Artículos de revistas sobre el tema "Secret des sources"

Siga este enlace para ver otros tipos de publicaciones sobre el tema: Secret des sources.

Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros

Elija tipo de fuente:

Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Secret des sources".

Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.

También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.

Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.

1

Perraud, Antoine. "Secret des sources". Médium 37-38, n.º 4 (2013): 213. http://dx.doi.org/10.3917/mediu.037.0213.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Rowson, Everett K., W. F. Ryan y Charles B. Schmitt. "Pseudo-Aristotle, The Secret of Secrets. Sources and Influences". Journal of the American Oriental Society 107, n.º 1 (enero de 1987): 188. http://dx.doi.org/10.2307/603000.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Jovicic, Katarina. "Trade Secret Protection in the Law of the Republic of Serbia". Pravo i privreda 60, n.º 4 (24 de diciembre de 2022): 655–74. http://dx.doi.org/10.55836/pip_22403a.

Texto completo
Resumen
The subject of this paper is analysis of trade secret protection in Serbian law, which is organized and implemented at two levels: within the business company and the proceedings before the court. By applying the dogmatic method of research, the rules of current and relevant domestic sources of law are analysed, while the comparative method is used for comparing the Serbian system of trade secret legal protection with the analogous legal system in the European Union. The starting hypothesis is that the protection of trade secrets is a strategic issue that requires thoughtful planning and organization as well as constant improvement to preserve trade secrets and use their commercial potential for as long as possible. The aim of this work is to reach the conclusions that are practically usable both for trade secrets holders and for everyone else who participates in various roles in judicial procedures for trade secret protection.
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Warusfel, Bertrand. "Le droit peut-il encore protéger le secret ?" Titre VII N° 10, n.º 1 (24 de agosto de 2023): 1–10. http://dx.doi.org/10.3917/tvii.010.0001.

Texto completo
Resumen
Le secret est une pratique qui a toujours eu maille à partir avec le droit, d’autant que les exigences de transparence ou de publicité sont de plus en plus importantes dans notre société. Entre des obligations de secret et les différents droits d’information que tout État produit, existe une tension dialectique. On le constate dans de nombreux domaines (qu’il s’agisse notamment des secrets professionnels ou de celui des sources des journalistes), mais la numérisation bouscule également les périmètres de confidentialité que la loi cherche à préserver, comme le montrent les difficultés de protection des secrets de la vie privée à l’heure de la révolution numérique. Pour autant, il ne faut pas renoncer à préserver des espaces de secret protégés par la loi. On peut constater qu’il est possible et nécessaire de les redéfinir à condition d’en faire apparaître la légitimité et de les accompagner d’un encadrement suffisamment efficace pour en limiter les éventuels usages abusifs. Comme tout secret constitue une restriction de l’un de nos droits les plus fondamentaux, celui de s’exprimer et de communiquer, il est salutaire que le droit ne protège pas inconditionnellement les secrets mais qu’il ne les préserve que lorsque cela paraît légitime et proportionné.
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Fraise, Thomas. "Comment cacher un nuage ? L’organisation du secret des essais atmosphériques français (1957-1974)". Relations internationales 194, n.º 2 (30 de junio de 2023): 11–26. http://dx.doi.org/10.3917/ri.194.0011.

Texto completo
Resumen
Comment organiser le secret autour d’une activité aussi remarquable, et aussi sensible, que des essais nucléaires atmosphériques ? Comment contrôler l’information quand celle-ci est – littéralement – transportée par le vent ? Basé sur des sources primaires, cet article se penche sur le régime original de secret organisé autour des sites d’essais français entre 1957 et 1974, et sur les enjeux qu’il pose en termes de contrôle de l’information et de la démocratie. Il montre comment le souci de protéger les « secrets stratégiques » de l’arsenal français, pourtant impossibles à garder, se combinait avec celui de dissimuler des « secrets inavouables » – les mesures de radioactivité – rendant ainsi invisible l’étendue de la contamination radioactive.
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Nitinawarat, Sirin y Prakash Narayan. "Secret Key Generation for Correlated Gaussian Sources". IEEE Transactions on Information Theory 58, n.º 6 (junio de 2012): 3373–91. http://dx.doi.org/10.1109/tit.2012.2184075.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Courpasson, David y Dima Younes. "Double or Quits: Understanding the Links between Secrecy and Creativity in a Project Development Process". Organization Studies 39, n.º 2-3 (22 de septiembre de 2017): 271–95. http://dx.doi.org/10.1177/0170840617727780.

Texto completo
Resumen
Most studies on the links between secrecy and creativity have focused on individual sources of creativity and the impact of organizational management on creative initiatives. However, because of their very focus on individual practices of concealment and personal creative capacities, they have paid scant attention to collective interactions occurring around secrets. In this paper, we illuminate some mechanisms through which the creative work achieved in secret by scientists is enhanced by the exceptional character of their situation within the company. Coping with these exceptional circumstances leads the group to increase commitment, cohesion and efficiency. We theorize creativity as a result of the multiplication of social interactions among individuals and the social consequences of working and cooperating in secret. We show that secrecy can help rather than be detrimental to organizations when it is analysed as a social fabric of interactions around work and common feelings triggered by the risks of working in secret.
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Berndtsson, Tim. "Frimureriets medier: Om 1700-talsfrimureriets mediering av hemligheter i tal, handskrift och tryck". Sjuttonhundratal 14 (19 de diciembre de 2017): 17–39. http://dx.doi.org/10.7557/4.4154.

Texto completo
Resumen
Masonic Media: On Mediation of Secrets in Speech, Handwriting and Print within Eighteenth Century Freemasonry.This article deals with 18th century Freemasonry as a platform for mediation of secrets. First it discusses different theoretical aspects that can be applied when studying the phenomenon of initiatory orders with communication in focus. But it also uses different masonic sources in order to investigate some of the techniques used to mediate secrets, most notably ciphers and hieroglyphs. Aligning myself with Linda Simonis’ system theoretical view of masonry, I show that masonry depended on a distinction between secret and disclosure in order to make new candidates pass from profane to initiate. In order to distribute – but also in a sense create – secrets, the masons made use of several techniques such as vows of silence, locked archives, ciphers and hieroglyphs which were used either to enclose information (at the level of the medium) or encode it (at the level of meaning). Through use of such techniques the masonic organisations – with their sharp borders between inside and outside – can itself be conceived as mediums for the “secret of masonry”. This in turn put masonry into opposition to the transparency ideal of the Enlightenment.
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Levy, Jean-Paul. "Le secret de l'enquête et de l'instruction, le recel et le secret des sources". LEGICOM 48, n.º 1 (2012): 47. http://dx.doi.org/10.3917/legi.048.0047.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Barnett, Robert. "The Secret Secret: Cinema, Ethnicity and Seventeenth Century Tibetan-Mongolian Relations". Inner Asia 4, n.º 2 (2002): 277–346. http://dx.doi.org/10.1163/146481702793647461.

Texto completo
Resumen
AbstractThe Secret History of the Potala Palace, a 1989 film about Mongol-Tibetan relations in the seventeenth century, was a milestone in the still tentative development of Tibetan film, with significant Tibetan participation and close attention to Tibetan sources of history. This paper suggests possible reasons for the withdrawal of the film from circulation, and proposes ways of reading film in the context of contested versions of ethnicity.
Los estilos APA, Harvard, Vancouver, ISO, etc.
11

Zhou, Qiaoqiao y Chung Chan. "Secret Key Generation for Minimally Connected Hypergraphical Sources". IEEE Transactions on Information Theory 66, n.º 7 (julio de 2020): 4226–44. http://dx.doi.org/10.1109/tit.2020.2971215.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
12

Khisti, Ashish, Suhas N. Diggavi y Gregory W. Wornell. "Secret-Key Generation Using Correlated Sources and Channels". IEEE Transactions on Information Theory 58, n.º 2 (febrero de 2012): 652–70. http://dx.doi.org/10.1109/tit.2011.2173629.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
13

Levchenko, Oleksandr, Anna Levchenko y Tetiana Nemchenko. "Protection of Commercial Secrets in the Context of Strategic Management of Economic Security of the Organization in the Context of Digitalization of the Economy". Central Ukrainian Scientific Bulletin. Economic Sciences, n.º 7(40) (2021): 20–30. http://dx.doi.org/10.32515/2663-1636.2021.7(40).20-30.

Texto completo
Resumen
The article substantiates the relevance of developing the mechanism for protecting commercial secrets of the organization in the system of strategic management of economic security of the organization, taking into account the transformational changes in the economy. Using the methods of synthesis and analysis, logical and generalizing methods, the authors determined the essence and basic features of the concept of "commercial secret" in both legal and scientific literature. The most common threats to commercial secrets have been identified and the sources of threats to the leakage of confidential information have been identified, taking into account the digitalization of economic processes. Four areas of protection of commercial secrets of an organization have been identified: legal, organizational, technical and psychological. The importance of providing valuable information in the strategic perspective of commercial secrets for the formation of the basis for its protection in future were highlighted, as well as those responsible for protecting this information with the consolidation of duties and responsibilities in collective and employment agreements were identified. In the context of formation of an effective system of strategic management of economic security of organizations in the conditions of transformational changes the directions of improvement of protection of a commercial secret are offered. Taking into account a growing share of cyber fraud and transition to the preservation of information mainly on digital media, the urgency of enhanced protection increases. Thus, the formation of information security using advanced technologies and equipment, attracting highly qualified specialists in this field, monitoring to identify potential sources of information leakage and eliminate them. Considering that most common source of disclosure of trade secrets is the staff of the organization, it is proposed to form a long-term loyalty of employees and their understanding of the importance of protecting confidential information, the introduction of socially oriented personnel strategy.
Los estilos APA, Harvard, Vancouver, ISO, etc.
14

Yachongka, Vamoua, Hideki Yagi y Yasutada Oohama. "Biometric Identification Systems with Noisy Enrollment for Gaussian Sources and Channels". Entropy 23, n.º 8 (15 de agosto de 2021): 1049. http://dx.doi.org/10.3390/e23081049.

Texto completo
Resumen
In the present paper, we investigate the fundamental trade-off of identification, secret-key, storage, and privacy-leakage rates in biometric identification systems for remote or hidden Gaussian sources. We use a technique of converting the system to one where the data flow is in one-way direction to derive the capacity region of these rates. Also, we provide numerical calculations of three different examples for the system. The numerical results imply that it seems hard to achieve both high secret-key and small privacy-leakage rates simultaneously.
Los estilos APA, Harvard, Vancouver, ISO, etc.
15

Temchin, Sergei. "An Interpolation from Avicenna’s The Canon of Medicine in the Ruthenian Translation of The Secret of Secrets". Slavistica Vilnensis 65, n.º 1 (24 de septiembre de 2020): 10–19. http://dx.doi.org/10.15388/slavviln.2020.65(1).32.

Texto completo
Resumen
The Ruthenian translation of the medieval treatise Secretum Secretorum (“The Secret of Secrets”) was made in Kiev during the second half of the 15th century from a Hebrew version that dates back to late 13th‒early 14th centuries, when it was translated from the Arabic original, which probably originated in its final form during the 10th century. The Ruthenian translation contains certain interpolations that had been already present in the Hebrew version before it was translated into Ruthenian. They had been extracted from several Arabic and Hebrew sources, such as the treatise Al-Mansuri by Abū Bakr Muhammad ibn Zakariyā al-Rāzī (865‒925) and the treatises On Poisons, On Coitus, and On Asthma by Maimonides (1135/1138‒1204).The author argues that the same Ruthenian translation also contains a minor (one-page long) interpolation that through Hebrew mediation goes back to The Canon of Medicine written in Arabic by Avicenna (980‒1037). It is still to be established which of the seven known Medieval Hebrew translations and/or the around 30 commentaries on it (all unpublished) was used as the immediate source for the Kievan translation. Nevertheless, the newly identified Arabic origin of this particular interpolation to the Ruthenian version of the treatise The Secret of Secrets sheds some light on the prehistory of this particular text’s portion and compliments the list of sources used by the Hebrew-to-Ruthenian translators in Kiev during the second half of the 15th century.
Los estilos APA, Harvard, Vancouver, ISO, etc.
16

Gassaway, Bob M. "Are Secret Sources in the News Media Really Necessary?" Newspaper Research Journal 9, n.º 3 (marzo de 1988): 69–77. http://dx.doi.org/10.1177/073953298800900307.

Texto completo
Resumen
Fifteen people who said they had acted as confidential news sources for journalists were interviewed Most said they had been providing confidential information for years as a way of letting the public know things. A majority of the sources said journalists faced with pressure to identify their sources should “ask me to reconsider an agreement” of confidentiality.
Los estilos APA, Harvard, Vancouver, ISO, etc.
17

Oz-Salzberger, Fania y Eli Salzberger. "The Secret German Sources of the Israeli Supreme Court". Israel Studies 3, n.º 2 (octubre de 1998): 159–92. http://dx.doi.org/10.2979/isr.1998.3.2.159.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
18

Oz-Salzberger, Fania y Eli Salzberger. "The Secret German Sources of the Israeli Supreme Court". Israel Studies 3, n.º 2 (1998): 159–92. http://dx.doi.org/10.1353/is.2005.0085.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
19

Michalon, Barthélémy y Benjamin Puybareau. "Secret d’État et secret des sources : comment des journalistes enquêtent-ils sur le renseignement en France ?" Cultures & conflits, n.º 114-115 (20 de diciembre de 2019): 227–62. http://dx.doi.org/10.4000/conflits.21231.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
20

Mandzhikova, Larisa B. "Документы секретного делопроизводства Совета Астраханского калмыцкого управления (1836–1848 гг.)". Бюллетень Калмыцкого научного центра Российской академии наук, n.º 3 (25 de diciembre de 2023): 92–110. http://dx.doi.org/10.22162/2587-6503-2023-3-27-92-110.

Texto completo
Resumen
Introduction. In the course of the activities of the Council of the Astrakhan Kalmyk Administration, which carried out the administrative management of Kalmykia in the period from 1836 to 1848, the documents were created for general office work and for secret ones as well. In the archival fund I-3 “Council of the Astrakhan Kalmyk Administration” of the National Archive of the Republic of Kalmykia, three files containing “secret cases” have been preserved; their study will make it possible to analyze and determine the nature of the issues considered in secret records management. The purpose of the article is to study archival documents classified as “secret” related to fund I-3 “Council of the Astrakhan Kalmyk Administration”, to explore the peculiarities of conducting secret office work in pre-revolutionary Kalmykia as well as to introduce newly identified archival documents into scientific circulation. Results. Documents created during the activities of the Kalmyk Administration Council and containing “secret” information are unique sources for studying the issues of organizing work with documents of a secret nature in one of the outskirts of pre-revolutionary Russia.
Los estilos APA, Harvard, Vancouver, ISO, etc.
21

Wang, Zichi. "Multisource Data Hiding in Digital Images". Symmetry 14, n.º 5 (27 de abril de 2022): 890. http://dx.doi.org/10.3390/sym14050890.

Texto completo
Resumen
In this paper, we propose a new data-hiding framework: multisource data hiding, in which multiple senders (multiple sources) are able to transmit different secret data to a receiver via the same cover image symmetrically. We propose two multisource data-hiding schemes, i.e., separable and anonymous, according to different applications. In the separable scheme, the receiver can extract the secret data transmitted by all senders using the symmetrical data-hiding key. A sender is unable to know the content of the secret data that is not transmitted by them (non-source sender). In the anonymous scheme, it is unnecessary to extract all secret data on the receiver side. The content extracted by the receiver is a co-determined result of the secret data transmitted by all senders. Details of the secret data are unknown to the receiver and the non-source senders. In addition, the two proposed schemes achieve multisource data hiding without decreasing the undetectability of data hiding.
Los estilos APA, Harvard, Vancouver, ISO, etc.
22

Bassi, Germán, Pablo Piantanida y Shlomo Shamai (Shitz). "The Secret Key Capacity of a Class of Noisy Channels with Correlated Sources". Entropy 21, n.º 8 (26 de julio de 2019): 732. http://dx.doi.org/10.3390/e21080732.

Texto completo
Resumen
This paper investigates the problem of secret key generation over a wiretap channel when the terminals observe correlated sources. These sources are independent of the main channel and the users overhear them before the transmission takes place. A novel outer bound is proposed and, employing a previously reported inner bound, the secret key capacity is derived under certain less-noisy conditions on the channel or source components. This result improves upon the existing literature where the more stringent condition of degradedness is required. Furthermore, numerical evaluation of the achievable scheme and previously reported results for a binary model are presented; a comparison of the numerical bounds provides insights on the benefit of the chosen scheme.
Los estilos APA, Harvard, Vancouver, ISO, etc.
23

Muramatsu, J., K. Yoshimura, K. Arai y P. Davis. "Secret Key Capacity for Optimally Correlated Sources Under Sampling Attack". IEEE Transactions on Information Theory 52, n.º 11 (noviembre de 2006): 5140–51. http://dx.doi.org/10.1109/tit.2006.883552.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
24

James, Ryan, Jeffrey Emenheiser y James Crutchfield. "Unique Information and Secret Key Agreement". Entropy 21, n.º 1 (24 de diciembre de 2018): 12. http://dx.doi.org/10.3390/e21010012.

