult to meet in practice, and thus the security of current multipartite QKD implementations is not guaranteed. By combining the idea of a loss tolerant technique, introduced by Tamaki et al. (K. Tamaki et al., Phys. Rev. A, 90, 052314, 2014), and the concept of a reference frame-independent protocol, we propose a three-party QKD protocol that considers state preparation flaws and the slow drift of reference frames. Through a numerical simulation, the influence of misaliged reference frames on the protocol’s stability was examined by drifting reference frames through angles β=π/5, β=π/6 and β=π/7. In addition, the performance of the proposed protocol was examined for the encoding flaws set at δ=0.35, δ=0.20, and δ=0.10. The results show that the protocol is robust against state preparation flaws, and is insignificantly impacted by misalignment of the reference frames because the achieved transmission distances and secret key rates are comparable to the perfect scenarios. This work dramatically contributes toward the realization of practical and secure multipartite QKD. The proposed protocol has direct applications in quantum communication network environments that involve unknown and slowly varying reference frames, web conferences, and online communications.
APA, Harvard, Vancouver, ISO, and other styles
34

Kinsella, Helen M. "Sex as the secret: counterinsurgency in Afghanistan." International Theory 11, no. 1 (December 18, 2018): 26–47. http://dx.doi.org/10.1017/s1752971918000210.

Full text
Abstract:
AbstractI explore the construction of women as the secret for the ‘successful’ prosecution of war in Afghanistan. To do so, I take up the mobilization of gender in the US counterinsurgency doctrine as deployed in Afghanistan. I draw on the 2006 Counterinsurgency Field Manual, human rights and humanitarian reports, and scholarly works to identify and analyze this mobilization, paying attention to the colonial histories upon which COIN explicitly and implicitly relies. By critically integrating these sources and the paradigmatic moments that exemplify COIN, I demonstrate the constitutive relationship of gender and COIN. The valence of the secret – of women as concealing, revealing, being, and bearing the secret – is still a lesser explored element in the analysis of the gendering of COIN and of its ‘military orientalism’. Even as scholars have powerfully shown how, in the case of Afghanistan and elsewhere, the veil functions as an overdetermined and ‘multilayered signifier’ in its own right, symbolizing the ‘tension between disclosure and concealment that defines the dominant conception of the secret’, less subject to detailed analysis in case of Afghanistan is the ways in which Afghan women are constituted through COIN in polysemous relation to the notion of the secret.
APA, Harvard, Vancouver, ISO, and other styles
35

Van Netten, Djoeke. "Spaces on Ships." TSEG - The Low Countries Journal of Social and Economic History 18, no. 3 (November 29, 2021): 107–24. http://dx.doi.org/10.52024/tseg.11044.

Full text
Abstract:
Djoeke van Netten examines the interplay between privacy and secrecy in the ships of the Dutch East India Companies (1595-1799). Space aboard a ship was scarce and privacy a rare privilege. Netten starts with a discussion of the sources available as well as those lost to history. She then continues by examining what can be known about the protection of and access to (secret) information and (private) belongings aboard ships. Cases where privacy was violated and secrets revealed emerge as some of the most informative historical events to be examined in this context. As she confronts her historical examples with relevant theoretical and historiographical concepts, she concludes by raising important questions for further research on privacy and secrecy aboard ships.
APA, Harvard, Vancouver, ISO, and other styles
36

Makarov, A. V., N. Yu Gusevskaya, and A. S. Petrov. "Counteraction to High Treason in Russian Legislation of the Second Half of the 19th — Early 20th Centuries." Nauchnyi dialog, no. 1 (January 27, 2021): 337–56. http://dx.doi.org/10.24224/2227-1295-2021-1-337-356.

