Articles de revues sur le sujet « Secret des sources »

Pour voir les autres types de publications sur ce sujet consultez le lien suivant : Secret des sources.

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les 50 meilleurs articles de revues pour votre recherche sur le sujet « Secret des sources ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Parcourez les articles de revues sur diverses disciplines et organisez correctement votre bibliographie.

1

Perraud, Antoine. « Secret des sources ». Médium 37-38, no 4 (2013) : 213. http://dx.doi.org/10.3917/mediu.037.0213.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Rowson, Everett K., W. F. Ryan et Charles B. Schmitt. « Pseudo-Aristotle, The Secret of Secrets. Sources and Influences ». Journal of the American Oriental Society 107, no 1 (janvier 1987) : 188. http://dx.doi.org/10.2307/603000.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Jovicic, Katarina. « Trade Secret Protection in the Law of the Republic of Serbia ». Pravo i privreda 60, no 4 (24 décembre 2022) : 655–74. http://dx.doi.org/10.55836/pip_22403a.

Texte intégral
Résumé :
The subject of this paper is analysis of trade secret protection in Serbian law, which is organized and implemented at two levels: within the business company and the proceedings before the court. By applying the dogmatic method of research, the rules of current and relevant domestic sources of law are analysed, while the comparative method is used for comparing the Serbian system of trade secret legal protection with the analogous legal system in the European Union. The starting hypothesis is that the protection of trade secrets is a strategic issue that requires thoughtful planning and organization as well as constant improvement to preserve trade secrets and use their commercial potential for as long as possible. The aim of this work is to reach the conclusions that are practically usable both for trade secrets holders and for everyone else who participates in various roles in judicial procedures for trade secret protection.
Styles APA, Harvard, Vancouver, ISO, etc.
4

Warusfel, Bertrand. « Le droit peut-il encore protéger le secret ? » Titre VII N° 10, no 1 (24 août 2023) : 1–10. http://dx.doi.org/10.3917/tvii.010.0001.

Texte intégral
Résumé :
Le secret est une pratique qui a toujours eu maille à partir avec le droit, d’autant que les exigences de transparence ou de publicité sont de plus en plus importantes dans notre société. Entre des obligations de secret et les différents droits d’information que tout État produit, existe une tension dialectique. On le constate dans de nombreux domaines (qu’il s’agisse notamment des secrets professionnels ou de celui des sources des journalistes), mais la numérisation bouscule également les périmètres de confidentialité que la loi cherche à préserver, comme le montrent les difficultés de protection des secrets de la vie privée à l’heure de la révolution numérique. Pour autant, il ne faut pas renoncer à préserver des espaces de secret protégés par la loi. On peut constater qu’il est possible et nécessaire de les redéfinir à condition d’en faire apparaître la légitimité et de les accompagner d’un encadrement suffisamment efficace pour en limiter les éventuels usages abusifs. Comme tout secret constitue une restriction de l’un de nos droits les plus fondamentaux, celui de s’exprimer et de communiquer, il est salutaire que le droit ne protège pas inconditionnellement les secrets mais qu’il ne les préserve que lorsque cela paraît légitime et proportionné.
Styles APA, Harvard, Vancouver, ISO, etc.
5

Fraise, Thomas. « Comment cacher un nuage ? L’organisation du secret des essais atmosphériques français (1957-1974) ». Relations internationales 194, no 2 (30 juin 2023) : 11–26. http://dx.doi.org/10.3917/ri.194.0011.

Texte intégral
Résumé :
Comment organiser le secret autour d’une activité aussi remarquable, et aussi sensible, que des essais nucléaires atmosphériques ? Comment contrôler l’information quand celle-ci est – littéralement – transportée par le vent ? Basé sur des sources primaires, cet article se penche sur le régime original de secret organisé autour des sites d’essais français entre 1957 et 1974, et sur les enjeux qu’il pose en termes de contrôle de l’information et de la démocratie. Il montre comment le souci de protéger les « secrets stratégiques » de l’arsenal français, pourtant impossibles à garder, se combinait avec celui de dissimuler des « secrets inavouables » – les mesures de radioactivité – rendant ainsi invisible l’étendue de la contamination radioactive.
Styles APA, Harvard, Vancouver, ISO, etc.
6

Nitinawarat, Sirin, et Prakash Narayan. « Secret Key Generation for Correlated Gaussian Sources ». IEEE Transactions on Information Theory 58, no 6 (juin 2012) : 3373–91. http://dx.doi.org/10.1109/tit.2012.2184075.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Courpasson, David, et Dima Younes. « Double or Quits : Understanding the Links between Secrecy and Creativity in a Project Development Process ». Organization Studies 39, no 2-3 (22 septembre 2017) : 271–95. http://dx.doi.org/10.1177/0170840617727780.

Texte intégral
Résumé :
Most studies on the links between secrecy and creativity have focused on individual sources of creativity and the impact of organizational management on creative initiatives. However, because of their very focus on individual practices of concealment and personal creative capacities, they have paid scant attention to collective interactions occurring around secrets. In this paper, we illuminate some mechanisms through which the creative work achieved in secret by scientists is enhanced by the exceptional character of their situation within the company. Coping with these exceptional circumstances leads the group to increase commitment, cohesion and efficiency. We theorize creativity as a result of the multiplication of social interactions among individuals and the social consequences of working and cooperating in secret. We show that secrecy can help rather than be detrimental to organizations when it is analysed as a social fabric of interactions around work and common feelings triggered by the risks of working in secret.
Styles APA, Harvard, Vancouver, ISO, etc.
8

Berndtsson, Tim. « Frimureriets medier : Om 1700-talsfrimureriets mediering av hemligheter i tal, handskrift och tryck ». Sjuttonhundratal 14 (19 décembre 2017) : 17–39. http://dx.doi.org/10.7557/4.4154.

Texte intégral
Résumé :
Masonic Media: On Mediation of Secrets in Speech, Handwriting and Print within Eighteenth Century Freemasonry.This article deals with 18th century Freemasonry as a platform for mediation of secrets. First it discusses different theoretical aspects that can be applied when studying the phenomenon of initiatory orders with communication in focus. But it also uses different masonic sources in order to investigate some of the techniques used to mediate secrets, most notably ciphers and hieroglyphs. Aligning myself with Linda Simonis’ system theoretical view of masonry, I show that masonry depended on a distinction between secret and disclosure in order to make new candidates pass from profane to initiate. In order to distribute – but also in a sense create – secrets, the masons made use of several techniques such as vows of silence, locked archives, ciphers and hieroglyphs which were used either to enclose information (at the level of the medium) or encode it (at the level of meaning). Through use of such techniques the masonic organisations – with their sharp borders between inside and outside – can itself be conceived as mediums for the “secret of masonry”. This in turn put masonry into opposition to the transparency ideal of the Enlightenment.
Styles APA, Harvard, Vancouver, ISO, etc.
9

Levy, Jean-Paul. « Le secret de l'enquête et de l'instruction, le recel et le secret des sources ». LEGICOM 48, no 1 (2012) : 47. http://dx.doi.org/10.3917/legi.048.0047.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Barnett, Robert. « The Secret Secret : Cinema, Ethnicity and Seventeenth Century Tibetan-Mongolian Relations ». Inner Asia 4, no 2 (2002) : 277–346. http://dx.doi.org/10.1163/146481702793647461.

Texte intégral
Résumé :
AbstractThe Secret History of the Potala Palace, a 1989 film about Mongol-Tibetan relations in the seventeenth century, was a milestone in the still tentative development of Tibetan film, with significant Tibetan participation and close attention to Tibetan sources of history. This paper suggests possible reasons for the withdrawal of the film from circulation, and proposes ways of reading film in the context of contested versions of ethnicity.
Styles APA, Harvard, Vancouver, ISO, etc.
11

Zhou, Qiaoqiao, et Chung Chan. « Secret Key Generation for Minimally Connected Hypergraphical Sources ». IEEE Transactions on Information Theory 66, no 7 (juillet 2020) : 4226–44. http://dx.doi.org/10.1109/tit.2020.2971215.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
12

Khisti, Ashish, Suhas N. Diggavi et Gregory W. Wornell. « Secret-Key Generation Using Correlated Sources and Channels ». IEEE Transactions on Information Theory 58, no 2 (février 2012) : 652–70. http://dx.doi.org/10.1109/tit.2011.2173629.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
13

Levchenko, Oleksandr, Anna Levchenko et Tetiana Nemchenko. « Protection of Commercial Secrets in the Context of Strategic Management of Economic Security of the Organization in the Context of Digitalization of the Economy ». Central Ukrainian Scientific Bulletin. Economic Sciences, no 7(40) (2021) : 20–30. http://dx.doi.org/10.32515/2663-1636.2021.7(40).20-30.

Texte intégral
Résumé :
The article substantiates the relevance of developing the mechanism for protecting commercial secrets of the organization in the system of strategic management of economic security of the organization, taking into account the transformational changes in the economy. Using the methods of synthesis and analysis, logical and generalizing methods, the authors determined the essence and basic features of the concept of "commercial secret" in both legal and scientific literature. The most common threats to commercial secrets have been identified and the sources of threats to the leakage of confidential information have been identified, taking into account the digitalization of economic processes. Four areas of protection of commercial secrets of an organization have been identified: legal, organizational, technical and psychological. The importance of providing valuable information in the strategic perspective of commercial secrets for the formation of the basis for its protection in future were highlighted, as well as those responsible for protecting this information with the consolidation of duties and responsibilities in collective and employment agreements were identified. In the context of formation of an effective system of strategic management of economic security of organizations in the conditions of transformational changes the directions of improvement of protection of a commercial secret are offered. Taking into account a growing share of cyber fraud and transition to the preservation of information mainly on digital media, the urgency of enhanced protection increases. Thus, the formation of information security using advanced technologies and equipment, attracting highly qualified specialists in this field, monitoring to identify potential sources of information leakage and eliminate them. Considering that most common source of disclosure of trade secrets is the staff of the organization, it is proposed to form a long-term loyalty of employees and their understanding of the importance of protecting confidential information, the introduction of socially oriented personnel strategy.
Styles APA, Harvard, Vancouver, ISO, etc.
14

Yachongka, Vamoua, Hideki Yagi et Yasutada Oohama. « Biometric Identification Systems with Noisy Enrollment for Gaussian Sources and Channels ». Entropy 23, no 8 (15 août 2021) : 1049. http://dx.doi.org/10.3390/e23081049.

Texte intégral
Résumé :
In the present paper, we investigate the fundamental trade-off of identification, secret-key, storage, and privacy-leakage rates in biometric identification systems for remote or hidden Gaussian sources. We use a technique of converting the system to one where the data flow is in one-way direction to derive the capacity region of these rates. Also, we provide numerical calculations of three different examples for the system. The numerical results imply that it seems hard to achieve both high secret-key and small privacy-leakage rates simultaneously.
Styles APA, Harvard, Vancouver, ISO, etc.
15

Temchin, Sergei. « An Interpolation from Avicenna’s The Canon of Medicine in the Ruthenian Translation of The Secret of Secrets ». Slavistica Vilnensis 65, no 1 (24 septembre 2020) : 10–19. http://dx.doi.org/10.15388/slavviln.2020.65(1).32.

Texte intégral
Résumé :
The Ruthenian translation of the medieval treatise Secretum Secretorum (“The Secret of Secrets”) was made in Kiev during the second half of the 15th century from a Hebrew version that dates back to late 13th‒early 14th centuries, when it was translated from the Arabic original, which probably originated in its final form during the 10th century. The Ruthenian translation contains certain interpolations that had been already present in the Hebrew version before it was translated into Ruthenian. They had been extracted from several Arabic and Hebrew sources, such as the treatise Al-Mansuri by Abū Bakr Muhammad ibn Zakariyā al-Rāzī (865‒925) and the treatises On Poisons, On Coitus, and On Asthma by Maimonides (1135/1138‒1204).The author argues that the same Ruthenian translation also contains a minor (one-page long) interpolation that through Hebrew mediation goes back to The Canon of Medicine written in Arabic by Avicenna (980‒1037). It is still to be established which of the seven known Medieval Hebrew translations and/or the around 30 commentaries on it (all unpublished) was used as the immediate source for the Kievan translation. Nevertheless, the newly identified Arabic origin of this particular interpolation to the Ruthenian version of the treatise The Secret of Secrets sheds some light on the prehistory of this particular text’s portion and compliments the list of sources used by the Hebrew-to-Ruthenian translators in Kiev during the second half of the 15th century.
Styles APA, Harvard, Vancouver, ISO, etc.
16

Gassaway, Bob M. « Are Secret Sources in the News Media Really Necessary ? » Newspaper Research Journal 9, no 3 (mars 1988) : 69–77. http://dx.doi.org/10.1177/073953298800900307.

Texte intégral
Résumé :
Fifteen people who said they had acted as confidential news sources for journalists were interviewed Most said they had been providing confidential information for years as a way of letting the public know things. A majority of the sources said journalists faced with pressure to identify their sources should “ask me to reconsider an agreement” of confidentiality.
Styles APA, Harvard, Vancouver, ISO, etc.
17

Oz-Salzberger, Fania, et Eli Salzberger. « The Secret German Sources of the Israeli Supreme Court ». Israel Studies 3, no 2 (octobre 1998) : 159–92. http://dx.doi.org/10.2979/isr.1998.3.2.159.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
18

Oz-Salzberger, Fania, et Eli Salzberger. « The Secret German Sources of the Israeli Supreme Court ». Israel Studies 3, no 2 (1998) : 159–92. http://dx.doi.org/10.1353/is.2005.0085.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
19

Michalon, Barthélémy, et Benjamin Puybareau. « Secret d’État et secret des sources : comment des journalistes enquêtent-ils sur le renseignement en France ? » Cultures & ; conflits, no 114-115 (20 décembre 2019) : 227–62. http://dx.doi.org/10.4000/conflits.21231.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
20

Mandzhikova, Larisa B. « Документы секретного делопроизводства Совета Астраханского калмыцкого управления (1836–1848 гг.) ». Бюллетень Калмыцкого научного центра Российской академии наук, no 3 (25 décembre 2023) : 92–110. http://dx.doi.org/10.22162/2587-6503-2023-3-27-92-110.

Texte intégral
Résumé :
Introduction. In the course of the activities of the Council of the Astrakhan Kalmyk Administration, which carried out the administrative management of Kalmykia in the period from 1836 to 1848, the documents were created for general office work and for secret ones as well. In the archival fund I-3 “Council of the Astrakhan Kalmyk Administration” of the National Archive of the Republic of Kalmykia, three files containing “secret cases” have been preserved; their study will make it possible to analyze and determine the nature of the issues considered in secret records management. The purpose of the article is to study archival documents classified as “secret” related to fund I-3 “Council of the Astrakhan Kalmyk Administration”, to explore the peculiarities of conducting secret office work in pre-revolutionary Kalmykia as well as to introduce newly identified archival documents into scientific circulation. Results. Documents created during the activities of the Kalmyk Administration Council and containing “secret” information are unique sources for studying the issues of organizing work with documents of a secret nature in one of the outskirts of pre-revolutionary Russia.
Styles APA, Harvard, Vancouver, ISO, etc.
21

Wang, Zichi. « Multisource Data Hiding in Digital Images ». Symmetry 14, no 5 (27 avril 2022) : 890. http://dx.doi.org/10.3390/sym14050890.

Texte intégral
Résumé :
In this paper, we propose a new data-hiding framework: multisource data hiding, in which multiple senders (multiple sources) are able to transmit different secret data to a receiver via the same cover image symmetrically. We propose two multisource data-hiding schemes, i.e., separable and anonymous, according to different applications. In the separable scheme, the receiver can extract the secret data transmitted by all senders using the symmetrical data-hiding key. A sender is unable to know the content of the secret data that is not transmitted by them (non-source sender). In the anonymous scheme, it is unnecessary to extract all secret data on the receiver side. The content extracted by the receiver is a co-determined result of the secret data transmitted by all senders. Details of the secret data are unknown to the receiver and the non-source senders. In addition, the two proposed schemes achieve multisource data hiding without decreasing the undetectability of data hiding.
Styles APA, Harvard, Vancouver, ISO, etc.
22

Bassi, Germán, Pablo Piantanida et Shlomo Shamai (Shitz). « The Secret Key Capacity of a Class of Noisy Channels with Correlated Sources ». Entropy 21, no 8 (26 juillet 2019) : 732. http://dx.doi.org/10.3390/e21080732.

Texte intégral
Résumé :
This paper investigates the problem of secret key generation over a wiretap channel when the terminals observe correlated sources. These sources are independent of the main channel and the users overhear them before the transmission takes place. A novel outer bound is proposed and, employing a previously reported inner bound, the secret key capacity is derived under certain less-noisy conditions on the channel or source components. This result improves upon the existing literature where the more stringent condition of degradedness is required. Furthermore, numerical evaluation of the achievable scheme and previously reported results for a binary model are presented; a comparison of the numerical bounds provides insights on the benefit of the chosen scheme.
Styles APA, Harvard, Vancouver, ISO, etc.
23

Muramatsu, J., K. Yoshimura, K. Arai et P. Davis. « Secret Key Capacity for Optimally Correlated Sources Under Sampling Attack ». IEEE Transactions on Information Theory 52, no 11 (novembre 2006) : 5140–51. http://dx.doi.org/10.1109/tit.2006.883552.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
24

James, Ryan, Jeffrey Emenheiser et James Crutchfield. « Unique Information and Secret Key Agreement ». Entropy 21, no 1 (24 décembre 2018) : 12. http://dx.doi.org/10.3390/e21010012.

Texte intégral
Résumé :
The partial information decomposition (PID) is a promising framework for decomposing a joint random variable into the amount of influence each source variable X i has on a target variable Y, relative to the other sources. For two sources, influence breaks down into the information that both X 0 and X 1 redundantly share with Y, what X 0 uniquely shares with Y, what X 1 uniquely shares with Y, and finally what X 0 and X 1 synergistically share with Y. Unfortunately, considerable disagreement has arisen as to how these four components should be quantified. Drawing from cryptography, we consider the secret key agreement rate as an operational method of quantifying unique information. Secret key agreement rate comes in several forms, depending upon which parties are permitted to communicate. We demonstrate that three of these four forms are inconsistent with the PID. The remaining form implies certain interpretations as to the PID’s meaning—interpretations not present in PID’s definition but that, we argue, need to be explicit. Specifically, the use of a consistent PID quantified using a secret key agreement rate naturally induces a directional interpretation of the PID. We further reveal a surprising connection between third-order connected information, two-way secret key agreement rate, and synergy. We also consider difficulties which arise with a popular PID measure in light of the results here as well as from a maximum entropy viewpoint. We close by reviewing the challenges facing the PID.
Styles APA, Harvard, Vancouver, ISO, etc.
25

Yılmaz, Hacı. « The concept of secret in Anatolian Alewism Anadolu Aleviliği’nde sır kavramı ». Journal of Human Sciences 14, no 2 (5 juillet 2017) : 2200. http://dx.doi.org/10.14687/jhs.v14i2.4692.

Texte intégral
Résumé :
Groups embracing ideas that do not conform to the ideas prevalent in the society, may choose to keep some of their views secret from the rest of the society in order to avoid outside pressure. Alawites in the Islamic world have developed a similar reflex both to protect themselves from outside pressure and to maintain discipline within their own group. This paper tackles the notion of secret based on a passage found in the introduction of a Futuwwat Namah we came across in the Futuwwat Namah collection Number 8602 in the National Library Manuscripts Collection. The passage tells about how the Prophet disclosed to Ali some of the secrets he received during his dialogue with God in the Night of Ascension. Protecting this secret was deemed very important and although the nature of the secret is not to be found in any written or oral source, measures were taken to protect it from non-Alawites and penalties were set for those would reveal it. In this paper, the passage in question is transliterated in Modern Turkish Alphabet and presented to the reader. Also, there is a discussion of the nature of this secret and what this secret could be in the light of written Alawite sources namely Buyruks of Imam Jafar and Sheikh Safi and some modern works.Extended English abstract is in the end of PDF (TURKISH) file. ÖzetToplumun genel düşüncesi dışında fikirlere sahip olan gruplar dışarıdan gelebilecek baskılara maruz kalmamak için görüşlerinden en azından bazılarını toplumun diğer bireylerinden gizleme yoluna gitmişlerdir. İslam dünyasının içinde yer alan Aleviler hem kendilerini dış baskılardan koruyabilmek hem de kendi grup disiplinlerini sağlayabilmek adına bu yönde refleks geliştirmişlerdir. İşte bu araştırma, Milli Kütüphane Yazmaları arasında 8602 numaralı Fütüvvetname Mecmuası’nda yer alan bir fütüvvetnamenin baş kısmındaki Hz. Peygamber’in Miraç’ta Tanrı ile konuşmalarından bir kısmını Hz. Ali’ye sır olarak verilmesini anlatan bölümden hareketle Alevilikteki sır kavramı üzerinde durmaktadır. Başkalarından gizlenmesine büyük önem verilen sırrın mahiyeti ne sözlü ne de yazılı kaynaklarda yer almamasına rağmen, Alevi olmayanlardan bunların korunması hususunda bazı tedbirler alınmış, hatta sırrı açıklayanlar için bazı cezalar öngörülmüştür. Burada hem bahsedilen kısım Türkçeye aktarılarak okuyucuya sunulmuş hem de Aleviliğin yazılı kaynakları olan İmam Cafer ve Şeyh Safi Buyrukları başta olmak üzere modern çalışmalar ışığında sırrın mahiyeti tartışılmıştır.
Styles APA, Harvard, Vancouver, ISO, etc.
26

Kreilkamp, Ivan. « Meat, Flesh, Skin : The Carnality Of The Secret Agent ». Studies in the Novel 56, no 1 (mars 2024) : 21–40. http://dx.doi.org/10.1353/sdn.2024.a921057.

Texte intégral
Résumé :
Abstract: This essay considers Conrad’s novel The Secret Agent in relation to what I will suggest are several relevant intertexts or sources for it—including Upton Sinclair’s famous muckraking 1906 exposé of the conditions in the Chicago stockyards, The Jungle , as well as Classical mythological tales depicting “cannibal feasts.” I point to these sources in order to argue that Conrad uses the novel to consider the question of the overlap between the direct violence of terrorism and the less direct violence of meat production. The novel, I suggest, can be read as an extended meditation on the embodied nature of human flesh.
Styles APA, Harvard, Vancouver, ISO, etc.
27

Ownby, David. « The Heaven and Earth Society as Popular Religion ». Journal of Asian Studies 54, no 4 (novembre 1995) : 1023–46. http://dx.doi.org/10.2307/2059958.

Texte intégral
Résumé :
The profound disdain with which most governments—Qing, Republican, Communist, or, in the case of Southeast Asia, colonial—have treated Chinese secret societies, as well as the undeniable involvement of many of these societies in violent and criminal activities, have obscured the religious elements at the core of the early Heaven and Earth Society (Tiandihui), the most widespread and well-known of Chinese secret societies. The vast historiography treating Chinese secret societies, often grounded in documents produced by hostile governments, has in large measure reproduced the image of secret societies contained in these documents, even if not all scholars have embraced the moral and legal assumptions of their sources. Consequently, society practices and symbols which would be treated as religious in other contexts are frequently dismissed as epiphenomenal or “esoteric” (Stanton 1900, 9; Morgan I960, 5), or as functional means of unifying “dissident” groups (Yang 1961, 61–64).
Styles APA, Harvard, Vancouver, ISO, etc.
28

Matveev, Ivan, et Ilia Safonov. « From Iris Image to Embedded Code : System of Methods ». Algorithms 16, no 2 (6 février 2023) : 87. http://dx.doi.org/10.3390/a16020087.

Texte intégral
Résumé :
Passwords are ubiquitous in today’s world, as are forgetting and stealing them. Biometric signs are harder to steal and impossible to forget. This paper presents a complete system of methods that takes a secret key and the iris image of the owner as input and generates a public key, suitable for storing insecurely. It is impossible to obtain source data (i.e., secret key or biometric traits) from the public key without the iris image of the owner, the irises of other persons will not help. At the same time, when the iris image of the same person is presented the secret key is restored. The system has been tested on several iris image databases from public sources. It allows storing 65 bits of the secret key, with zero possibility to unlock it with the impostor’s iris and 10.4% probability to reject the owner in one attempt.
Styles APA, Harvard, Vancouver, ISO, etc.
29

Amidon, Debra M. « Dialogue with Customers : Secret to Innovation Strategy ». International Journal of Innovation Management 01, no 01 (mars 1997) : 73–87. http://dx.doi.org/10.1142/s136391969700005x.

Texte intégral
Résumé :
Enterprises are discovering a rededication to customers in ways rarely practised other than by the entrepreneurial firm. However, quality and restructuring methodologies have returned executives to their own raison d'etre by positioning customers at the heart of business survival. At the same time, cross-boundary alliances are demanding new partnering techniques with all stakeholders, including customers. New initiatives are commonplace, but are generally without an understanding that something is fundamentally different between customer satisfaction and the success of your customers. This article introduces the concepts in ways that are easily practised. Simply stated, treat your customers as sources of knowledge, not someone to whom you solely deliver products and services. By practising value-system (rather than value-chain) strategies, companies can take advantage of the business opportunities afforded by a collaborative economy. Similarly, by defining Strategic Business Network (SBN's) rather than Strategic Business Units (SBU's), companies can leverage all available knowledge sources. Most importantly, a symbiotic relationship with consumers, customers or clients can help a company envision products and services for unarticulated needs and unserved markets. Companies which are practising new ways of interfacing with customers are realising significant business results. A profile of customer innovation at Steelcase North America provides an illustration of this new partnering relationship.
Styles APA, Harvard, Vancouver, ISO, etc.
30

Kara, György. « On some sources of Sagang Sechen’s Teachings (1662) ». Acta Orientalia Academiae Scientiarum Hungaricae 73, no 4 (17 décembre 2020) : 603–15. http://dx.doi.org/10.1556/062.2020.00031.

Texte intégral
Résumé :
AbstractNine of the seventy-nine alliterative quatrains of Sagang Sechen’s great gnomic poem are revisited, their possible literary sources suggested, their interpretation revised. Seven of them go back, entirely or partially, to Sa-skya Paṇḍita’s Subhāṣitaratnanidhi, one to the Janapoṣanabindhu, one of Nāgārjuna’s nītiśāstras, and one uses a comparison known from the Secret History. Parallels are quoted from Sonom Gara’s and the Oirat Zaya Paṇḍita’s prose translations of the Subhāṣitaratnanidhi. Also discussed are the rare word küčigei and the possible identity of Sonom Gara and Suonanqilo.
Styles APA, Harvard, Vancouver, ISO, etc.
31

Ettinger, David. « Sources : Spies, Wiretaps, and Secret Operations : An Encyclopedia of American Espionage ». Reference & ; User Services Quarterly 51, no 1 (1 septembre 2011) : 82. http://dx.doi.org/10.5860/rusq.51n1.82.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
32

Levchenko, I., А. Firsov, L. Snigur et E. Ivanchenko. « PERFECTION OF METHODOLOGY OF ESTIMATION OF EFFICIENCY OF SUBSYSTEM OF REARWARD SECRET SERVICE IN THE SEPARATE MECHANIZED BRIGADE DURING CONDUCT OF BATTLE ACTIONS ». Collection of scientific works of Odesa Military Academy 2, no 14 (25 janvier 2021) : 156–63. http://dx.doi.org/10.37129/2313-7509.2020.14.2.156-163.

Texte intégral
Résumé :
In the article the improved methodology of evaluation of efficiency of subsystem of rearward secret service offers in the separate mechanized brigade that can be used for the evaluation of efficiency of the system of the rearward providing of the separate mechanized brigade during the conduct of battle actions. On efficiency of implementation of tasks from rearward secret service basic influence is carried out degree of full strength by the personnel of group of rearward secret service and their knowledge on speciality, organization of connection with a senior chief, realization of order in relation to realization of rearward secret service, the state of transport vehicles on that comes true rearward secret service, terms, season, daypart. All of it can carry out substantial influence on implementation of tasks from rearward secret service. The improved methodology of evaluation of efficiency of subsystem of rearward secret service is given in the separate mechanized brigade that can be used for the evaluation of efficiency of the system of the rearward providing of the separate mechanized brigade during the conduct of battle actions. During research of process of the rearward providing of troops an important theoretical and practical task is an estimation of efficiency of subsystem of rearward secret service in the separate mechanized brigade during the conduct of battle actions. The certain going near the decision of this task were worked out in a number of sources. However, experience of anti-terror operation on territory Donetsk and Luhansk areas, other armed conflicts of the last decades testifies to the necessity of perfection of methodology of estimation of efficiency of subsystem of rearward secret service that would take into account changes in requirements to the subsystem of rearward secret service in the separate mechanized brigade during, and promoted efficiency of the system of the rearward providing on the whole. Keywords: separate mechanized brigade, rearward providing, efficiency of subsystem rearward secret service, reconnaissance group, method of expert evaluation, objects of rearward secret service.
Styles APA, Harvard, Vancouver, ISO, etc.
33

Sekga, Comfort, et Mhlambululi Mafu. « Tripartite Quantum Key Distribution Implemented with Imperfect Sources ». Optics 3, no 3 (21 juin 2022) : 191–208. http://dx.doi.org/10.3390/opt3030019.

Texte intégral
Résumé :
Multipartite quantum key distribution (QKD) is a promising area of quantum networks that provides unconditional secret keys among multiple parties, enabling only legitimate users to decrypt the encrypted message. However, security proofs of existing multipartite QKD typically assume perfect state preparation devices of legitimate users and neglect the relative rotation of reference frames. These presumptions are, nevertheless, very difficult to meet in practice, and thus the security of current multipartite QKD implementations is not guaranteed. By combining the idea of a loss tolerant technique, introduced by Tamaki et al. (K. Tamaki et al., Phys. Rev. A, 90, 052314, 2014), and the concept of a reference frame-independent protocol, we propose a three-party QKD protocol that considers state preparation flaws and the slow drift of reference frames. Through a numerical simulation, the influence of misaliged reference frames on the protocol’s stability was examined by drifting reference frames through angles β=π/5, β=π/6 and β=π/7. In addition, the performance of the proposed protocol was examined for the encoding flaws set at δ=0.35, δ=0.20, and δ=0.10. The results show that the protocol is robust against state preparation flaws, and is insignificantly impacted by misalignment of the reference frames because the achieved transmission distances and secret key rates are comparable to the perfect scenarios. This work dramatically contributes toward the realization of practical and secure multipartite QKD. The proposed protocol has direct applications in quantum communication network environments that involve unknown and slowly varying reference frames, web conferences, and online communications.
Styles APA, Harvard, Vancouver, ISO, etc.
34

Kinsella, Helen M. « Sex as the secret : counterinsurgency in Afghanistan ». International Theory 11, no 1 (18 décembre 2018) : 26–47. http://dx.doi.org/10.1017/s1752971918000210.

Texte intégral
Résumé :
AbstractI explore the construction of women as the secret for the ‘successful’ prosecution of war in Afghanistan. To do so, I take up the mobilization of gender in the US counterinsurgency doctrine as deployed in Afghanistan. I draw on the 2006 Counterinsurgency Field Manual, human rights and humanitarian reports, and scholarly works to identify and analyze this mobilization, paying attention to the colonial histories upon which COIN explicitly and implicitly relies. By critically integrating these sources and the paradigmatic moments that exemplify COIN, I demonstrate the constitutive relationship of gender and COIN. The valence of the secret – of women as concealing, revealing, being, and bearing the secret – is still a lesser explored element in the analysis of the gendering of COIN and of its ‘military orientalism’. Even as scholars have powerfully shown how, in the case of Afghanistan and elsewhere, the veil functions as an overdetermined and ‘multilayered signifier’ in its own right, symbolizing the ‘tension between disclosure and concealment that defines the dominant conception of the secret’, less subject to detailed analysis in case of Afghanistan is the ways in which Afghan women are constituted through COIN in polysemous relation to the notion of the secret.
Styles APA, Harvard, Vancouver, ISO, etc.
35

Van Netten, Djoeke. « Spaces on Ships ». TSEG - The Low Countries Journal of Social and Economic History 18, no 3 (29 novembre 2021) : 107–24. http://dx.doi.org/10.52024/tseg.11044.

Texte intégral
Résumé :
Djoeke van Netten examines the interplay between privacy and secrecy in the ships of the Dutch East India Companies (1595-1799). Space aboard a ship was scarce and privacy a rare privilege. Netten starts with a discussion of the sources available as well as those lost to history. She then continues by examining what can be known about the protection of and access to (secret) information and (private) belongings aboard ships. Cases where privacy was violated and secrets revealed emerge as some of the most informative historical events to be examined in this context. As she confronts her historical examples with relevant theoretical and historiographical concepts, she concludes by raising important questions for further research on privacy and secrecy aboard ships.
Styles APA, Harvard, Vancouver, ISO, etc.
36

Makarov, A. V., N. Yu Gusevskaya et A. S. Petrov. « Counteraction to High Treason in Russian Legislation of the Second Half of the 19th — Early 20th Centuries ». Nauchnyi dialog, no 1 (27 janvier 2021) : 337–56. http://dx.doi.org/10.24224/2227-1295-2021-1-337-356.

Texte intégral
Résumé :
The problem of improving the criminal liability of the subjects of the Russian Empire at the end of the nineteenth century for espionage and spilling state secrets to a foreign state is considered. The relevance of the study is due to the importance of the problem under study for the effective functioning of the Russian state. The study is based on historical sources of a regulatory and legal nature and is interdisciplinary in nature. Particular attention is paid to the study of legal norms, the identification of the type and amount of punishments for the commission of espionage by Russian citizens and spilling the state secrets to a foreign state. It is indicated that in the second half of the 19th century, the intensity of intelligence of foreign secret services in the territory of the Russian Empire increased. It is noted that more and more often foreign powers involved Russian subjects in the process of obtaining Russian secrets. At the same time, the analysis of the sources made it possible to reveal a sufficient limitation of the institution of counteracting espionage and disclosure of state secrets to foreign states in the Russian Empire at the end of the 19th century. It is proved that it was precisely these phenomena at the end of the 19th and the beginning of the 20th centuries that determined the authorities’ desire to progressively improve legal mechanisms that counteract threats and challenges to national security.
Styles APA, Harvard, Vancouver, ISO, etc.
37

Kruglyakov, Sergey V. « Realization of the Socio-Legal Function by Appointed Advocate in Criminal and Civil Cases Involving State Secrets ». Общество : политика, экономика, право, no 2 (21 février 2024) : 94–103. http://dx.doi.org/10.24158/pep.2024.2.10.

Texte intégral
Résumé :
The article delves into the realization of the social and legal function of the appointed advocate in criminal and civil proceedings in cases involving state secrets, as well as problematic issues and liability that may occur in case of its divulgence. The relevance of the research topic is that in Russia there is an increase in the number of convictions under Article 283 of the Criminal Code of the Russian Federation – disclosure of state secrets. In addition, the article discusses theoretical issues, the relationship between attorney-client privilege and state secrets, and provides examples from judicial practice. From a certain angle, the author is convinced that it is necessary to investigate the issue of the advocate’s activity on appointment in criminal and civil cases, in which there is a state secret, in order to further develop recommendations for advocates. The formal legal method, the method of comparative analysis, synthesis, the inductive method, generalization and systematization of scientific sources on the research problem, comparative and predictive methods were used.
Styles APA, Harvard, Vancouver, ISO, etc.
38

Beglov, Alexey. « Special Services and Religious Organizations in the Soviet State : Collaboration Mechanisms, Survival Strategies, Sources ». ISTORIYA 13, no 6 (116) (2022) : 0. http://dx.doi.org/10.18254/s207987840021686-3.

Texte intégral
Résumé :
In this article the authors formulate generalizing observations on the mechanisms of interaction between the Soviet secret services and religious communities in the USSR during the whole period of its existence. The basis for these generalizations was the research of the past thirty years as well as the materials of the international symposium “Special Services and Religious Organizations in the Soviet State: Collaboration Mechanisms, Survival Strategies, Sources” held by the Centre for the Study of the History of Religion and Church History at the Department of Modern and Contemporary History, Institute of World History, Russian Academy of Sciences, on 27—28 October 2021. Infiltration and a complex operational game involved the control and instrumentalization rather than destruction of even those religious communities whose existence was considered unacceptable in the USSR. Instead of the declared reduction of the influence of religious organizations, cooperation was indirectly helping to stabilize their position and even increase the influence of their leaders. On the part of the believers, cooperation with the secret services proved to be a complex survival strategy both at the micro level (parish, congregation, group) and at the institutional level. In light of these observations, the authors raise the question of the need to develop analytical criteria for cooperation, based on a comprehensive and qualitative analysis of case-by-case information, rather than formal criteria (the presence or absence of a cooperation agreement). In addition, the authors draw attention to the change in the position of the researcher, who is no longer an “unmasker” of the hierarchs and laity who collaborated with the special services. Here, the question of ethical norms and the research tools of the historian working with the documents of the secret services arises with new urgency.
Styles APA, Harvard, Vancouver, ISO, etc.
39

Kozák, Jan A. « A Minister to the Secret Fire : Pavel Hošekʼs take on J. R. R. Tolkien (review) ». CENTRAL EUROPEAN JOURNAL FOR CONTEMPORARY RELIGION 4, no 1 (11 avril 2022) : 71–75. http://dx.doi.org/10.14712/25704893.2021.4.

Texte intégral
Résumé :
Book review on Hošek, Pavel, Sloužím Tajnému ohni: Duchovní zdroje literární tvorby J.R.R. Tolkiena [I Am a Servant of Secret Fire: Spiritual Sources of J.R.R. Tolkien’s Literary Work], Brno: Centrum pro studium demokracie a kultury 2019, 191 p.
Styles APA, Harvard, Vancouver, ISO, etc.
40

NOGAJ, Adam. « TECHNICAL SOURCES OF OBTAINING INTELLIGENCE INFORMATION ». Scientific Journal of the Military University of Land Forces 162, no 4 (1 octobre 2011) : 109–32. http://dx.doi.org/10.5604/01.3001.0002.3202.

Texte intégral
Résumé :
The author presents the development of technologies used to obtain intelligence information – obviously in a considerable simplification and in brief – from the beginning to the end of the 20th century. The author emphasises the timeless importance of the scientific and technological revolution, which enables the introduction of new, previously unknown tools. The purpose of these tools along with the traditional spying methods, which have functioned for centuries and millennia, is to obtain information. The author claims that the technical measures of obtaining information were not the invention of World War II. Most technologies for obtaining intelligence information used during World War II had already been known and widely used during World War I. During this war fighting armies paid considerable attention to radio reconnaissance, especially one of its forms: crypto-analysis, i.e. decoding. In that period air reconnaissance, including air photography, was also widely used. Moreover, tools to eavesdrop the enemy’s telephone networks situated from 10 to 20 and even tens of kilometres away were also known. With the example of the Third Reich, the author presents a horrifying picture of the development of the technical sources of obtaining intelligence information for the structures of military intelligence, civilian intelligence and secret police typical of a totalitarian state attempting to control everyone and everything. Another example is the Soviet Army, which at the end of World War II had very well-developed technical structures for obtaining intelligence information and made plenty of effort to obtain it. The most considerable attention was devoted to technical reconnaissance measures possessed by Russian fronts.The final part of the article presents an outline of the most significant information related to the contemporary systems of obtaining intelligence information on the basis of the following intelligence: air, satellite, electronic, radio, radiolocation and information communications technology. The author proves that human sources of information have ceased to play a key role in the past decades. Moreover, he proves that for many decades major intelligence expenditure has been incurred on electronic intelligence by world powers. The secret ring is no longer the most important and has definitely ceased to be the only source of obtaining information on a potential foe.
Styles APA, Harvard, Vancouver, ISO, etc.
41

WATANABE, Shun, et Yasutada OOHAMA. « Secret Key Agreement from Correlated Gaussian Sources by Rate Limited Public Communication ». IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E93-A, no 11 (2010) : 1976–83. http://dx.doi.org/10.1587/transfun.e93.a.1976.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
42

Xu, Yinfei, et Daming Cao. « Secret Key Generation From Vector Gaussian Sources With Public and Private Communications ». IEEE Transactions on Information Theory 67, no 8 (août 2021) : 5420–31. http://dx.doi.org/10.1109/tit.2021.3086536.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
43

Duclert, Vincent. « Des archives pour Dreyfus. Du secret des dossiers � la transparence des sources ». Sigila N�25, no 1 (2010) : 151. http://dx.doi.org/10.3917/sigila.025.0151.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
44

Watanabe, S., et Y. Oohama. « Secret Key Agreement From Vector Gaussian Sources by Rate Limited Public Communication ». IEEE Transactions on Information Forensics and Security 6, no 3 (septembre 2011) : 541–50. http://dx.doi.org/10.1109/tifs.2011.2132130.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
45

Boche, H., et G. Janßen. « Distillation of secret-key from a class of compound memoryless quantum sources ». Journal of Mathematical Physics 57, no 8 (août 2016) : 082201. http://dx.doi.org/10.1063/1.4960217.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
46

Izzo, Massimo. « The Origin of The Secret of the Golden Flower : Sources and Translations ». Journal of Daoist Studies 16, no 1 (2023) : 81–104. http://dx.doi.org/10.1353/dao.2023.0004.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
47

Wang, Di. « Heroic Mother and Wise Wife ». Inner Asia 23, no 2 (18 novembre 2021) : 212–32. http://dx.doi.org/10.1163/22105018-12340172.

Texte intégral
Résumé :
Abstract Thirteenth-century sources provide us with striking images of Mongol noblewomen, which are not eclipsed by the heroic conquests and military exploits of their men. While recognising the complexity of gender roles in pre-imperial Mongol society, this article aims to explore the specific responsivities carried by Hö’elün and Börte in the narrative of The Secret History of the Mongols. The selective presentation of their characters and duties further reveals the goal of the Secret Historian to create a ruling model, which includes a brave widowed mother and an intelligent wife for the Qan of the empire.
Styles APA, Harvard, Vancouver, ISO, etc.
48

SEMENIUK, O. « Criminological analysis of threats in the sphere of protection of state secrets ». INFORMATION AND LAW, no 2(17) (29 juin 2016) : 106–13. http://dx.doi.org/10.37750/2616-6798.2016.2(17).272909.

Texte intégral
Résumé :
This article presents the analysis of the external and internal threats in the sphere of protection of state secret, distinguishes sources and carriers of such threats, considers motivation of illegal activity to the detriment of Ukraine and mechanisms of its formation.
Styles APA, Harvard, Vancouver, ISO, etc.
49

Chan, Alfred L., et Andrew J. Nathan. « The Tiananmen Papers Revisited ». China Quarterly 177 (mars 2004) : 190–214. http://dx.doi.org/10.1017/s0305741004000116.

Texte intégral
Résumé :
Authentic Chinese internal documents matter greatly as historical records that illuminate our understanding of Chinese politics. Yet careful scrutiny shows that the Chinese book version of the Tiananmen Papers is part fiction and part documentary history based on open and semi-open sources and document collections. The alleged transcripts of top-level meetings are basically stitched together ex post facto (even by the admission of the editors) and then presented as secret documents. Furthermore, the English translation is a heavily retouched version of the Chinese with differences in claims of authenticity, translation, citation and style. There is little evidence that any real secret documents are in the hands of the Chinese author, and even if they were, the two books under consideration are really secondary sources steps removed from the originals. The editors strongly vouch for the authenticity of these two books, but their efforts are inadequate and unconvincing.
Styles APA, Harvard, Vancouver, ISO, etc.
50

Veszprémy, Márton. « Astrologers and the Hungarian State Security Agency ». Polish Journal of the Arts and Culture New Series, no 17 (1/2023) (mai 2023) : 53–67. http://dx.doi.org/10.4467/24506249pj.23.004.18997.

Texte intégral
Résumé :
The history of astrology in twentieth-century Hungary has not yet been a subject of research. Consequently, the attitude of Hungarian state security agency towards astrologers and astrology during the communist era is unknown – especially since the files of agents have not been made public in Hungary. In the present article, I examine the question through the cases of Sándor Raisz, András László, Zoltán Lemhényi and Viktor Juhász-Schlatter, using sources preserved in the Historical Archives of the Hungarian State Security Services (Állambiztonsági Szolgálatok Történeti Levéltára). I conclude that the secret service was only interested in astrologers because they met regularly with their students, all regular and secret meetings being politically suspicious. Astrology as an illegal activity or a subject of contempt only appears in sources from the 1980s. All the astrologers discussed in my article were in one way or another opposed to the ruling communist regime. Part of the reason for this is that astrology was a popular intellectual, middle-class activity in the Horthy era, and representatives of this stratum were considered enemies of the regime after 1945. Also, the communist system represented an avowedly materialist ideology, while astrology flourished primarily among those interested in mysticism, theosophy and anthroposophy. The picture that emerges from the sources is that astrology classes were not overtly political, but their participants were nevertheless bound together by the knowledge that they were listening to forbidden, secret teachings. In this respect, astrology can be classified as counterculture in the era. The topic also offers a valuable insight into the overlapping subcultures in twentieth-century Hungary.
Styles APA, Harvard, Vancouver, ISO, etc.
Nous offrons des réductions sur tous les plans premium pour les auteurs dont les œuvres sont incluses dans des sélections littéraires thématiques. Contactez-nous pour obtenir un code promo unique!

Vers la bibliographie