Texto completo
Resumen
The partial information decomposition (PID) is a promising framework for decomposing a joint random variable into the amount of influence each source variable X i has on a target variable Y, relative to the other sources. For two sources, influence breaks down into the information that both X 0 and X 1 redundantly share with Y, what X 0 uniquely shares with Y, what X 1 uniquely shares with Y, and finally what X 0 and X 1 synergistically share with Y. Unfortunately, considerable disagreement has arisen as to how these four components should be quantified. Drawing from cryptography, we consider the secret key agreement rate as an operational method of quantifying unique information. Secret key agreement rate comes in several forms, depending upon which parties are permitted to communicate. We demonstrate that three of these four forms are inconsistent with the PID. The remaining form implies certain interpretations as to the PID’s meaning—interpretations not present in PID’s definition but that, we argue, need to be explicit. Specifically, the use of a consistent PID quantified using a secret key agreement rate naturally induces a directional interpretation of the PID. We further reveal a surprising connection between third-order connected information, two-way secret key agreement rate, and synergy. We also consider difficulties which arise with a popular PID measure in light of the results here as well as from a maximum entropy viewpoint. We close by reviewing the challenges facing the PID.
Los estilos APA, Harvard, Vancouver, ISO, etc.
25

Yılmaz, Hacı. "The concept of secret in Anatolian Alewism Anadolu Aleviliği’nde sır kavramı". Journal of Human Sciences 14, n.º 2 (5 de julio de 2017): 2200. http://dx.doi.org/10.14687/jhs.v14i2.4692.

Texto completo
Resumen
Groups embracing ideas that do not conform to the ideas prevalent in the society, may choose to keep some of their views secret from the rest of the society in order to avoid outside pressure. Alawites in the Islamic world have developed a similar reflex both to protect themselves from outside pressure and to maintain discipline within their own group. This paper tackles the notion of secret based on a passage found in the introduction of a Futuwwat Namah we came across in the Futuwwat Namah collection Number 8602 in the National Library Manuscripts Collection. The passage tells about how the Prophet disclosed to Ali some of the secrets he received during his dialogue with God in the Night of Ascension. Protecting this secret was deemed very important and although the nature of the secret is not to be found in any written or oral source, measures were taken to protect it from non-Alawites and penalties were set for those would reveal it. In this paper, the passage in question is transliterated in Modern Turkish Alphabet and presented to the reader. Also, there is a discussion of the nature of this secret and what this secret could be in the light of written Alawite sources namely Buyruks of Imam Jafar and Sheikh Safi and some modern works.Extended English abstract is in the end of PDF (TURKISH) file. ÖzetToplumun genel düşüncesi dışında fikirlere sahip olan gruplar dışarıdan gelebilecek baskılara maruz kalmamak için görüşlerinden en azından bazılarını toplumun diğer bireylerinden gizleme yoluna gitmişlerdir. İslam dünyasının içinde yer alan Aleviler hem kendilerini dış baskılardan koruyabilmek hem de kendi grup disiplinlerini sağlayabilmek adına bu yönde refleks geliştirmişlerdir. İşte bu araştırma, Milli Kütüphane Yazmaları arasında 8602 numaralı Fütüvvetname Mecmuası’nda yer alan bir fütüvvetnamenin baş kısmındaki Hz. Peygamber’in Miraç’ta Tanrı ile konuşmalarından bir kısmını Hz. Ali’ye sır olarak verilmesini anlatan bölümden hareketle Alevilikteki sır kavramı üzerinde durmaktadır. Başkalarından gizlenmesine büyük önem verilen sırrın mahiyeti ne sözlü ne de yazılı kaynaklarda yer almamasına rağmen, Alevi olmayanlardan bunların korunması hususunda bazı tedbirler alınmış, hatta sırrı açıklayanlar için bazı cezalar öngörülmüştür. Burada hem bahsedilen kısım Türkçeye aktarılarak okuyucuya sunulmuş hem de Aleviliğin yazılı kaynakları olan İmam Cafer ve Şeyh Safi Buyrukları başta olmak üzere modern çalışmalar ışığında sırrın mahiyeti tartışılmıştır.
Los estilos APA, Harvard, Vancouver, ISO, etc.
26

Kreilkamp, Ivan. "Meat, Flesh, Skin: The Carnality Of The Secret Agent". Studies in the Novel 56, n.º 1 (marzo de 2024): 21–40. http://dx.doi.org/10.1353/sdn.2024.a921057.

Texto completo
Resumen
Abstract: This essay considers Conrad’s novel The Secret Agent in relation to what I will suggest are several relevant intertexts or sources for it—including Upton Sinclair’s famous muckraking 1906 exposé of the conditions in the Chicago stockyards, The Jungle , as well as Classical mythological tales depicting “cannibal feasts.” I point to these sources in order to argue that Conrad uses the novel to consider the question of the overlap between the direct violence of terrorism and the less direct violence of meat production. The novel, I suggest, can be read as an extended meditation on the embodied nature of human flesh.
Los estilos APA, Harvard, Vancouver, ISO, etc.
27

Ownby, David. "The Heaven and Earth Society as Popular Religion". Journal of Asian Studies 54, n.º 4 (noviembre de 1995): 1023–46. http://dx.doi.org/10.2307/2059958.

Texto completo
Resumen
The profound disdain with which most governments—Qing, Republican, Communist, or, in the case of Southeast Asia, colonial—have treated Chinese secret societies, as well as the undeniable involvement of many of these societies in violent and criminal activities, have obscured the religious elements at the core of the early Heaven and Earth Society (Tiandihui), the most widespread and well-known of Chinese secret societies. The vast historiography treating Chinese secret societies, often grounded in documents produced by hostile governments, has in large measure reproduced the image of secret societies contained in these documents, even if not all scholars have embraced the moral and legal assumptions of their sources. Consequently, society practices and symbols which would be treated as religious in other contexts are frequently dismissed as epiphenomenal or “esoteric” (Stanton 1900, 9; Morgan I960, 5), or as functional means of unifying “dissident” groups (Yang 1961, 61–64).
Los estilos APA, Harvard, Vancouver, ISO, etc.
28

Matveev, Ivan y Ilia Safonov. "From Iris Image to Embedded Code: System of Methods". Algorithms 16, n.º 2 (6 de febrero de 2023): 87. http://dx.doi.org/10.3390/a16020087.

Texto completo
Resumen
Passwords are ubiquitous in today’s world, as are forgetting and stealing them. Biometric signs are harder to steal and impossible to forget. This paper presents a complete system of methods that takes a secret key and the iris image of the owner as input and generates a public key, suitable for storing insecurely. It is impossible to obtain source data (i.e., secret key or biometric traits) from the public key without the iris image of the owner, the irises of other persons will not help. At the same time, when the iris image of the same person is presented the secret key is restored. The system has been tested on several iris image databases from public sources. It allows storing 65 bits of the secret key, with zero possibility to unlock it with the impostor’s iris and 10.4% probability to reject the owner in one attempt.
Los estilos APA, Harvard, Vancouver, ISO, etc.
29

Amidon, Debra M. "Dialogue with Customers: Secret to Innovation Strategy". International Journal of Innovation Management 01, n.º 01 (marzo de 1997): 73–87. http://dx.doi.org/10.1142/s136391969700005x.

Texto completo
Resumen
Enterprises are discovering a rededication to customers in ways rarely practised other than by the entrepreneurial firm. However, quality and restructuring methodologies have returned executives to their own raison d'etre by positioning customers at the heart of business survival. At the same time, cross-boundary alliances are demanding new partnering techniques with all stakeholders, including customers. New initiatives are commonplace, but are generally without an understanding that something is fundamentally different between customer satisfaction and the success of your customers. This article introduces the concepts in ways that are easily practised. Simply stated, treat your customers as sources of knowledge, not someone to whom you solely deliver products and services. By practising value-system (rather than value-chain) strategies, companies can take advantage of the business opportunities afforded by a collaborative economy. Similarly, by defining Strategic Business Network (SBN's) rather than Strategic Business Units (SBU's), companies can leverage all available knowledge sources. Most importantly, a symbiotic relationship with consumers, customers or clients can help a company envision products and services for unarticulated needs and unserved markets. Companies which are practising new ways of interfacing with customers are realising significant business results. A profile of customer innovation at Steelcase North America provides an illustration of this new partnering relationship.
Los estilos APA, Harvard, Vancouver, ISO, etc.
30

Kara, György. "On some sources of Sagang Sechen’s Teachings (1662)". Acta Orientalia Academiae Scientiarum Hungaricae 73, n.º 4 (17 de diciembre de 2020): 603–15. http://dx.doi.org/10.1556/062.2020.00031.

Texto completo
Resumen
AbstractNine of the seventy-nine alliterative quatrains of Sagang Sechen’s great gnomic poem are revisited, their possible literary sources suggested, their interpretation revised. Seven of them go back, entirely or partially, to Sa-skya Paṇḍita’s Subhāṣitaratnanidhi, one to the Janapoṣanabindhu, one of Nāgārjuna’s nītiśāstras, and one uses a comparison known from the Secret History. Parallels are quoted from Sonom Gara’s and the Oirat Zaya Paṇḍita’s prose translations of the Subhāṣitaratnanidhi. Also discussed are the rare word küčigei and the possible identity of Sonom Gara and Suonanqilo.
Los estilos APA, Harvard, Vancouver, ISO, etc.
31

Ettinger, David. "Sources: Spies, Wiretaps, and Secret Operations: An Encyclopedia of American Espionage". Reference & User Services Quarterly 51, n.º 1 (1 de septiembre de 2011): 82. http://dx.doi.org/10.5860/rusq.51n1.82.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
32

Levchenko, I., А. Firsov, L. Snigur y E. Ivanchenko. "PERFECTION OF METHODOLOGY OF ESTIMATION OF EFFICIENCY OF SUBSYSTEM OF REARWARD SECRET SERVICE IN THE SEPARATE MECHANIZED BRIGADE DURING CONDUCT OF BATTLE ACTIONS". Collection of scientific works of Odesa Military Academy 2, n.º 14 (25 de enero de 2021): 156–63. http://dx.doi.org/10.37129/2313-7509.2020.14.2.156-163.

Texto completo
Resumen
In the article the improved methodology of evaluation of efficiency of subsystem of rearward secret service offers in the separate mechanized brigade that can be used for the evaluation of efficiency of the system of the rearward providing of the separate mechanized brigade during the conduct of battle actions. On efficiency of implementation of tasks from rearward secret service basic influence is carried out degree of full strength by the personnel of group of rearward secret service and their knowledge on speciality, organization of connection with a senior chief, realization of order in relation to realization of rearward secret service, the state of transport vehicles on that comes true rearward secret service, terms, season, daypart. All of it can carry out substantial influence on implementation of tasks from rearward secret service. The improved methodology of evaluation of efficiency of subsystem of rearward secret service is given in the separate mechanized brigade that can be used for the evaluation of efficiency of the system of the rearward providing of the separate mechanized brigade during the conduct of battle actions. During research of process of the rearward providing of troops an important theoretical and practical task is an estimation of efficiency of subsystem of rearward secret service in the separate mechanized brigade during the conduct of battle actions. The certain going near the decision of this task were worked out in a number of sources. However, experience of anti-terror operation on territory Donetsk and Luhansk areas, other armed conflicts of the last decades testifies to the necessity of perfection of methodology of estimation of efficiency of subsystem of rearward secret service that would take into account changes in requirements to the subsystem of rearward secret service in the separate mechanized brigade during, and promoted efficiency of the system of the rearward providing on the whole. Keywords: separate mechanized brigade, rearward providing, efficiency of subsystem rearward secret service, reconnaissance group, method of expert evaluation, objects of rearward secret service.
Los estilos APA, Harvard, Vancouver, ISO, etc.
33

Sekga, Comfort y Mhlambululi Mafu. "Tripartite Quantum Key Distribution Implemented with Imperfect Sources". Optics 3, n.º 3 (21 de junio de 2022): 191–208. http://dx.doi.org/10.3390/opt3030019.

Texto completo
Resumen
Multipartite quantum key distribution (QKD) is a promising area of quantum networks that provides unconditional secret keys among multiple parties, enabling only legitimate users to decrypt the encrypted message. However, security proofs of existing multipartite QKD typically assume perfect state preparation devices of legitimate users and neglect the relative rotation of reference frames. These presumptions are, nevertheless, very difficult to meet in practice, and thus the security of current multipartite QKD implementations is not guaranteed. By combining the idea of a loss tolerant technique, introduced by Tamaki et al. (K. Tamaki et al., Phys. Rev. A, 90, 052314, 2014), and the concept of a reference frame-independent protocol, we propose a three-party QKD protocol that considers state preparation flaws and the slow drift of reference frames. Through a numerical simulation, the influence of misaliged reference frames on the protocol’s stability was examined by drifting reference frames through angles β=π/5, β=π/6 and β=π/7. In addition, the performance of the proposed protocol was examined for the encoding flaws set at δ=0.35, δ=0.20, and δ=0.10. The results show that the protocol is robust against state preparation flaws, and is insignificantly impacted by misalignment of the reference frames because the achieved transmission distances and secret key rates are comparable to the perfect scenarios. This work dramatically contributes toward the realization of practical and secure multipartite QKD. The proposed protocol has direct applications in quantum communication network environments that involve unknown and slowly varying reference frames, web conferences, and online communications.
Los estilos APA, Harvard, Vancouver, ISO, etc.
34

Kinsella, Helen M. "Sex as the secret: counterinsurgency in Afghanistan". International Theory 11, n.º 1 (18 de diciembre de 2018): 26–47. http://dx.doi.org/10.1017/s1752971918000210.

Texto completo
Resumen
AbstractI explore the construction of women as the secret for the ‘successful’ prosecution of war in Afghanistan. To do so, I take up the mobilization of gender in the US counterinsurgency doctrine as deployed in Afghanistan. I draw on the 2006 Counterinsurgency Field Manual, human rights and humanitarian reports, and scholarly works to identify and analyze this mobilization, paying attention to the colonial histories upon which COIN explicitly and implicitly relies. By critically integrating these sources and the paradigmatic moments that exemplify COIN, I demonstrate the constitutive relationship of gender and COIN. The valence of the secret – of women as concealing, revealing, being, and bearing the secret – is still a lesser explored element in the analysis of the gendering of COIN and of its ‘military orientalism’. Even as scholars have powerfully shown how, in the case of Afghanistan and elsewhere, the veil functions as an overdetermined and ‘multilayered signifier’ in its own right, symbolizing the ‘tension between disclosure and concealment that defines the dominant conception of the secret’, less subject to detailed analysis in case of Afghanistan is the ways in which Afghan women are constituted through COIN in polysemous relation to the notion of the secret.
Los estilos APA, Harvard, Vancouver, ISO, etc.
35

Van Netten, Djoeke. "Spaces on Ships". TSEG - The Low Countries Journal of Social and Economic History 18, n.º 3 (29 de noviembre de 2021): 107–24. http://dx.doi.org/10.52024/tseg.11044.

Texto completo
Resumen
Djoeke van Netten examines the interplay between privacy and secrecy in the ships of the Dutch East India Companies (1595-1799). Space aboard a ship was scarce and privacy a rare privilege. Netten starts with a discussion of the sources available as well as those lost to history. She then continues by examining what can be known about the protection of and access to (secret) information and (private) belongings aboard ships. Cases where privacy was violated and secrets revealed emerge as some of the most informative historical events to be examined in this context. As she confronts her historical examples with relevant theoretical and historiographical concepts, she concludes by raising important questions for further research on privacy and secrecy aboard ships.
Los estilos APA, Harvard, Vancouver, ISO, etc.
36

Makarov, A. V., N. Yu Gusevskaya y A. S. Petrov. "Counteraction to High Treason in Russian Legislation of the Second Half of the 19th — Early 20th Centuries". Nauchnyi dialog, n.º 1 (27 de enero de 2021): 337–56. http://dx.doi.org/10.24224/2227-1295-2021-1-337-356.

Texto completo
Resumen
The problem of improving the criminal liability of the subjects of the Russian Empire at the end of the nineteenth century for espionage and spilling state secrets to a foreign state is considered. The relevance of the study is due to the importance of the problem under study for the effective functioning of the Russian state. The study is based on historical sources of a regulatory and legal nature and is interdisciplinary in nature. Particular attention is paid to the study of legal norms, the identification of the type and amount of punishments for the commission of espionage by Russian citizens and spilling the state secrets to a foreign state. It is indicated that in the second half of the 19th century, the intensity of intelligence of foreign secret services in the territory of the Russian Empire increased. It is noted that more and more often foreign powers involved Russian subjects in the process of obtaining Russian secrets. At the same time, the analysis of the sources made it possible to reveal a sufficient limitation of the institution of counteracting espionage and disclosure of state secrets to foreign states in the Russian Empire at the end of the 19th century. It is proved that it was precisely these phenomena at the end of the 19th and the beginning of the 20th centuries that determined the authorities’ desire to progressively improve legal mechanisms that counteract threats and challenges to national security.
Los estilos APA, Harvard, Vancouver, ISO, etc.
37

Kruglyakov, Sergey V. "Realization of the Socio-Legal Function by Appointed Advocate in Criminal and Civil Cases Involving State Secrets". Общество: политика, экономика, право, n.º 2 (21 de febrero de 2024): 94–103. http://dx.doi.org/10.24158/pep.2024.2.10.

Texto completo
Resumen
The article delves into the realization of the social and legal function of the appointed advocate in criminal and civil proceedings in cases involving state secrets, as well as problematic issues and liability that may occur in case of its divulgence. The relevance of the research topic is that in Russia there is an increase in the number of convictions under Article 283 of the Criminal Code of the Russian Federation – disclosure of state secrets. In addition, the article discusses theoretical issues, the relationship between attorney-client privilege and state secrets, and provides examples from judicial practice. From a certain angle, the author is convinced that it is necessary to investigate the issue of the advocate’s activity on appointment in criminal and civil cases, in which there is a state secret, in order to further develop recommendations for advocates. The formal legal method, the method of comparative analysis, synthesis, the inductive method, generalization and systematization of scientific sources on the research problem, comparative and predictive methods were used.
Los estilos APA, Harvard, Vancouver, ISO, etc.
38

Beglov, Alexey. "Special Services and Religious Organizations in the Soviet State: Collaboration Mechanisms, Survival Strategies, Sources". ISTORIYA 13, n.º 6 (116) (2022): 0. http://dx.doi.org/10.18254/s207987840021686-3.

Texto completo
Resumen
In this article the authors formulate generalizing observations on the mechanisms of interaction between the Soviet secret services and religious communities in the USSR during the whole period of its existence. The basis for these generalizations was the research of the past thirty years as well as the materials of the international symposium “Special Services and Religious Organizations in the Soviet State: Collaboration Mechanisms, Survival Strategies, Sources” held by the Centre for the Study of the History of Religion and Church History at the Department of Modern and Contemporary History, Institute of World History, Russian Academy of Sciences, on 27—28 October 2021. Infiltration and a complex operational game involved the control and instrumentalization rather than destruction of even those religious communities whose existence was considered unacceptable in the USSR. Instead of the declared reduction of the influence of religious organizations, cooperation was indirectly helping to stabilize their position and even increase the influence of their leaders. On the part of the believers, cooperation with the secret services proved to be a complex survival strategy both at the micro level (parish, congregation, group) and at the institutional level. In light of these observations, the authors raise the question of the need to develop analytical criteria for cooperation, based on a comprehensive and qualitative analysis of case-by-case information, rather than formal criteria (the presence or absence of a cooperation agreement). In addition, the authors draw attention to the change in the position of the researcher, who is no longer an “unmasker” of the hierarchs and laity who collaborated with the special services. Here, the question of ethical norms and the research tools of the historian working with the documents of the secret services arises with new urgency.
Los estilos APA, Harvard, Vancouver, ISO, etc.
39

Kozák, Jan A. "A Minister to the Secret Fire: Pavel Hošekʼs take on J. R. R. Tolkien (review)". CENTRAL EUROPEAN JOURNAL FOR CONTEMPORARY RELIGION 4, n.º 1 (11 de abril de 2022): 71–75. http://dx.doi.org/10.14712/25704893.2021.4.

Texto completo
Resumen
Book review on Hošek, Pavel, Sloužím Tajnému ohni: Duchovní zdroje literární tvorby J.R.R. Tolkiena [I Am a Servant of Secret Fire: Spiritual Sources of J.R.R. Tolkien’s Literary Work], Brno: Centrum pro studium demokracie a kultury 2019, 191 p.
Los estilos APA, Harvard, Vancouver, ISO, etc.
40

NOGAJ, Adam. "TECHNICAL SOURCES OF OBTAINING INTELLIGENCE INFORMATION". Scientific Journal of the Military University of Land Forces 162, n.º 4 (1 de octubre de 2011): 109–32. http://dx.doi.org/10.5604/01.3001.0002.3202.

Texto completo
Resumen
The author presents the development of technologies used to obtain intelligence information – obviously in a considerable simplification and in brief – from the beginning to the end of the 20th century. The author emphasises the timeless importance of the scientific and technological revolution, which enables the introduction of new, previously unknown tools. The purpose of these tools along with the traditional spying methods, which have functioned for centuries and millennia, is to obtain information. The author claims that the technical measures of obtaining information were not the invention of World War II. Most technologies for obtaining intelligence information used during World War II had already been known and widely used during World War I. During this war fighting armies paid considerable attention to radio reconnaissance, especially one of its forms: crypto-analysis, i.e. decoding. In that period air reconnaissance, including air photography, was also widely used. Moreover, tools to eavesdrop the enemy’s telephone networks situated from 10 to 20 and even tens of kilometres away were also known. With the example of the Third Reich, the author presents a horrifying picture of the development of the technical sources of obtaining intelligence information for the structures of military intelligence, civilian intelligence and secret police typical of a totalitarian state attempting to control everyone and everything. Another example is the Soviet Army, which at the end of World War II had very well-developed technical structures for obtaining intelligence information and made plenty of effort to obtain it. The most considerable attention was devoted to technical reconnaissance measures possessed by Russian fronts.The final part of the article presents an outline of the most significant information related to the contemporary systems of obtaining intelligence information on the basis of the following intelligence: air, satellite, electronic, radio, radiolocation and information communications technology. The author proves that human sources of information have ceased to play a key role in the past decades. Moreover, he proves that for many decades major intelligence expenditure has been incurred on electronic intelligence by world powers. The secret ring is no longer the most important and has definitely ceased to be the only source of obtaining information on a potential foe.
Los estilos APA, Harvard, Vancouver, ISO, etc.
41

WATANABE, Shun y Yasutada OOHAMA. "Secret Key Agreement from Correlated Gaussian Sources by Rate Limited Public Communication". IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E93-A, n.º 11 (2010): 1976–83. http://dx.doi.org/10.1587/transfun.e93.a.1976.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
42

Xu, Yinfei y Daming Cao. "Secret Key Generation From Vector Gaussian Sources With Public and Private Communications". IEEE Transactions on Information Theory 67, n.º 8 (agosto de 2021): 5420–31. http://dx.doi.org/10.1109/tit.2021.3086536.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
43

Duclert, Vincent. "Des archives pour Dreyfus. Du secret des dossiers � la transparence des sources". Sigila N�25, n.º 1 (2010): 151. http://dx.doi.org/10.3917/sigila.025.0151.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
44

Watanabe, S. y Y. Oohama. "Secret Key Agreement From Vector Gaussian Sources by Rate Limited Public Communication". IEEE Transactions on Information Forensics and Security 6, n.º 3 (septiembre de 2011): 541–50. http://dx.doi.org/10.1109/tifs.2011.2132130.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
45

Boche, H. y G. Janßen. "Distillation of secret-key from a class of compound memoryless quantum sources". Journal of Mathematical Physics 57, n.º 8 (agosto de 2016): 082201. http://dx.doi.org/10.1063/1.4960217.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
46

Izzo, Massimo. "The Origin of The Secret of the Golden Flower: Sources and Translations". Journal of Daoist Studies 16, n.º 1 (2023): 81–104. http://dx.doi.org/10.1353/dao.2023.0004.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
47

Wang, Di. "Heroic Mother and Wise Wife". Inner Asia 23, n.º 2 (18 de noviembre de 2021): 212–32. http://dx.doi.org/10.1163/22105018-12340172.

Texto completo
Resumen
Abstract Thirteenth-century sources provide us with striking images of Mongol noblewomen, which are not eclipsed by the heroic conquests and military exploits of their men. While recognising the complexity of gender roles in pre-imperial Mongol society, this article aims to explore the specific responsivities carried by Hö’elün and Börte in the narrative of The Secret History of the Mongols. The selective presentation of their characters and duties further reveals the goal of the Secret Historian to create a ruling model, which includes a brave widowed mother and an intelligent wife for the Qan of the empire.
Los estilos APA, Harvard, Vancouver, ISO, etc.
48

SEMENIUK, O. "Criminological analysis of threats in the sphere of protection of state secrets". INFORMATION AND LAW, n.º 2(17) (29 de junio de 2016): 106–13. http://dx.doi.org/10.37750/2616-6798.2016.2(17).272909.

Texto completo
Resumen
This article presents the analysis of the external and internal threats in the sphere of protection of state secret, distinguishes sources and carriers of such threats, considers motivation of illegal activity to the detriment of Ukraine and mechanisms of its formation.
Los estilos APA, Harvard, Vancouver, ISO, etc.
49

Chan, Alfred L. y Andrew J. Nathan. "The Tiananmen Papers Revisited". China Quarterly 177 (marzo de 2004): 190–214. http://dx.doi.org/10.1017/s0305741004000116.

Texto completo
Resumen
Authentic Chinese internal documents matter greatly as historical records that illuminate our understanding of Chinese politics. Yet careful scrutiny shows that the Chinese book version of the Tiananmen Papers is part fiction and part documentary history based on open and semi-open sources and document collections. The alleged transcripts of top-level meetings are basically stitched together ex post facto (even by the admission of the editors) and then presented as secret documents. Furthermore, the English translation is a heavily retouched version of the Chinese with differences in claims of authenticity, translation, citation and style. There is little evidence that any real secret documents are in the hands of the Chinese author, and even if they were, the two books under consideration are really secondary sources steps removed from the originals. The editors strongly vouch for the authenticity of these two books, but their efforts are inadequate and unconvincing.
Los estilos APA, Harvard, Vancouver, ISO, etc.
50

Veszprémy, Márton. "Astrologers and the Hungarian State Security Agency". Polish Journal of the Arts and Culture New Series, n.º 17 (1/2023) (mayo de 2023): 53–67. http://dx.doi.org/10.4467/24506249pj.23.004.18997.

Texto completo
Resumen
The history of astrology in twentieth-century Hungary has not yet been a subject of research. Consequently, the attitude of Hungarian state security agency towards astrologers and astrology during the communist era is unknown – especially since the files of agents have not been made public in Hungary. In the present article, I examine the question through the cases of Sándor Raisz, András László, Zoltán Lemhényi and Viktor Juhász-Schlatter, using sources preserved in the Historical Archives of the Hungarian State Security Services (Állambiztonsági Szolgálatok Történeti Levéltára). I conclude that the secret service was only interested in astrologers because they met regularly with their students, all regular and secret meetings being politically suspicious. Astrology as an illegal activity or a subject of contempt only appears in sources from the 1980s. All the astrologers discussed in my article were in one way or another opposed to the ruling communist regime. Part of the reason for this is that astrology was a popular intellectual, middle-class activity in the Horthy era, and representatives of this stratum were considered enemies of the regime after 1945. Also, the communist system represented an avowedly materialist ideology, while astrology flourished primarily among those interested in mysticism, theosophy and anthroposophy. The picture that emerges from the sources is that astrology classes were not overtly political, but their participants were nevertheless bound together by the knowledge that they were listening to forbidden, secret teachings. In this respect, astrology can be classified as counterculture in the era. The topic also offers a valuable insight into the overlapping subcultures in twentieth-century Hungary.
Los estilos APA, Harvard, Vancouver, ISO, etc.
Ofrecemos descuentos en todos los planes premium para autores cuyas obras están incluidas en selecciones literarias temáticas. ¡Contáctenos para obtener un código promocional único!

Pasar a la bibliografía