Artykuły w czasopismach na temat „Secret des sources”

Kliknij ten link, aby zobaczyć inne rodzaje publikacji na ten temat: Secret des sources.

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Secret des sources”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.

1

Perraud, Antoine. "Secret des sources". Médium 37-38, nr 4 (2013): 213. http://dx.doi.org/10.3917/mediu.037.0213.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Rowson, Everett K., W. F. Ryan i Charles B. Schmitt. "Pseudo-Aristotle, The Secret of Secrets. Sources and Influences". Journal of the American Oriental Society 107, nr 1 (styczeń 1987): 188. http://dx.doi.org/10.2307/603000.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Jovicic, Katarina. "Trade Secret Protection in the Law of the Republic of Serbia". Pravo i privreda 60, nr 4 (24.12.2022): 655–74. http://dx.doi.org/10.55836/pip_22403a.

Pełny tekst źródła
Streszczenie:
The subject of this paper is analysis of trade secret protection in Serbian law, which is organized and implemented at two levels: within the business company and the proceedings before the court. By applying the dogmatic method of research, the rules of current and relevant domestic sources of law are analysed, while the comparative method is used for comparing the Serbian system of trade secret legal protection with the analogous legal system in the European Union. The starting hypothesis is that the protection of trade secrets is a strategic issue that requires thoughtful planning and organization as well as constant improvement to preserve trade secrets and use their commercial potential for as long as possible. The aim of this work is to reach the conclusions that are practically usable both for trade secrets holders and for everyone else who participates in various roles in judicial procedures for trade secret protection.
Style APA, Harvard, Vancouver, ISO itp.
4

Warusfel, Bertrand. "Le droit peut-il encore protéger le secret ?" Titre VII N° 10, nr 1 (24.08.2023): 1–10. http://dx.doi.org/10.3917/tvii.010.0001.

Pełny tekst źródła
Streszczenie:
Le secret est une pratique qui a toujours eu maille à partir avec le droit, d’autant que les exigences de transparence ou de publicité sont de plus en plus importantes dans notre société. Entre des obligations de secret et les différents droits d’information que tout État produit, existe une tension dialectique. On le constate dans de nombreux domaines (qu’il s’agisse notamment des secrets professionnels ou de celui des sources des journalistes), mais la numérisation bouscule également les périmètres de confidentialité que la loi cherche à préserver, comme le montrent les difficultés de protection des secrets de la vie privée à l’heure de la révolution numérique. Pour autant, il ne faut pas renoncer à préserver des espaces de secret protégés par la loi. On peut constater qu’il est possible et nécessaire de les redéfinir à condition d’en faire apparaître la légitimité et de les accompagner d’un encadrement suffisamment efficace pour en limiter les éventuels usages abusifs. Comme tout secret constitue une restriction de l’un de nos droits les plus fondamentaux, celui de s’exprimer et de communiquer, il est salutaire que le droit ne protège pas inconditionnellement les secrets mais qu’il ne les préserve que lorsque cela paraît légitime et proportionné.
Style APA, Harvard, Vancouver, ISO itp.
5

Fraise, Thomas. "Comment cacher un nuage ? L’organisation du secret des essais atmosphériques français (1957-1974)". Relations internationales 194, nr 2 (30.06.2023): 11–26. http://dx.doi.org/10.3917/ri.194.0011.

Pełny tekst źródła
Streszczenie:
Comment organiser le secret autour d’une activité aussi remarquable, et aussi sensible, que des essais nucléaires atmosphériques ? Comment contrôler l’information quand celle-ci est – littéralement – transportée par le vent ? Basé sur des sources primaires, cet article se penche sur le régime original de secret organisé autour des sites d’essais français entre 1957 et 1974, et sur les enjeux qu’il pose en termes de contrôle de l’information et de la démocratie. Il montre comment le souci de protéger les « secrets stratégiques » de l’arsenal français, pourtant impossibles à garder, se combinait avec celui de dissimuler des « secrets inavouables » – les mesures de radioactivité – rendant ainsi invisible l’étendue de la contamination radioactive.
Style APA, Harvard, Vancouver, ISO itp.
6

Nitinawarat, Sirin, i Prakash Narayan. "Secret Key Generation for Correlated Gaussian Sources". IEEE Transactions on Information Theory 58, nr 6 (czerwiec 2012): 3373–91. http://dx.doi.org/10.1109/tit.2012.2184075.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Courpasson, David, i Dima Younes. "Double or Quits: Understanding the Links between Secrecy and Creativity in a Project Development Process". Organization Studies 39, nr 2-3 (22.09.2017): 271–95. http://dx.doi.org/10.1177/0170840617727780.

Pełny tekst źródła
Streszczenie:
Most studies on the links between secrecy and creativity have focused on individual sources of creativity and the impact of organizational management on creative initiatives. However, because of their very focus on individual practices of concealment and personal creative capacities, they have paid scant attention to collective interactions occurring around secrets. In this paper, we illuminate some mechanisms through which the creative work achieved in secret by scientists is enhanced by the exceptional character of their situation within the company. Coping with these exceptional circumstances leads the group to increase commitment, cohesion and efficiency. We theorize creativity as a result of the multiplication of social interactions among individuals and the social consequences of working and cooperating in secret. We show that secrecy can help rather than be detrimental to organizations when it is analysed as a social fabric of interactions around work and common feelings triggered by the risks of working in secret.
Style APA, Harvard, Vancouver, ISO itp.
8

Berndtsson, Tim. "Frimureriets medier: Om 1700-talsfrimureriets mediering av hemligheter i tal, handskrift och tryck". Sjuttonhundratal 14 (19.12.2017): 17–39. http://dx.doi.org/10.7557/4.4154.

Pełny tekst źródła
Streszczenie:
Masonic Media: On Mediation of Secrets in Speech, Handwriting and Print within Eighteenth Century Freemasonry.This article deals with 18th century Freemasonry as a platform for mediation of secrets. First it discusses different theoretical aspects that can be applied when studying the phenomenon of initiatory orders with communication in focus. But it also uses different masonic sources in order to investigate some of the techniques used to mediate secrets, most notably ciphers and hieroglyphs. Aligning myself with Linda Simonis’ system theoretical view of masonry, I show that masonry depended on a distinction between secret and disclosure in order to make new candidates pass from profane to initiate. In order to distribute – but also in a sense create – secrets, the masons made use of several techniques such as vows of silence, locked archives, ciphers and hieroglyphs which were used either to enclose information (at the level of the medium) or encode it (at the level of meaning). Through use of such techniques the masonic organisations – with their sharp borders between inside and outside – can itself be conceived as mediums for the “secret of masonry”. This in turn put masonry into opposition to the transparency ideal of the Enlightenment.
Style APA, Harvard, Vancouver, ISO itp.
9

Levy, Jean-Paul. "Le secret de l'enquête et de l'instruction, le recel et le secret des sources". LEGICOM 48, nr 1 (2012): 47. http://dx.doi.org/10.3917/legi.048.0047.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Barnett, Robert. "The Secret Secret: Cinema, Ethnicity and Seventeenth Century Tibetan-Mongolian Relations". Inner Asia 4, nr 2 (2002): 277–346. http://dx.doi.org/10.1163/146481702793647461.

Pełny tekst źródła
Streszczenie:
AbstractThe Secret History of the Potala Palace, a 1989 film about Mongol-Tibetan relations in the seventeenth century, was a milestone in the still tentative development of Tibetan film, with significant Tibetan participation and close attention to Tibetan sources of history. This paper suggests possible reasons for the withdrawal of the film from circulation, and proposes ways of reading film in the context of contested versions of ethnicity.
Style APA, Harvard, Vancouver, ISO itp.
11

Zhou, Qiaoqiao, i Chung Chan. "Secret Key Generation for Minimally Connected Hypergraphical Sources". IEEE Transactions on Information Theory 66, nr 7 (lipiec 2020): 4226–44. http://dx.doi.org/10.1109/tit.2020.2971215.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
12

Khisti, Ashish, Suhas N. Diggavi i Gregory W. Wornell. "Secret-Key Generation Using Correlated Sources and Channels". IEEE Transactions on Information Theory 58, nr 2 (luty 2012): 652–70. http://dx.doi.org/10.1109/tit.2011.2173629.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
13

Levchenko, Oleksandr, Anna Levchenko i Tetiana Nemchenko. "Protection of Commercial Secrets in the Context of Strategic Management of Economic Security of the Organization in the Context of Digitalization of the Economy". Central Ukrainian Scientific Bulletin. Economic Sciences, nr 7(40) (2021): 20–30. http://dx.doi.org/10.32515/2663-1636.2021.7(40).20-30.

Pełny tekst źródła
Streszczenie:
The article substantiates the relevance of developing the mechanism for protecting commercial secrets of the organization in the system of strategic management of economic security of the organization, taking into account the transformational changes in the economy. Using the methods of synthesis and analysis, logical and generalizing methods, the authors determined the essence and basic features of the concept of "commercial secret" in both legal and scientific literature. The most common threats to commercial secrets have been identified and the sources of threats to the leakage of confidential information have been identified, taking into account the digitalization of economic processes. Four areas of protection of commercial secrets of an organization have been identified: legal, organizational, technical and psychological. The importance of providing valuable information in the strategic perspective of commercial secrets for the formation of the basis for its protection in future were highlighted, as well as those responsible for protecting this information with the consolidation of duties and responsibilities in collective and employment agreements were identified. In the context of formation of an effective system of strategic management of economic security of organizations in the conditions of transformational changes the directions of improvement of protection of a commercial secret are offered. Taking into account a growing share of cyber fraud and transition to the preservation of information mainly on digital media, the urgency of enhanced protection increases. Thus, the formation of information security using advanced technologies and equipment, attracting highly qualified specialists in this field, monitoring to identify potential sources of information leakage and eliminate them. Considering that most common source of disclosure of trade secrets is the staff of the organization, it is proposed to form a long-term loyalty of employees and their understanding of the importance of protecting confidential information, the introduction of socially oriented personnel strategy.
Style APA, Harvard, Vancouver, ISO itp.
14

Yachongka, Vamoua, Hideki Yagi i Yasutada Oohama. "Biometric Identification Systems with Noisy Enrollment for Gaussian Sources and Channels". Entropy 23, nr 8 (15.08.2021): 1049. http://dx.doi.org/10.3390/e23081049.

Pełny tekst źródła
Streszczenie:
In the present paper, we investigate the fundamental trade-off of identification, secret-key, storage, and privacy-leakage rates in biometric identification systems for remote or hidden Gaussian sources. We use a technique of converting the system to one where the data flow is in one-way direction to derive the capacity region of these rates. Also, we provide numerical calculations of three different examples for the system. The numerical results imply that it seems hard to achieve both high secret-key and small privacy-leakage rates simultaneously.
Style APA, Harvard, Vancouver, ISO itp.
15

Temchin, Sergei. "An Interpolation from Avicenna’s The Canon of Medicine in the Ruthenian Translation of The Secret of Secrets". Slavistica Vilnensis 65, nr 1 (24.09.2020): 10–19. http://dx.doi.org/10.15388/slavviln.2020.65(1).32.

Pełny tekst źródła
Streszczenie:
The Ruthenian translation of the medieval treatise Secretum Secretorum (“The Secret of Secrets”) was made in Kiev during the second half of the 15th century from a Hebrew version that dates back to late 13th‒early 14th centuries, when it was translated from the Arabic original, which probably originated in its final form during the 10th century. The Ruthenian translation contains certain interpolations that had been already present in the Hebrew version before it was translated into Ruthenian. They had been extracted from several Arabic and Hebrew sources, such as the treatise Al-Mansuri by Abū Bakr Muhammad ibn Zakariyā al-Rāzī (865‒925) and the treatises On Poisons, On Coitus, and On Asthma by Maimonides (1135/1138‒1204).The author argues that the same Ruthenian translation also contains a minor (one-page long) interpolation that through Hebrew mediation goes back to The Canon of Medicine written in Arabic by Avicenna (980‒1037). It is still to be established which of the seven known Medieval Hebrew translations and/or the around 30 commentaries on it (all unpublished) was used as the immediate source for the Kievan translation. Nevertheless, the newly identified Arabic origin of this particular interpolation to the Ruthenian version of the treatise The Secret of Secrets sheds some light on the prehistory of this particular text’s portion and compliments the list of sources used by the Hebrew-to-Ruthenian translators in Kiev during the second half of the 15th century.
Style APA, Harvard, Vancouver, ISO itp.
16

Gassaway, Bob M. "Are Secret Sources in the News Media Really Necessary?" Newspaper Research Journal 9, nr 3 (marzec 1988): 69–77. http://dx.doi.org/10.1177/073953298800900307.

Pełny tekst źródła
Streszczenie:
Fifteen people who said they had acted as confidential news sources for journalists were interviewed Most said they had been providing confidential information for years as a way of letting the public know things. A majority of the sources said journalists faced with pressure to identify their sources should “ask me to reconsider an agreement” of confidentiality.
Style APA, Harvard, Vancouver, ISO itp.
17

Oz-Salzberger, Fania, i Eli Salzberger. "The Secret German Sources of the Israeli Supreme Court". Israel Studies 3, nr 2 (październik 1998): 159–92. http://dx.doi.org/10.2979/isr.1998.3.2.159.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
18

Oz-Salzberger, Fania, i Eli Salzberger. "The Secret German Sources of the Israeli Supreme Court". Israel Studies 3, nr 2 (1998): 159–92. http://dx.doi.org/10.1353/is.2005.0085.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
19

Michalon, Barthélémy, i Benjamin Puybareau. "Secret d’État et secret des sources : comment des journalistes enquêtent-ils sur le renseignement en France ?" Cultures & conflits, nr 114-115 (20.12.2019): 227–62. http://dx.doi.org/10.4000/conflits.21231.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
20

Mandzhikova, Larisa B. "Документы секретного делопроизводства Совета Астраханского калмыцкого управления (1836–1848 гг.)". Бюллетень Калмыцкого научного центра Российской академии наук, nr 3 (25.12.2023): 92–110. http://dx.doi.org/10.22162/2587-6503-2023-3-27-92-110.

Pełny tekst źródła
Streszczenie:
Introduction. In the course of the activities of the Council of the Astrakhan Kalmyk Administration, which carried out the administrative management of Kalmykia in the period from 1836 to 1848, the documents were created for general office work and for secret ones as well. In the archival fund I-3 “Council of the Astrakhan Kalmyk Administration” of the National Archive of the Republic of Kalmykia, three files containing “secret cases” have been preserved; their study will make it possible to analyze and determine the nature of the issues considered in secret records management. The purpose of the article is to study archival documents classified as “secret” related to fund I-3 “Council of the Astrakhan Kalmyk Administration”, to explore the peculiarities of conducting secret office work in pre-revolutionary Kalmykia as well as to introduce newly identified archival documents into scientific circulation. Results. Documents created during the activities of the Kalmyk Administration Council and containing “secret” information are unique sources for studying the issues of organizing work with documents of a secret nature in one of the outskirts of pre-revolutionary Russia.
Style APA, Harvard, Vancouver, ISO itp.
21

Wang, Zichi. "Multisource Data Hiding in Digital Images". Symmetry 14, nr 5 (27.04.2022): 890. http://dx.doi.org/10.3390/sym14050890.

Pełny tekst źródła
Streszczenie:
In this paper, we propose a new data-hiding framework: multisource data hiding, in which multiple senders (multiple sources) are able to transmit different secret data to a receiver via the same cover image symmetrically. We propose two multisource data-hiding schemes, i.e., separable and anonymous, according to different applications. In the separable scheme, the receiver can extract the secret data transmitted by all senders using the symmetrical data-hiding key. A sender is unable to know the content of the secret data that is not transmitted by them (non-source sender). In the anonymous scheme, it is unnecessary to extract all secret data on the receiver side. The content extracted by the receiver is a co-determined result of the secret data transmitted by all senders. Details of the secret data are unknown to the receiver and the non-source senders. In addition, the two proposed schemes achieve multisource data hiding without decreasing the undetectability of data hiding.
Style APA, Harvard, Vancouver, ISO itp.
22

Bassi, Germán, Pablo Piantanida i Shlomo Shamai (Shitz). "The Secret Key Capacity of a Class of Noisy Channels with Correlated Sources". Entropy 21, nr 8 (26.07.2019): 732. http://dx.doi.org/10.3390/e21080732.

Pełny tekst źródła
Streszczenie:
This paper investigates the problem of secret key generation over a wiretap channel when the terminals observe correlated sources. These sources are independent of the main channel and the users overhear them before the transmission takes place. A novel outer bound is proposed and, employing a previously reported inner bound, the secret key capacity is derived under certain less-noisy conditions on the channel or source components. This result improves upon the existing literature where the more stringent condition of degradedness is required. Furthermore, numerical evaluation of the achievable scheme and previously reported results for a binary model are presented; a comparison of the numerical bounds provides insights on the benefit of the chosen scheme.
Style APA, Harvard, Vancouver, ISO itp.
23

Muramatsu, J., K. Yoshimura, K. Arai i P. Davis. "Secret Key Capacity for Optimally Correlated Sources Under Sampling Attack". IEEE Transactions on Information Theory 52, nr 11 (listopad 2006): 5140–51. http://dx.doi.org/10.1109/tit.2006.883552.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
24

James, Ryan, Jeffrey Emenheiser i James Crutchfield. "Unique Information and Secret Key Agreement". Entropy 21, nr 1 (24.12.2018): 12. http://dx.doi.org/10.3390/e21010012.

Pełny tekst źródła
Streszczenie:
The partial information decomposition (PID) is a promising framework for decomposing a joint random variable into the amount of influence each source variable X i has on a target variable Y, relative to the other sources. For two sources, influence breaks down into the information that both X 0 and X 1 redundantly share with Y, what X 0 uniquely shares with Y, what X 1 uniquely shares with Y, and finally what X 0 and X 1 synergistically share with Y. Unfortunately, considerable disagreement has arisen as to how these four components should be quantified. Drawing from cryptography, we consider the secret key agreement rate as an operational method of quantifying unique information. Secret key agreement rate comes in several forms, depending upon which parties are permitted to communicate. We demonstrate that three of these four forms are inconsistent with the PID. The remaining form implies certain interpretations as to the PID’s meaning—interpretations not present in PID’s definition but that, we argue, need to be explicit. Specifically, the use of a consistent PID quantified using a secret key agreement rate naturally induces a directional interpretation of the PID. We further reveal a surprising connection between third-order connected information, two-way secret key agreement rate, and synergy. We also consider difficulties which arise with a popular PID measure in light of the results here as well as from a maximum entropy viewpoint. We close by reviewing the challenges facing the PID.
Style APA, Harvard, Vancouver, ISO itp.
25

Yılmaz, Hacı. "The concept of secret in Anatolian Alewism Anadolu Aleviliği’nde sır kavramı". Journal of Human Sciences 14, nr 2 (5.07.2017): 2200. http://dx.doi.org/10.14687/jhs.v14i2.4692.

Pełny tekst źródła
Streszczenie:
Groups embracing ideas that do not conform to the ideas prevalent in the society, may choose to keep some of their views secret from the rest of the society in order to avoid outside pressure. Alawites in the Islamic world have developed a similar reflex both to protect themselves from outside pressure and to maintain discipline within their own group. This paper tackles the notion of secret based on a passage found in the introduction of a Futuwwat Namah we came across in the Futuwwat Namah collection Number 8602 in the National Library Manuscripts Collection. The passage tells about how the Prophet disclosed to Ali some of the secrets he received during his dialogue with God in the Night of Ascension. Protecting this secret was deemed very important and although the nature of the secret is not to be found in any written or oral source, measures were taken to protect it from non-Alawites and penalties were set for those would reveal it. In this paper, the passage in question is transliterated in Modern Turkish Alphabet and presented to the reader. Also, there is a discussion of the nature of this secret and what this secret could be in the light of written Alawite sources namely Buyruks of Imam Jafar and Sheikh Safi and some modern works.Extended English abstract is in the end of PDF (TURKISH) file. ÖzetToplumun genel düşüncesi dışında fikirlere sahip olan gruplar dışarıdan gelebilecek baskılara maruz kalmamak için görüşlerinden en azından bazılarını toplumun diğer bireylerinden gizleme yoluna gitmişlerdir. İslam dünyasının içinde yer alan Aleviler hem kendilerini dış baskılardan koruyabilmek hem de kendi grup disiplinlerini sağlayabilmek adına bu yönde refleks geliştirmişlerdir. İşte bu araştırma, Milli Kütüphane Yazmaları arasında 8602 numaralı Fütüvvetname Mecmuası’nda yer alan bir fütüvvetnamenin baş kısmındaki Hz. Peygamber’in Miraç’ta Tanrı ile konuşmalarından bir kısmını Hz. Ali’ye sır olarak verilmesini anlatan bölümden hareketle Alevilikteki sır kavramı üzerinde durmaktadır. Başkalarından gizlenmesine büyük önem verilen sırrın mahiyeti ne sözlü ne de yazılı kaynaklarda yer almamasına rağmen, Alevi olmayanlardan bunların korunması hususunda bazı tedbirler alınmış, hatta sırrı açıklayanlar için bazı cezalar öngörülmüştür. Burada hem bahsedilen kısım Türkçeye aktarılarak okuyucuya sunulmuş hem de Aleviliğin yazılı kaynakları olan İmam Cafer ve Şeyh Safi Buyrukları başta olmak üzere modern çalışmalar ışığında sırrın mahiyeti tartışılmıştır.
Style APA, Harvard, Vancouver, ISO itp.
26

Kreilkamp, Ivan. "Meat, Flesh, Skin: The Carnality Of The Secret Agent". Studies in the Novel 56, nr 1 (marzec 2024): 21–40. http://dx.doi.org/10.1353/sdn.2024.a921057.

Pełny tekst źródła
Streszczenie:
Abstract: This essay considers Conrad’s novel The Secret Agent in relation to what I will suggest are several relevant intertexts or sources for it—including Upton Sinclair’s famous muckraking 1906 exposé of the conditions in the Chicago stockyards, The Jungle , as well as Classical mythological tales depicting “cannibal feasts.” I point to these sources in order to argue that Conrad uses the novel to consider the question of the overlap between the direct violence of terrorism and the less direct violence of meat production. The novel, I suggest, can be read as an extended meditation on the embodied nature of human flesh.
Style APA, Harvard, Vancouver, ISO itp.
27

Ownby, David. "The Heaven and Earth Society as Popular Religion". Journal of Asian Studies 54, nr 4 (listopad 1995): 1023–46. http://dx.doi.org/10.2307/2059958.

Pełny tekst źródła
Streszczenie:
The profound disdain with which most governments—Qing, Republican, Communist, or, in the case of Southeast Asia, colonial—have treated Chinese secret societies, as well as the undeniable involvement of many of these societies in violent and criminal activities, have obscured the religious elements at the core of the early Heaven and Earth Society (Tiandihui), the most widespread and well-known of Chinese secret societies. The vast historiography treating Chinese secret societies, often grounded in documents produced by hostile governments, has in large measure reproduced the image of secret societies contained in these documents, even if not all scholars have embraced the moral and legal assumptions of their sources. Consequently, society practices and symbols which would be treated as religious in other contexts are frequently dismissed as epiphenomenal or “esoteric” (Stanton 1900, 9; Morgan I960, 5), or as functional means of unifying “dissident” groups (Yang 1961, 61–64).
Style APA, Harvard, Vancouver, ISO itp.
28

Matveev, Ivan, i Ilia Safonov. "From Iris Image to Embedded Code: System of Methods". Algorithms 16, nr 2 (6.02.2023): 87. http://dx.doi.org/10.3390/a16020087.

Pełny tekst źródła
Streszczenie:
Passwords are ubiquitous in today’s world, as are forgetting and stealing them. Biometric signs are harder to steal and impossible to forget. This paper presents a complete system of methods that takes a secret key and the iris image of the owner as input and generates a public key, suitable for storing insecurely. It is impossible to obtain source data (i.e., secret key or biometric traits) from the public key without the iris image of the owner, the irises of other persons will not help. At the same time, when the iris image of the same person is presented the secret key is restored. The system has been tested on several iris image databases from public sources. It allows storing 65 bits of the secret key, with zero possibility to unlock it with the impostor’s iris and 10.4% probability to reject the owner in one attempt.
Style APA, Harvard, Vancouver, ISO itp.
29

Amidon, Debra M. "Dialogue with Customers: Secret to Innovation Strategy". International Journal of Innovation Management 01, nr 01 (marzec 1997): 73–87. http://dx.doi.org/10.1142/s136391969700005x.

Pełny tekst źródła
Streszczenie:
Enterprises are discovering a rededication to customers in ways rarely practised other than by the entrepreneurial firm. However, quality and restructuring methodologies have returned executives to their own raison d'etre by positioning customers at the heart of business survival. At the same time, cross-boundary alliances are demanding new partnering techniques with all stakeholders, including customers. New initiatives are commonplace, but are generally without an understanding that something is fundamentally different between customer satisfaction and the success of your customers. This article introduces the concepts in ways that are easily practised. Simply stated, treat your customers as sources of knowledge, not someone to whom you solely deliver products and services. By practising value-system (rather than value-chain) strategies, companies can take advantage of the business opportunities afforded by a collaborative economy. Similarly, by defining Strategic Business Network (SBN's) rather than Strategic Business Units (SBU's), companies can leverage all available knowledge sources. Most importantly, a symbiotic relationship with consumers, customers or clients can help a company envision products and services for unarticulated needs and unserved markets. Companies which are practising new ways of interfacing with customers are realising significant business results. A profile of customer innovation at Steelcase North America provides an illustration of this new partnering relationship.
Style APA, Harvard, Vancouver, ISO itp.
30

Kara, György. "On some sources of Sagang Sechen’s Teachings (1662)". Acta Orientalia Academiae Scientiarum Hungaricae 73, nr 4 (17.12.2020): 603–15. http://dx.doi.org/10.1556/062.2020.00031.

Pełny tekst źródła
Streszczenie:
AbstractNine of the seventy-nine alliterative quatrains of Sagang Sechen’s great gnomic poem are revisited, their possible literary sources suggested, their interpretation revised. Seven of them go back, entirely or partially, to Sa-skya Paṇḍita’s Subhāṣitaratnanidhi, one to the Janapoṣanabindhu, one of Nāgārjuna’s nītiśāstras, and one uses a comparison known from the Secret History. Parallels are quoted from Sonom Gara’s and the Oirat Zaya Paṇḍita’s prose translations of the Subhāṣitaratnanidhi. Also discussed are the rare word küčigei and the possible identity of Sonom Gara and Suonanqilo.
Style APA, Harvard, Vancouver, ISO itp.
31

Ettinger, David. "Sources: Spies, Wiretaps, and Secret Operations: An Encyclopedia of American Espionage". Reference & User Services Quarterly 51, nr 1 (1.09.2011): 82. http://dx.doi.org/10.5860/rusq.51n1.82.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
32

Levchenko, I., А. Firsov, L. Snigur i E. Ivanchenko. "PERFECTION OF METHODOLOGY OF ESTIMATION OF EFFICIENCY OF SUBSYSTEM OF REARWARD SECRET SERVICE IN THE SEPARATE MECHANIZED BRIGADE DURING CONDUCT OF BATTLE ACTIONS". Collection of scientific works of Odesa Military Academy 2, nr 14 (25.01.2021): 156–63. http://dx.doi.org/10.37129/2313-7509.2020.14.2.156-163.

Pełny tekst źródła
Streszczenie:
In the article the improved methodology of evaluation of efficiency of subsystem of rearward secret service offers in the separate mechanized brigade that can be used for the evaluation of efficiency of the system of the rearward providing of the separate mechanized brigade during the conduct of battle actions. On efficiency of implementation of tasks from rearward secret service basic influence is carried out degree of full strength by the personnel of group of rearward secret service and their knowledge on speciality, organization of connection with a senior chief, realization of order in relation to realization of rearward secret service, the state of transport vehicles on that comes true rearward secret service, terms, season, daypart. All of it can carry out substantial influence on implementation of tasks from rearward secret service. The improved methodology of evaluation of efficiency of subsystem of rearward secret service is given in the separate mechanized brigade that can be used for the evaluation of efficiency of the system of the rearward providing of the separate mechanized brigade during the conduct of battle actions. During research of process of the rearward providing of troops an important theoretical and practical task is an estimation of efficiency of subsystem of rearward secret service in the separate mechanized brigade during the conduct of battle actions. The certain going near the decision of this task were worked out in a number of sources. However, experience of anti-terror operation on territory Donetsk and Luhansk areas, other armed conflicts of the last decades testifies to the necessity of perfection of methodology of estimation of efficiency of subsystem of rearward secret service that would take into account changes in requirements to the subsystem of rearward secret service in the separate mechanized brigade during, and promoted efficiency of the system of the rearward providing on the whole. Keywords: separate mechanized brigade, rearward providing, efficiency of subsystem rearward secret service, reconnaissance group, method of expert evaluation, objects of rearward secret service.
Style APA, Harvard, Vancouver, ISO itp.
33

Sekga, Comfort, i Mhlambululi Mafu. "Tripartite Quantum Key Distribution Implemented with Imperfect Sources". Optics 3, nr 3 (21.06.2022): 191–208. http://dx.doi.org/10.3390/opt3030019.

Pełny tekst źródła
Streszczenie:
Multipartite quantum key distribution (QKD) is a promising area of quantum networks that provides unconditional secret keys among multiple parties, enabling only legitimate users to decrypt the encrypted message. However, security proofs of existing multipartite QKD typically assume perfect state preparation devices of legitimate users and neglect the relative rotation of reference frames. These presumptions are, nevertheless, very difficult to meet in practice, and thus the security of current multipartite QKD implementations is not guaranteed. By combining the idea of a loss tolerant technique, introduced by Tamaki et al. (K. Tamaki et al., Phys. Rev. A, 90, 052314, 2014), and the concept of a reference frame-independent protocol, we propose a three-party QKD protocol that considers state preparation flaws and the slow drift of reference frames. Through a numerical simulation, the influence of misaliged reference frames on the protocol’s stability was examined by drifting reference frames through angles β=π/5, β=π/6 and β=π/7. In addition, the performance of the proposed protocol was examined for the encoding flaws set at δ=0.35, δ=0.20, and δ=0.10. The results show that the protocol is robust against state preparation flaws, and is insignificantly impacted by misalignment of the reference frames because the achieved transmission distances and secret key rates are comparable to the perfect scenarios. This work dramatically contributes toward the realization of practical and secure multipartite QKD. The proposed protocol has direct applications in quantum communication network environments that involve unknown and slowly varying reference frames, web conferences, and online communications.
Style APA, Harvard, Vancouver, ISO itp.
34

Kinsella, Helen M. "Sex as the secret: counterinsurgency in Afghanistan". International Theory 11, nr 1 (18.12.2018): 26–47. http://dx.doi.org/10.1017/s1752971918000210.

Pełny tekst źródła
Streszczenie:
AbstractI explore the construction of women as the secret for the ‘successful’ prosecution of war in Afghanistan. To do so, I take up the mobilization of gender in the US counterinsurgency doctrine as deployed in Afghanistan. I draw on the 2006 Counterinsurgency Field Manual, human rights and humanitarian reports, and scholarly works to identify and analyze this mobilization, paying attention to the colonial histories upon which COIN explicitly and implicitly relies. By critically integrating these sources and the paradigmatic moments that exemplify COIN, I demonstrate the constitutive relationship of gender and COIN. The valence of the secret – of women as concealing, revealing, being, and bearing the secret – is still a lesser explored element in the analysis of the gendering of COIN and of its ‘military orientalism’. Even as scholars have powerfully shown how, in the case of Afghanistan and elsewhere, the veil functions as an overdetermined and ‘multilayered signifier’ in its own right, symbolizing the ‘tension between disclosure and concealment that defines the dominant conception of the secret’, less subject to detailed analysis in case of Afghanistan is the ways in which Afghan women are constituted through COIN in polysemous relation to the notion of the secret.
Style APA, Harvard, Vancouver, ISO itp.
35

Van Netten, Djoeke. "Spaces on Ships". TSEG - The Low Countries Journal of Social and Economic History 18, nr 3 (29.11.2021): 107–24. http://dx.doi.org/10.52024/tseg.11044.

Pełny tekst źródła
Streszczenie:
Djoeke van Netten examines the interplay between privacy and secrecy in the ships of the Dutch East India Companies (1595-1799). Space aboard a ship was scarce and privacy a rare privilege. Netten starts with a discussion of the sources available as well as those lost to history. She then continues by examining what can be known about the protection of and access to (secret) information and (private) belongings aboard ships. Cases where privacy was violated and secrets revealed emerge as some of the most informative historical events to be examined in this context. As she confronts her historical examples with relevant theoretical and historiographical concepts, she concludes by raising important questions for further research on privacy and secrecy aboard ships.
Style APA, Harvard, Vancouver, ISO itp.
36

Makarov, A. V., N. Yu Gusevskaya i A. S. Petrov. "Counteraction to High Treason in Russian Legislation of the Second Half of the 19th — Early 20th Centuries". Nauchnyi dialog, nr 1 (27.01.2021): 337–56. http://dx.doi.org/10.24224/2227-1295-2021-1-337-356.

Pełny tekst źródła
Streszczenie:
The problem of improving the criminal liability of the subjects of the Russian Empire at the end of the nineteenth century for espionage and spilling state secrets to a foreign state is considered. The relevance of the study is due to the importance of the problem under study for the effective functioning of the Russian state. The study is based on historical sources of a regulatory and legal nature and is interdisciplinary in nature. Particular attention is paid to the study of legal norms, the identification of the type and amount of punishments for the commission of espionage by Russian citizens and spilling the state secrets to a foreign state. It is indicated that in the second half of the 19th century, the intensity of intelligence of foreign secret services in the territory of the Russian Empire increased. It is noted that more and more often foreign powers involved Russian subjects in the process of obtaining Russian secrets. At the same time, the analysis of the sources made it possible to reveal a sufficient limitation of the institution of counteracting espionage and disclosure of state secrets to foreign states in the Russian Empire at the end of the 19th century. It is proved that it was precisely these phenomena at the end of the 19th and the beginning of the 20th centuries that determined the authorities’ desire to progressively improve legal mechanisms that counteract threats and challenges to national security.
Style APA, Harvard, Vancouver, ISO itp.
37

Kruglyakov, Sergey V. "Realization of the Socio-Legal Function by Appointed Advocate in Criminal and Civil Cases Involving State Secrets". Общество: политика, экономика, право, nr 2 (21.02.2024): 94–103. http://dx.doi.org/10.24158/pep.2024.2.10.

Pełny tekst źródła
Streszczenie:
The article delves into the realization of the social and legal function of the appointed advocate in criminal and civil proceedings in cases involving state secrets, as well as problematic issues and liability that may occur in case of its divulgence. The relevance of the research topic is that in Russia there is an increase in the number of convictions under Article 283 of the Criminal Code of the Russian Federation – disclosure of state secrets. In addition, the article discusses theoretical issues, the relationship between attorney-client privilege and state secrets, and provides examples from judicial practice. From a certain angle, the author is convinced that it is necessary to investigate the issue of the advocate’s activity on appointment in criminal and civil cases, in which there is a state secret, in order to further develop recommendations for advocates. The formal legal method, the method of comparative analysis, synthesis, the inductive method, generalization and systematization of scientific sources on the research problem, comparative and predictive methods were used.
Style APA, Harvard, Vancouver, ISO itp.
38

Beglov, Alexey. "Special Services and Religious Organizations in the Soviet State: Collaboration Mechanisms, Survival Strategies, Sources". ISTORIYA 13, nr 6 (116) (2022): 0. http://dx.doi.org/10.18254/s207987840021686-3.

Pełny tekst źródła
Streszczenie:
In this article the authors formulate generalizing observations on the mechanisms of interaction between the Soviet secret services and religious communities in the USSR during the whole period of its existence. The basis for these generalizations was the research of the past thirty years as well as the materials of the international symposium “Special Services and Religious Organizations in the Soviet State: Collaboration Mechanisms, Survival Strategies, Sources” held by the Centre for the Study of the History of Religion and Church History at the Department of Modern and Contemporary History, Institute of World History, Russian Academy of Sciences, on 27—28 October 2021. Infiltration and a complex operational game involved the control and instrumentalization rather than destruction of even those religious communities whose existence was considered unacceptable in the USSR. Instead of the declared reduction of the influence of religious organizations, cooperation was indirectly helping to stabilize their position and even increase the influence of their leaders. On the part of the believers, cooperation with the secret services proved to be a complex survival strategy both at the micro level (parish, congregation, group) and at the institutional level. In light of these observations, the authors raise the question of the need to develop analytical criteria for cooperation, based on a comprehensive and qualitative analysis of case-by-case information, rather than formal criteria (the presence or absence of a cooperation agreement). In addition, the authors draw attention to the change in the position of the researcher, who is no longer an “unmasker” of the hierarchs and laity who collaborated with the special services. Here, the question of ethical norms and the research tools of the historian working with the documents of the secret services arises with new urgency.
Style APA, Harvard, Vancouver, ISO itp.
39

Kozák, Jan A. "A Minister to the Secret Fire: Pavel Hošekʼs take on J. R. R. Tolkien (review)". CENTRAL EUROPEAN JOURNAL FOR CONTEMPORARY RELIGION 4, nr 1 (11.04.2022): 71–75. http://dx.doi.org/10.14712/25704893.2021.4.

Pełny tekst źródła
Streszczenie:
Book review on Hošek, Pavel, Sloužím Tajnému ohni: Duchovní zdroje literární tvorby J.R.R. Tolkiena [I Am a Servant of Secret Fire: Spiritual Sources of J.R.R. Tolkien’s Literary Work], Brno: Centrum pro studium demokracie a kultury 2019, 191 p.
Style APA, Harvard, Vancouver, ISO itp.
40

NOGAJ, Adam. "TECHNICAL SOURCES OF OBTAINING INTELLIGENCE INFORMATION". Scientific Journal of the Military University of Land Forces 162, nr 4 (1.10.2011): 109–32. http://dx.doi.org/10.5604/01.3001.0002.3202.

Pełny tekst źródła
Streszczenie:
The author presents the development of technologies used to obtain intelligence information – obviously in a considerable simplification and in brief – from the beginning to the end of the 20th century. The author emphasises the timeless importance of the scientific and technological revolution, which enables the introduction of new, previously unknown tools. The purpose of these tools along with the traditional spying methods, which have functioned for centuries and millennia, is to obtain information. The author claims that the technical measures of obtaining information were not the invention of World War II. Most technologies for obtaining intelligence information used during World War II had already been known and widely used during World War I. During this war fighting armies paid considerable attention to radio reconnaissance, especially one of its forms: crypto-analysis, i.e. decoding. In that period air reconnaissance, including air photography, was also widely used. Moreover, tools to eavesdrop the enemy’s telephone networks situated from 10 to 20 and even tens of kilometres away were also known. With the example of the Third Reich, the author presents a horrifying picture of the development of the technical sources of obtaining intelligence information for the structures of military intelligence, civilian intelligence and secret police typical of a totalitarian state attempting to control everyone and everything. Another example is the Soviet Army, which at the end of World War II had very well-developed technical structures for obtaining intelligence information and made plenty of effort to obtain it. The most considerable attention was devoted to technical reconnaissance measures possessed by Russian fronts.The final part of the article presents an outline of the most significant information related to the contemporary systems of obtaining intelligence information on the basis of the following intelligence: air, satellite, electronic, radio, radiolocation and information communications technology. The author proves that human sources of information have ceased to play a key role in the past decades. Moreover, he proves that for many decades major intelligence expenditure has been incurred on electronic intelligence by world powers. The secret ring is no longer the most important and has definitely ceased to be the only source of obtaining information on a potential foe.
Style APA, Harvard, Vancouver, ISO itp.
41

WATANABE, Shun, i Yasutada OOHAMA. "Secret Key Agreement from Correlated Gaussian Sources by Rate Limited Public Communication". IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E93-A, nr 11 (2010): 1976–83. http://dx.doi.org/10.1587/transfun.e93.a.1976.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
42

Xu, Yinfei, i Daming Cao. "Secret Key Generation From Vector Gaussian Sources With Public and Private Communications". IEEE Transactions on Information Theory 67, nr 8 (sierpień 2021): 5420–31. http://dx.doi.org/10.1109/tit.2021.3086536.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
43

Duclert, Vincent. "Des archives pour Dreyfus. Du secret des dossiers � la transparence des sources". Sigila N�25, nr 1 (2010): 151. http://dx.doi.org/10.3917/sigila.025.0151.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
44

Watanabe, S., i Y. Oohama. "Secret Key Agreement From Vector Gaussian Sources by Rate Limited Public Communication". IEEE Transactions on Information Forensics and Security 6, nr 3 (wrzesień 2011): 541–50. http://dx.doi.org/10.1109/tifs.2011.2132130.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
45

Boche, H., i G. Janßen. "Distillation of secret-key from a class of compound memoryless quantum sources". Journal of Mathematical Physics 57, nr 8 (sierpień 2016): 082201. http://dx.doi.org/10.1063/1.4960217.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
46

Izzo, Massimo. "The Origin of The Secret of the Golden Flower: Sources and Translations". Journal of Daoist Studies 16, nr 1 (2023): 81–104. http://dx.doi.org/10.1353/dao.2023.0004.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
47

Wang, Di. "Heroic Mother and Wise Wife". Inner Asia 23, nr 2 (18.11.2021): 212–32. http://dx.doi.org/10.1163/22105018-12340172.

Pełny tekst źródła
Streszczenie:
Abstract Thirteenth-century sources provide us with striking images of Mongol noblewomen, which are not eclipsed by the heroic conquests and military exploits of their men. While recognising the complexity of gender roles in pre-imperial Mongol society, this article aims to explore the specific responsivities carried by Hö’elün and Börte in the narrative of The Secret History of the Mongols. The selective presentation of their characters and duties further reveals the goal of the Secret Historian to create a ruling model, which includes a brave widowed mother and an intelligent wife for the Qan of the empire.
Style APA, Harvard, Vancouver, ISO itp.
48

SEMENIUK, O. "Criminological analysis of threats in the sphere of protection of state secrets". INFORMATION AND LAW, nr 2(17) (29.06.2016): 106–13. http://dx.doi.org/10.37750/2616-6798.2016.2(17).272909.

Pełny tekst źródła
Streszczenie:
This article presents the analysis of the external and internal threats in the sphere of protection of state secret, distinguishes sources and carriers of such threats, considers motivation of illegal activity to the detriment of Ukraine and mechanisms of its formation.
Style APA, Harvard, Vancouver, ISO itp.
49

Chan, Alfred L., i Andrew J. Nathan. "The Tiananmen Papers Revisited". China Quarterly 177 (marzec 2004): 190–214. http://dx.doi.org/10.1017/s0305741004000116.

Pełny tekst źródła
Streszczenie:
Authentic Chinese internal documents matter greatly as historical records that illuminate our understanding of Chinese politics. Yet careful scrutiny shows that the Chinese book version of the Tiananmen Papers is part fiction and part documentary history based on open and semi-open sources and document collections. The alleged transcripts of top-level meetings are basically stitched together ex post facto (even by the admission of the editors) and then presented as secret documents. Furthermore, the English translation is a heavily retouched version of the Chinese with differences in claims of authenticity, translation, citation and style. There is little evidence that any real secret documents are in the hands of the Chinese author, and even if they were, the two books under consideration are really secondary sources steps removed from the originals. The editors strongly vouch for the authenticity of these two books, but their efforts are inadequate and unconvincing.
Style APA, Harvard, Vancouver, ISO itp.
50

Veszprémy, Márton. "Astrologers and the Hungarian State Security Agency". Polish Journal of the Arts and Culture New Series, nr 17 (1/2023) (maj 2023): 53–67. http://dx.doi.org/10.4467/24506249pj.23.004.18997.

Pełny tekst źródła
Streszczenie:
The history of astrology in twentieth-century Hungary has not yet been a subject of research. Consequently, the attitude of Hungarian state security agency towards astrologers and astrology during the communist era is unknown – especially since the files of agents have not been made public in Hungary. In the present article, I examine the question through the cases of Sándor Raisz, András László, Zoltán Lemhényi and Viktor Juhász-Schlatter, using sources preserved in the Historical Archives of the Hungarian State Security Services (Állambiztonsági Szolgálatok Történeti Levéltára). I conclude that the secret service was only interested in astrologers because they met regularly with their students, all regular and secret meetings being politically suspicious. Astrology as an illegal activity or a subject of contempt only appears in sources from the 1980s. All the astrologers discussed in my article were in one way or another opposed to the ruling communist regime. Part of the reason for this is that astrology was a popular intellectual, middle-class activity in the Horthy era, and representatives of this stratum were considered enemies of the regime after 1945. Also, the communist system represented an avowedly materialist ideology, while astrology flourished primarily among those interested in mysticism, theosophy and anthroposophy. The picture that emerges from the sources is that astrology classes were not overtly political, but their participants were nevertheless bound together by the knowledge that they were listening to forbidden, secret teachings. In this respect, astrology can be classified as counterculture in the era. The topic also offers a valuable insight into the overlapping subcultures in twentieth-century Hungary.
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii