Literatura académica sobre el tema "Partage de secrets"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Partage de secrets".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Partage de secrets":
Moatti, Michel. "Images de l’undernet : secrets et partage sur le réseau mondial". Questions de communication, n.º 6 (1 de diciembre de 2004): 247–64. http://dx.doi.org/10.4000/questionsdecommunication.6159.
Le Bouquin, Anne-Sophie. "Les secrets de réussite de la gestion de la connaissance : des témoignages pour vous guider". I2D - Information, données & documents 1, n.º 1 (19 de julio de 2023): 61–66. http://dx.doi.org/10.3917/i2d.231.0061.
Harpin, Tina. "La violence et la culpabilité en partage : le destin national du thème de l’inceste dans la fiction sud-africaine". Études littéraires africaines, n.º 38 (16 de febrero de 2015): 19–30. http://dx.doi.org/10.7202/1028671ar.
Merzeau, Louise. "Partager ses secrets en public". Médium 37-38, n.º 4 (2013): 153. http://dx.doi.org/10.3917/mediu.037.0153.
Ecrement, Dominique. "Secret médical partagé, secret social partagé : une possibilité ou une obligation ?" Vie sociale 3, n.º 3 (2007): 123. http://dx.doi.org/10.3917/vsoc.073.0123.
Verdier, Pierre. "Secret professionnel et partage des informations". Journal du droit des jeunes 269, n.º 9 (2007): 8. http://dx.doi.org/10.3917/jdj.269.0008.
Bazin, Jean-Étienne. "Un secret “partagé” n’est plus un secret". Oxymag 30, n.º 153 (marzo de 2017): 1. http://dx.doi.org/10.1016/j.oxy.2017.03.001.
Agrali, Sibel. "Le secret professionnel et le partage d’informations". Mémoires N° 69, n.º 1 (1 de marzo de 2017): 8–9. http://dx.doi.org/10.3917/mem.069.0008.
Grangé, Ninon. "Le secret, un partage baroque du politique". Rue Descartes N°98, n.º 2 (2020): 14. http://dx.doi.org/10.3917/rdes.098.0014.
Ratier, Francis. "Part secrète et secret partagé". Empan 103, n.º 3 (2016): 107. http://dx.doi.org/10.3917/empa.103.0107.
Tesis sobre el tema "Partage de secrets":
Qian, Liqin. "Contributions to the theory of algebraic coding on finite fields and rings and their applications". Electronic Thesis or Diss., Paris 8, 2022. http://www.theses.fr/2022PA080064.
Algebraic coding theory over finite fields and rings has always been an important research topic in information theory thanks to their various applications in secret sharing schemes, strongly regular graphs, authentication and communication codes.This thesis addresses several research topics according to the orientations in this context, whose construction methods are at the heart of our concerns. Specifically, we are interested in the constructions of optimal codebooks (or asymptotically optimal codebooks), the constructions of linear codes with a one-dimensional hull, the constructions of minimal codes, and the constructions of projective linear codes. The main contributions are summarized as follows. This thesis gives an explicit description of additive and multiplicative characters on finite rings (precisely _\mathbb{F}_q+u\mathbb{F}_q~(u^2= 0)s and S\mathbb{F}_q+u\mathbb{F}_q~(u^2=u)S), employees Gaussian, hyper Eisenstein and Jacobi sums and proposes several classes of optimal (or asymptotically optimal) new codebooks with flexible parameters. Next, it proposes(optimal or nearly optimal) linear codes with a one-dimensional hull over finite fields by employing tools from the theory of Gaussian sums. It develops an original method to construct these codes. It presents sufficient conditions for one-dimensional hull codes and a lower bound on its minimum distance. Besides, this thesis explores several classes of (optimal for the well-known Griesmer bound) binary linear codes over finite fields based on two generic constructions using functions. It determines their parameters and weight distributions and derives several infinite families of minimal linear codes. Finally, it studies (optimal for the sphere packing bound) constructions of several classes of projective binary linear codes with a few weight and their corresponding duals codes
Huysmans, Guillaume. "Partage de secret : integrite, performances et applications". Aix-Marseille 2, 1998. http://www.theses.fr/1998AIX22032.
Kaced, Tarik. "Partage de secret et théorie algorithmique de l'information". Phd thesis, Université Montpellier II - Sciences et Techniques du Languedoc, 2012. http://tel.archives-ouvertes.fr/tel-00763117.
Kaced, Tarik. "Partage de secret et théorie algorithmique de l'information". Thesis, Montpellier 2, 2012. http://www.theses.fr/2012MON20170/document.
Our work deals with secret sharing in the theoretical point of views of Shannon's Information Theory and Kolmogorov's Algorithmic Information Theory. We are going to explain how these three subjects are naturally deeply intertwined.Information inequalities play a central role in this text. They are the inequalities for Shannon entropy, but also they are in exact correspondence with the inequalities for Kolmogorov complexity. Kolmogorov complexity formalizes the idea of randomness for strings.These two reasons alone justify to consider the notion of secret sharing in the Algorithmic framework (if one can share a random secret one can share anything).Originally, secret sharing was first studied under the combinatorial lens, only later was it more generally formalized using information-theoretic measures. This step allowed the use of information inequalities which revealed to bevery important to understand the existence of secret-sharing schemes with respect to efficiency.The investigation of information inequalities is at its debut. We contribute to the subject by introducing the notion of essentially conditional inequalities, which shows once again that information inequalities are yet not fully understood
Zorn, Caroline. "Données de santé et secret partagé : pour un droit de la personne à la protection de ses données de santé partagées". Thesis, Nancy 2, 2009. http://www.theses.fr/2009NAN20011.
The medical professional secret is a legal exception to the professional secret; it allows a patient's caregivers to exchange health information that is relevant to that patient's care without being punished for revealing confidential information. That caregivers discuss patient's health information with other medical professional involved in that patient's care is to the benefit of the patient. Nonetheless, there is a fine balance to be struck between a "need to know" professional exchange of information, which is essential to care of the patient, and a broad exchange of information, which may ultimately comprise the confidentiality of the patient's private life. The emergence of an electronic tool, which multiplies the potential possibilities for data exchange, further disrupts this balance. Consequently, the manipulation of this shared health information must be subject to the medical professional secret, the "Informatique et Libertés" legislation, and all of the numerous norms and standards as defined by the French national electronic medical record (DMP), the pharmaceutical medical record (Dossier pharmaceutique), or the reimbursement repository (Historique des remboursements). As the patient's health information is increasingly shared between health care providers - through means such as the DMP or DP - the patient's right and ability to control the access to his/her health information have to become more and more important. A study regarding the importance of obtaining the patient's consent lead to the following proposal: to inscribe in the French Constitution the patient's right to confidentiality regarding health information
Breton-Rahali, Céline. "Le secret professionnel et l’action médico-sociale". Thesis, Université de Lorraine, 2014. http://www.theses.fr/2014LORR0355.
Professional confidentiality, understood as the obligation not to reveal certain information, is the subject of a number of exceptions. Its study within the particular context of specialised institutions reveals a number of issues. First, professionals working together from different disciplines are each subject to a different patchwork of applicable standards. As a result, it is necessary to clarify these rules, both within the interests of professionals and health-care users. Second, the effectiveness of patient care requires coordination between different professionals based upon shared confidentiality within the same department or health-care centre. Collaboration between professionals is an issue not only affecting the quality of care but also one of economics which allows for the effective management of the supply of health and social care within a given area. As a major challenge of public health policy, such coordination provokes a consideration of the adaptation of the existing legal framework and that of the organisation of the means of sharing confidential patient information within the health care system as a whole for both medical and social care services. This thesis makes a proposal for the necessary amendments to the current legislative framework for derogating from the general principle of confidentiality to allow for an exchange of information between professionals involved in the care of a patient. The evolution of shared confidentiality for the benefit of the patient requires an emphasis upon determining the most highly protective regime for patients without compromising the reality – and constraints – of providing effective health care
Renner, Soline. "Protection des algorithmes cryptographiques embarqués". Thesis, Bordeaux, 2014. http://www.theses.fr/2014BORD0057/document.
Since the late 90s, the implementation of cryptosystems on smart card faces two kinds of attacks : side-channel attacks and fault injection attacks. Countermeasures are then developed and validated by considering a well-defined attacker model. This thesis focuses on the protection of symmetric cryptosystems against side-channel attacks. Specifically, we are interested in masking countermeasures in order to tackle high-order attacks for which an attacker is capable of targeting t intermediate values. After recalling the analogy between masking countermeasures and secret sharing schemes, the construction of secret sharing schemes from linear codes introduced by James L. Massey in 1993 is presented.By adapting this construction together with tools from the field of Multi-Party Computation, we propose a generic masking countermeasure resistant to high-order attacks. Furthermore, depending on the cryptosystem to protect, this solution optimizes the cost of the countermeasure by selecting the most appropriate code. In this context, we propose two countermeasures to implement the AES cryptosystem. The first is based on a family of evaluation codes similar to the Reed Solomon code used in the secret sharing scheme of Shamir. The second considers the family of self-dual and self-orthogonal codes generated by a matrix defined over GF(2) or GF(4). These two alternatives are more effective than masking countermeasures from 2011 based on Shamir's secret sharing scheme. Moreover, for t=1, the second solution is competitive with usual solutions
Brasselet, Renato. "La circulation de la donnée à caractère personnel relative à la santé : disponibilité de l’information et protection des droits de la personne". Thesis, Université de Lorraine, 2018. http://www.theses.fr/2018LORR0333/document.
Health, m-health and self quantification connect the body and disrupt the traditional model of care. They are moving it from curative and monopoly medicine to preventive medicine and taking a WHO-defined approach to health. By this means, the person is no longer simply placed at the center of the care device he becomes one of the actors including in the intimacy of his privacy.On the other hand, in search of the realization of economy but also of quality, the health system, has mutated, under the effect of the deployment of e-health. As a result, it is now substantially landscaped and can no longer be synthesized into the classic dichotomy between health and social medicine. The vector and resultant of this phenomenon consists in the circulation of health information. From now on, it has become largely digital and essential for the care and functioning of the healthcare system. The care is now conceived around categorical and inter-categorical exchange and sharing, even man-machine or machine-machine and no longer on a medicine based on secrecy. The Man who has become a homo Numericus is not without all rights and privacy. Law and techno-law are part of this scholarly game, the slightest inconsistent reform of which could upset its precarious balance
Smith, Guillaume. "Concevoir des applications temps-réel respectant la vie privée en exploitant les liens entre codes à effacements et les mécanismes de partages de secrets". Thesis, Toulouse, ISAE, 2014. http://www.theses.fr/2014ESAE0045/document.
Data from both individuals and companies is increasingly aggregated and analysed to provide new and improved services. There is a corresponding research effort to enable processing of such data in a secure and privacy preserving way, in line with the increasing public concerns and more stringent regulatory requirements for the protection of such data. Secure Multi-Party Computation (MPC) and secret sharing are mechanisms that can enable both secure distribution and computations on private data. In this thesis, we address the inefficiencies of these mechanisms by utilising results from a theoretically related rich area, erasure codes. We derive links between erasure codes and secret sharing, and use Maximum Distance Separable (MDS) codes as a basis to provide real-time applications relying on private user's data, revealing this data only to the selected group (which can be empty). The thesis has three contributions. A new class of erasure code called on-the-fly coding, have been introduced for their improvements in terms of recovery delay and achievable capacity. However little is known about the complexity of the systematic and non-systematic variants of this code, notably for live multicast transmission of multimedia content which is their ideal use case. The evaluation of both variants demonstrate that the systematic code outperforms the non-systematic one in regard to both the buffer sizes and the computation complexity. Then, we propose a new Layered secret sharing scheme and its application to Online Social Network (OSN). In current OSN, access to the user's profile information is managed by the service provider based on a limited set of rules. The proposed scheme enables automated profile sharing in OSN's groups with fine grained privacy control, via a multi-secret sharing scheme comprising of layered shares, without relying on a trusted third party. We evaluate the security of the scheme and the resulting profile's level of protection in an OSN scenario. Finally, after showing that erasure codes are efficient for real-time applications and that the security offered by secret sharing schemes can be applied to real-case applications, we derive the theoretical links between MDS codes and secret sharing to enable the implementation of efficient secret sharing scheme built from MDS codes. To illustrate this efficiency, we implement two of these schemes and evaluate their benefits in regard to computation and communication costs in an MPC application
Beugnon, Sébastien. "Sécurisation des maillages 3D pour l'industrie de la chaussure et la maroquinerie". Thesis, Montpellier, 2019. http://www.theses.fr/2019MONTS097.
With the increase of data exchange and latest technological and social developments, multimedia contents are becoming an important part of global trafic. Today, 3D objects are used in a large number of applications, for example, medical applications, simulations, video games, animation and special effects. 3D object usage by the general public has become a lucrative market that can take the form of 3D object downloading platforms with various 3D formats.This thesis, in collaboration with the company STRATEGIES, concerns the 3D object protection, and more particularly 3D meshes against fradulent and illegal uses. These 3D meshes represent surface models of shoes and leather goods produced by customers using digital solutions proposed by STRATEGIES. First, we propose a new method to insert secret data much more efficiently in terms of execution time on very large meshes than the previous method developed in collaboration with the company STRATEGIES. We are also exploring selective encryption approaches to control access to very high quality content according to user needs. In this context, we propose to use selective encryption approaches on the geometric data of 3D objects in order to protect the visual content of these objects according to different use cases and different data representations.In a second research axis, we study the application of secret sharing methods to the domain of 3D objects. Secret sharing is an approach that seeks to divide secret content between multiple users and allows certain subgroups of users to reconstruct the secret. Secret sharing is a redundancy system that allows you to reconstruct the secret even if some users have lost their information. Secret 3D object sharing is a poorly researched domain used to protect a 3D object between collaborators. We propose new secret 3D object sharing methods using selective encryption approaches and providing hierarchical properties where users have different access rights to 3D content based on their position in a hierarchical structure.Finally, the third research axis developed in this thesis deals with the analysis of the visual confidentiality of 3D objects selectively encrypted more or less strongly. Indeed, depending on the scenario, our 3D selective encryption methods provide results that can be more or less recognizable by users. However, the metrics used to evaluate the quality of 3D objects do not distinguish two selectively encrypted 3D objects with different levels of confidentiality. So, we present the construction of a databse of selectively encrypted 3D objects in order to realize subjective assessments of visual confidentiality and try to build a new metric correlated with evaluations obtained by the human visual system
Libros sobre el tema "Partage de secrets":
Neil, Barbara. Secrets partagés. Paris: J'ai lu, 2001.
Zorn-Macrez, Caroline. Données de santé et secret partagé: Pour un droit de la personne à la protection de ses données de santé partagées. Nancy: Presses universitaires de Nancy, 2010.
Dumas, Roland. Coups et blessures: 50 ans de secrets partagés avec François Mitterrand. Paris: Cherche midi, 2011.
Clarke, Cat. Cruelles [un secret trop horrible à partager, trop lourd à garder]: Roman. Paris: R. Laffont, 2013.
Eberhardt, Christine. Les secrets d'iTunes et de l'iPod: [écoutez, mixez, partagez le meilleur de la musique!]. Paris: CampusPress, 2005.
Binet, Lise. La mise au secret du VIH-sida par les personnes atteintes et par les proches: Recension des écrits : stigmate, mise au secret, secret partagé et intervention psychosociale autour du secret. [Québec]: Université Laval, 1997.
Darbord, Bernard. Le partage du secret: Stratégies discursives, cultures du dévoilement et de l'occultation en Europe du Moyen Age à l'époque moderne. Paris: Colin, 2013.
Cimato, Stelvio. Visual cryptography and secret image sharing. Boca Raton, FL: Taylor & Francis, 2011.
Rutten, Mélanie. La forêt entre les deux. Nantes: MéMo, 2015.
Darbord, Bernard y Agnès Delage. Le partage du secret. Armand Colin, 2013. http://dx.doi.org/10.3917/arco.darb.2013.01.
Capítulos de libros sobre el tema "Partage de secrets":
BEUGNON, Sébastien, Pauline PUTEAUX y William PUECH. "Partage d’images et d’objets 3D secrets". En Sécurité multimédia 2, 279–312. ISTE Group, 2021. http://dx.doi.org/10.51926/iste.9027.ch8.
Hautcœur, Guiomar. "16 - Les secrets d’Amadís : réflexions sur la lecture du roman de chevalerie". En Le partage du secret, 366. Armand Colin, 2013. http://dx.doi.org/10.3917/arco.darb.2013.01.0366.
Thouret, Clotilde. "17 - Parler et ne rien dire. Secrets et partages du secret dans El vergonzoso en palaciode Tirso de Molina". En Le partage du secret, 378. Armand Colin, 2013. http://dx.doi.org/10.3917/arco.darb.2013.01.0378.
Darbord, Bernard y Agnès Delage. "Présentation". En Le partage du secret, 7. Armand Colin, 2013. http://dx.doi.org/10.3917/arco.darb.2013.01.0007.
Darbord, Bernard y Agnès Delage. "Présentation". En Le partage du secret, 13. Armand Colin, 2013. http://dx.doi.org/10.3917/arco.darb.2013.01.0013.
Abbes, Makram. "1 - Le secret dans les Miroirs des princes andalous (Xe-XVe siècles)". En Le partage du secret, 17. Armand Colin, 2013. http://dx.doi.org/10.3917/arco.darb.2013.01.0017.
Fabre, Gilbert. "2 - « Conseiller » et « détenir un secret » en espagnol médiéval". En Le partage du secret, 44. Armand Colin, 2013. http://dx.doi.org/10.3917/arco.darb.2013.01.0044.
Heusch, Carlos. "3 - Écrire dans le secret : la tradition médiévale du savoir caché". En Le partage du secret, 78. Armand Colin, 2013. http://dx.doi.org/10.3917/arco.darb.2013.01.0078.
Biaggini, Olivier. "4 - L’évidence et le secret : sur l’exemple 32 duConde Lucanor". En Le partage du secret, 97. Armand Colin, 2013. http://dx.doi.org/10.3917/arco.darb.2013.01.0097.
Darbord, Bernard. "5 - Le secret dans les contes etexempladu Moyen Âge espagnol". En Le partage du secret, 123. Armand Colin, 2013. http://dx.doi.org/10.3917/arco.darb.2013.01.0123.
Actas de conferencias sobre el tema "Partage de secrets":
Wood, Peter. "Le Corbusier’s Secret Geometry: Speculations on Regulating Lines Hidden in Ronchamp". En LC2015 - Le Corbusier, 50 years later. Valencia: Universitat Politècnica València, 2015. http://dx.doi.org/10.4995/lc2015.2015.926.
Alison, Aurosa. "Les « Unités » Modulor dans la Philosophie de l’Espace de Gaston Bachelard". En LC2015 - Le Corbusier, 50 years later. Valencia: Universitat Politècnica València, 2015. http://dx.doi.org/10.4995/lc2015.2015.1045.
Faleiros, Lais Pimenta, Greifus Greigor Benites, Denise Cristina Moz Vaz Oliane, Gabriel Rodrigues Anacleto, Iranildo Gonçalves Nobre y Fausto da Silva Gonçalves. "Cistoadenoma mucinoso de ovário em gestante: relato de um caso". En 44° Congresso da SGORJ - XXIII Trocando Ideias. Zeppelini Editorial e Comunicação, 2020. http://dx.doi.org/10.5327/jbg-0368-1416-2020130247.
Informes sobre el tema "Partage de secrets":
Seemann, Alex, Jorge Rodríguez Cabello y Gonzalo Rivas. Plataforma integrada de manejo de la información para mejorar las políticas públicas: El caso de las políticas de desarrollo productivo en Chile. Inter-American Development Bank, noviembre de 2014. http://dx.doi.org/10.18235/0007175.
De Michele, Roberto. Esta guía ofrece un resumen de las políticas de integridad y transparencia que actualmente se están implementando en América Latina y el Caribe. El Banco Interamericano de Desarrollo (BID) ha financiado muchos de estos esfuerzos como parte de su misión de promover el estado de derecho, el fortalecimiento institucional y la confianza. En particular, el BID apoya a los sectores público y privado en la adopción reformas alineadas con estándares internacionales de transparencia e integridad en áreas como el lavado de activos, la integridad del sector público, la transparencia fiscal, las compras públicas y la eliminación del secreto bancario. El BID impulsa leyes y regulaciones técnicamente sanas que aseguren la simplificación administrativa y la transparencia en las decisiones públicas al mismo tiempo que busca apalancar el uso de tecnologías digitales. Inter-American Development Bank, diciembre de 2021. http://dx.doi.org/10.18235/0003821.