Full text
Abstract:
The problem of improving the criminal liability of the subjects of the Russian Empire at the end of the nineteenth century for espionage and spilling state secrets to a foreign state is considered. The relevance of the study is due to the importance of the problem under study for the effective functioning of the Russian state. The study is based on historical sources of a regulatory and legal nature and is interdisciplinary in nature. Particular attention is paid to the study of legal norms, the identification of the type and amount of punishments for the commission of espionage by Russian citizens and spilling the state secrets to a foreign state. It is indicated that in the second half of the 19th century, the intensity of intelligence of foreign secret services in the territory of the Russian Empire increased. It is noted that more and more often foreign powers involved Russian subjects in the process of obtaining Russian secrets. At the same time, the analysis of the sources made it possible to reveal a sufficient limitation of the institution of counteracting espionage and disclosure of state secrets to foreign states in the Russian Empire at the end of the 19th century. It is proved that it was precisely these phenomena at the end of the 19th and the beginning of the 20th centuries that determined the authorities’ desire to progressively improve legal mechanisms that counteract threats and challenges to national security.
APA, Harvard, Vancouver, ISO, and other styles
37

Kruglyakov, Sergey V. "Realization of the Socio-Legal Function by Appointed Advocate in Criminal and Civil Cases Involving State Secrets." Общество: политика, экономика, право, no. 2 (February 21, 2024): 94–103. http://dx.doi.org/10.24158/pep.2024.2.10.

Full text
Abstract:
The article delves into the realization of the social and legal function of the appointed advocate in criminal and civil proceedings in cases involving state secrets, as well as problematic issues and liability that may occur in case of its divulgence. The relevance of the research topic is that in Russia there is an increase in the number of convictions under Article 283 of the Criminal Code of the Russian Federation – disclosure of state secrets. In addition, the article discusses theoretical issues, the relationship between attorney-client privilege and state secrets, and provides examples from judicial practice. From a certain angle, the author is convinced that it is necessary to investigate the issue of the advocate’s activity on appointment in criminal and civil cases, in which there is a state secret, in order to further develop recommendations for advocates. The formal legal method, the method of comparative analysis, synthesis, the inductive method, generalization and systematization of scientific sources on the research problem, comparative and predictive methods were used.
APA, Harvard, Vancouver, ISO, and other styles
38

Beglov, Alexey. "Special Services and Religious Organizations in the Soviet State: Collaboration Mechanisms, Survival Strategies, Sources." ISTORIYA 13, no. 6 (116) (2022): 0. http://dx.doi.org/10.18254/s207987840021686-3.

Full text
Abstract:
In this article the authors formulate generalizing observations on the mechanisms of interaction between the Soviet secret services and religious communities in the USSR during the whole period of its existence. The basis for these generalizations was the research of the past thirty years as well as the materials of the international symposium “Special Services and Religious Organizations in the Soviet State: Collaboration Mechanisms, Survival Strategies, Sources” held by the Centre for the Study of the History of Religion and Church History at the Department of Modern and Contemporary History, Institute of World History, Russian Academy of Sciences, on 27—28 October 2021. Infiltration and a complex operational game involved the control and instrumentalization rather than destruction of even those religious communities whose existence was considered unacceptable in the USSR. Instead of the declared reduction of the influence of religious organizations, cooperation was indirectly helping to stabilize their position and even increase the influence of their leaders. On the part of the believers, cooperation with the secret services proved to be a complex survival strategy both at the micro level (parish, congregation, group) and at the institutional level. In light of these observations, the authors raise the question of the need to develop analytical criteria for cooperation, based on a comprehensive and qualitative analysis of case-by-case information, rather than formal criteria (the presence or absence of a cooperation agreement). In addition, the authors draw attention to the change in the position of the researcher, who is no longer an “unmasker” of the hierarchs and laity who collaborated with the special services. Here, the question of ethical norms and the research tools of the historian working with the documents of the secret services arises with new urgency.
APA, Harvard, Vancouver, ISO, and other styles
39

Kozák, Jan A. "A Minister to the Secret Fire: Pavel Hošekʼs take on J. R. R. Tolkien (review)." CENTRAL EUROPEAN JOURNAL FOR CONTEMPORARY RELIGION 4, no. 1 (April 11, 2022): 71–75. http://dx.doi.org/10.14712/25704893.2021.4.

Full text
Abstract:
Book review on Hošek, Pavel, Sloužím Tajnému ohni: Duchovní zdroje literární tvorby J.R.R. Tolkiena [I Am a Servant of Secret Fire: Spiritual Sources of J.R.R. Tolkien’s Literary Work], Brno: Centrum pro studium demokracie a kultury 2019, 191 p.
APA, Harvard, Vancouver, ISO, and other styles
40

NOGAJ, Adam. "TECHNICAL SOURCES OF OBTAINING INTELLIGENCE INFORMATION." Scientific Journal of the Military University of Land Forces 162, no. 4 (October 1, 2011): 109–32. http://dx.doi.org/10.5604/01.3001.0002.3202.

Full text
Abstract:
The author presents the development of technologies used to obtain intelligence information – obviously in a considerable simplification and in brief – from the beginning to the end of the 20th century. The author emphasises the timeless importance of the scientific and technological revolution, which enables the introduction of new, previously unknown tools. The purpose of these tools along with the traditional spying methods, which have functioned for centuries and millennia, is to obtain information. The author claims that the technical measures of obtaining information were not the invention of World War II. Most technologies for obtaining intelligence information used during World War II had already been known and widely used during World War I. During this war fighting armies paid considerable attention to radio reconnaissance, especially one of its forms: crypto-analysis, i.e. decoding. In that period air reconnaissance, including air photography, was also widely used. Moreover, tools to eavesdrop the enemy’s telephone networks situated from 10 to 20 and even tens of kilometres away were also known. With the example of the Third Reich, the author presents a horrifying picture of the development of the technical sources of obtaining intelligence information for the structures of military intelligence, civilian intelligence and secret police typical of a totalitarian state attempting to control everyone and everything. Another example is the Soviet Army, which at the end of World War II had very well-developed technical structures for obtaining intelligence information and made plenty of effort to obtain it. The most considerable attention was devoted to technical reconnaissance measures possessed by Russian fronts.The final part of the article presents an outline of the most significant information related to the contemporary systems of obtaining intelligence information on the basis of the following intelligence: air, satellite, electronic, radio, radiolocation and information communications technology. The author proves that human sources of information have ceased to play a key role in the past decades. Moreover, he proves that for many decades major intelligence expenditure has been incurred on electronic intelligence by world powers. The secret ring is no longer the most important and has definitely ceased to be the only source of obtaining information on a potential foe.
APA, Harvard, Vancouver, ISO, and other styles
41

WATANABE, Shun, and Yasutada OOHAMA. "Secret Key Agreement from Correlated Gaussian Sources by Rate Limited Public Communication." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E93-A, no. 11 (2010): 1976–83. http://dx.doi.org/10.1587/transfun.e93.a.1976.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Xu, Yinfei, and Daming Cao. "Secret Key Generation From Vector Gaussian Sources With Public and Private Communications." IEEE Transactions on Information Theory 67, no. 8 (August 2021): 5420–31. http://dx.doi.org/10.1109/tit.2021.3086536.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Duclert, Vincent. "Des archives pour Dreyfus. Du secret des dossiers � la transparence des sources." Sigila N�25, no. 1 (2010): 151. http://dx.doi.org/10.3917/sigila.025.0151.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Watanabe, S., and Y. Oohama. "Secret Key Agreement From Vector Gaussian Sources by Rate Limited Public Communication." IEEE Transactions on Information Forensics and Security 6, no. 3 (September 2011): 541–50. http://dx.doi.org/10.1109/tifs.2011.2132130.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Boche, H., and G. Janßen. "Distillation of secret-key from a class of compound memoryless quantum sources." Journal of Mathematical Physics 57, no. 8 (August 2016): 082201. http://dx.doi.org/10.1063/1.4960217.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Izzo, Massimo. "The Origin of The Secret of the Golden Flower: Sources and Translations." Journal of Daoist Studies 16, no. 1 (2023): 81–104. http://dx.doi.org/10.1353/dao.2023.0004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Wang, Di. "Heroic Mother and Wise Wife." Inner Asia 23, no. 2 (November 18, 2021): 212–32. http://dx.doi.org/10.1163/22105018-12340172.

Full text
Abstract:
Abstract Thirteenth-century sources provide us with striking images of Mongol noblewomen, which are not eclipsed by the heroic conquests and military exploits of their men. While recognising the complexity of gender roles in pre-imperial Mongol society, this article aims to explore the specific responsivities carried by Hö’elün and Börte in the narrative of The Secret History of the Mongols. The selective presentation of their characters and duties further reveals the goal of the Secret Historian to create a ruling model, which includes a brave widowed mother and an intelligent wife for the Qan of the empire.
APA, Harvard, Vancouver, ISO, and other styles
48

SEMENIUK, O. "Criminological analysis of threats in the sphere of protection of state secrets." INFORMATION AND LAW, no. 2(17) (June 29, 2016): 106–13. http://dx.doi.org/10.37750/2616-6798.2016.2(17).272909.

Full text
Abstract:
This article presents the analysis of the external and internal threats in the sphere of protection of state secret, distinguishes sources and carriers of such threats, considers motivation of illegal activity to the detriment of Ukraine and mechanisms of its formation.
APA, Harvard, Vancouver, ISO, and other styles
49

Chan, Alfred L., and Andrew J. Nathan. "The Tiananmen Papers Revisited." China Quarterly 177 (March 2004): 190–214. http://dx.doi.org/10.1017/s0305741004000116.

Full text
Abstract:
Authentic Chinese internal documents matter greatly as historical records that illuminate our understanding of Chinese politics. Yet careful scrutiny shows that the Chinese book version of the Tiananmen Papers is part fiction and part documentary history based on open and semi-open sources and document collections. The alleged transcripts of top-level meetings are basically stitched together ex post facto (even by the admission of the editors) and then presented as secret documents. Furthermore, the English translation is a heavily retouched version of the Chinese with differences in claims of authenticity, translation, citation and style. There is little evidence that any real secret documents are in the hands of the Chinese author, and even if they were, the two books under consideration are really secondary sources steps removed from the originals. The editors strongly vouch for the authenticity of these two books, but their efforts are inadequate and unconvincing.
APA, Harvard, Vancouver, ISO, and other styles
50

Veszprémy, Márton. "Astrologers and the Hungarian State Security Agency." Polish Journal of the Arts and Culture New Series, no. 17 (1/2023) (May 2023): 53–67. http://dx.doi.org/10.4467/24506249pj.23.004.18997.

Full text
Abstract:
The history of astrology in twentieth-century Hungary has not yet been a subject of research. Consequently, the attitude of Hungarian state security agency towards astrologers and astrology during the communist era is unknown – especially since the files of agents have not been made public in Hungary. In the present article, I examine the question through the cases of Sándor Raisz, András László, Zoltán Lemhényi and Viktor Juhász-Schlatter, using sources preserved in the Historical Archives of the Hungarian State Security Services (Állambiztonsági Szolgálatok Történeti Levéltára). I conclude that the secret service was only interested in astrologers because they met regularly with their students, all regular and secret meetings being politically suspicious. Astrology as an illegal activity or a subject of contempt only appears in sources from the 1980s. All the astrologers discussed in my article were in one way or another opposed to the ruling communist regime. Part of the reason for this is that astrology was a popular intellectual, middle-class activity in the Horthy era, and representatives of this stratum were considered enemies of the regime after 1945. Also, the communist system represented an avowedly materialist ideology, while astrology flourished primarily among those interested in mysticism, theosophy and anthroposophy. The picture that emerges from the sources is that astrology classes were not overtly political, but their participants were nevertheless bound together by the knowledge that they were listening to forbidden, secret teachings. In this respect, astrology can be classified as counterculture in the era. The topic also offers a valuable insight into the overlapping subcultures in twentieth-century Hungary.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography