Добірка наукової літератури з теми "Secret des sources"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Secret des sources".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Secret des sources"
Perraud, Antoine. "Secret des sources." Médium 37-38, no. 4 (2013): 213. http://dx.doi.org/10.3917/mediu.037.0213.
Повний текст джерелаRowson, Everett K., W. F. Ryan, and Charles B. Schmitt. "Pseudo-Aristotle, The Secret of Secrets. Sources and Influences." Journal of the American Oriental Society 107, no. 1 (January 1987): 188. http://dx.doi.org/10.2307/603000.
Повний текст джерелаJovicic, Katarina. "Trade Secret Protection in the Law of the Republic of Serbia." Pravo i privreda 60, no. 4 (December 24, 2022): 655–74. http://dx.doi.org/10.55836/pip_22403a.
Повний текст джерелаWarusfel, Bertrand. "Le droit peut-il encore protéger le secret ?" Titre VII N° 10, no. 1 (August 24, 2023): 1–10. http://dx.doi.org/10.3917/tvii.010.0001.
Повний текст джерелаFraise, Thomas. "Comment cacher un nuage ? L’organisation du secret des essais atmosphériques français (1957-1974)." Relations internationales 194, no. 2 (June 30, 2023): 11–26. http://dx.doi.org/10.3917/ri.194.0011.
Повний текст джерелаNitinawarat, Sirin, and Prakash Narayan. "Secret Key Generation for Correlated Gaussian Sources." IEEE Transactions on Information Theory 58, no. 6 (June 2012): 3373–91. http://dx.doi.org/10.1109/tit.2012.2184075.
Повний текст джерелаCourpasson, David, and Dima Younes. "Double or Quits: Understanding the Links between Secrecy and Creativity in a Project Development Process." Organization Studies 39, no. 2-3 (September 22, 2017): 271–95. http://dx.doi.org/10.1177/0170840617727780.
Повний текст джерелаBerndtsson, Tim. "Frimureriets medier: Om 1700-talsfrimureriets mediering av hemligheter i tal, handskrift och tryck." Sjuttonhundratal 14 (December 19, 2017): 17–39. http://dx.doi.org/10.7557/4.4154.
Повний текст джерелаLevy, Jean-Paul. "Le secret de l'enquête et de l'instruction, le recel et le secret des sources." LEGICOM 48, no. 1 (2012): 47. http://dx.doi.org/10.3917/legi.048.0047.
Повний текст джерелаBarnett, Robert. "The Secret Secret: Cinema, Ethnicity and Seventeenth Century Tibetan-Mongolian Relations." Inner Asia 4, no. 2 (2002): 277–346. http://dx.doi.org/10.1163/146481702793647461.
Повний текст джерелаДисертації з теми "Secret des sources"
Zemmouri, Catherine. "La protection du secret des sources du journaliste." Electronic Thesis or Diss., Université Paris-Panthéon-Assas, 2023. http://www.theses.fr/2023ASSA0082.
Повний текст джерелаFreedom of expression and communication is a fundamental right, and one of the key elements of a democracy. For this reason, it has been protected for a long time. However, one of its pillars, the protection of the confidentiality of a journalist's sources, has for a long time been ignored, and even today is not completely recognized in France. This state of affairs is mainly due to political factors. This refusal to acknowledge, and this partial and tardy recognition, can be largely explained by the fact that investigative reporting, in the public interest, can potentially target politicians. Furthermore, even a partial recognition of this right can be neutralised by increasingly sophisticated modern methods of surveillance, such as the Pegasus computer program. Journalists find themselves on an uneven playing field when they seek to take on public authorities, big business or indeed organised criminal groups who want to uncover the sources behind an investigative report. This is why the French system falls short, despite a ruling by the European Court of Human Rights (ECHR) in favour of protecting journalists' sources. However, a proper protection of these sources is well within the bounds of possibility. One has only to look as far as Belgium, where an effective and exemplary system is in place. An overhaul of the French system is well overdue, because, as the ECHR puts it, journalists are the vanguards of a democracy
De, Witte Parra Mona. "La protection du renseignement britannique, américain et allemand pendant la Seconde Guerre mondiale." Thesis, Reims, 2016. http://www.theses.fr/2016REIML004.
Повний текст джерелаThis thesis investigates the protection of British intelligence sources during World War Two, and includes a comparison with American and German practices. In these three countries, intelligence officers adopted very different approaches to preserve these sources and to ensure that the latter could be used in the long term. Each country had a different perception of the balance between the immediate use of intelligence and the protection of its sources, between the short-term benefits and long-term preservation of these assets in the context of the war. Drawing on a vast amount of archival material, both civilian and military, this research presents these three countries’ various approaches and uses this analysis to reflect on their concrete achievements. This study interrogates the preconceived ideas about these countries’ intelligence practices, in particular the reputation of secrecy of the British agencies, as opposed to the lack of discretion of their American counterparts. Moreover, this thesis emphasises the particular situation of German secret services in a very divided country.The ambiguous cooperation between Britain and the United States during the Second World War helped pave the way for their « special relationship ». During the war, the balance of power between the two nations shifted dramatically, in the intelligence field as in many others. Moreover, the analysis of the exchanges between the British intelligence officers and their French and Soviet colleagues opens new research avenues in the study of their international relations and on these complex and fluctuating alliances
Lévêque, Cyrielle. "Artification de l’archive : une dialectique entre figures et absences." Thesis, Université de Lorraine, 2018. http://www.theses.fr/2018LORR0334.
Повний текст джерелаThe development of this thesis work falls within an academic approach, andis also simultaneously thought in connection with the artistic creation. It deals with personal and private questioning, but is also « hunted » in a different way regarding yet genealogy, family and documentary pictures and the shadow zones that are part of all personal history. Mechanisms of resistance to arti- fication are deployed as an attempt at an artistic and theoretical response, facing a mute story, a lack of words. The family history is the origin of plural filiations, transmissions–with or without words–but also secrets. Sometimes some empty spaces appear on portraits. The missing element, thus, becomes an obsession due to its lack in the logic of the story. The artists working on those corpuses specifically aim to collect, reclaim and exhibit those blurred pictures in order to re-use them into an artistic, voluble and efficient circuit. These new pictures–private stories and testimony art at once–turn into a collective memory : by a clever telescope of meaning, the work, born out of the vernacular image, breaks through thanks to its plasticity, and offers a new meaning to the erased or absent figure. This theoretical and artistic reflection, based on the polysemous relations between documentary pictures and « erasing poietic », analyses the way that art acts into old archive pictures. How can art give the power to « read » a picture that is invisible ? Which ways, implemented devices, social and histo- ric beliefs allow it ? Conversely, what levers are developed by the artists, to update images that do not belong to them and that change our vision of the initial information ? Here is the challenge of this theoretical and plastic research that let us understand a mechanism of the artifying archival image, midway between private story and artistic mythology ; or how can images or vacilla- ting figures between presence and absence appear from invisible elements, as archives of a reformulated future
Brenes, Vargas Rodolfo. "Contribution à l'étude des abus de la liberté d'expression dans le domaine judiciaire : étude de politique criminelle : l'exemple de la France et du Costa Rica." Thesis, Paris 1, 2016. http://www.theses.fr/2016PA01D018.
Повний текст джерелаFreedom of speech is now considered one of the essential elements of a democratic society. Driven by the European and Inter-American Court of Human Rights, it has acquired a new dimension and has an extensive protection. However, despite its importance, this freedom is not absolute, it must be balanced with other rights of equal value and legal imperatives which also deserve protection. Traditionally the way of regulating and sanctioning abuses of freedom of speech was criminal law. However, the strengthening of the freedom has produced, inversely, a phenomenon of " gradual withdrawal " of criminal law, which is considered less and less as "strictly necessary" and is often viewed as a disproportionate mode of sanction in regards to the goal pursued. This thesis analyzes the relevance of the use of criminal law in the judiciary field, where freedom of expression is often confronted with the right to presumption of innocence, right to reputation, and the need to protect the authority and impartiality of the judiciary. The issue is studied from a criminal policy approach, which allows us to go beyond the field of criminal law to make proposals for new regulation and punishment by other means than criminal
Sun, Xiaole, Ivan B. Djordjevic, and Mark A. Neifeld. "Secret Key Rates and Optimization of BB84 and Decoy State Protocols Over Time-Varying Free-Space Optical Channels." IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 2016. http://hdl.handle.net/10150/621687.
Повний текст джерелаDarmon, Julien. "La loi du secret : la kabbale comme source de halakha chez r. Joseph Caro et les décisionnaires séfarades ultérieurs." Paris, EHESS, 2007. http://www.theses.fr/2007EHES0110.
Повний текст джерелаContrary to a well-spread notion, legal and ritual issues are an important focus of kabbalistic discourse and the halakhic literature, in turn, is far from having negleted what the kabbalists had to say. Since the historic beginnings of kabbalah, and even in the Talmud, legal and symbolic discourses interpenetrate. Their organic unity and the messianic telos of their dialectics are best articulated in the introduction to the main text of Lurianic kabbalah, 'Ets Hayyim. In the light of the notions presented therein, and following the concept of hierohistory borrowed from Henry Corbin, this study proposes a phenomenological re-reading of three precise aspects of the Jewish ritual, which have crystallized the essential discussions about the relationship between halakhah and kabbalah. The result is a new outlook on the metahistorical and eschatological motives behind the history of Jewish religious practices
Lazoul, Mohamed. "Etude de la génération paramétrique optique dans les cristaux photoniques non linéaires : application aux sources multilongueurs d'onde." Paris 13, 2013. http://scbd-sto.univ-paris13.fr/secure/edgalilee_th_2013_lazoul.pdf.
Повний текст джерелаThe aim behind this work is to propose new solutions based on nonlinear optics to design flexible and highly efficient multiwavelength coherent sources. We are particularly interested on multiple wavelength generation by means of optical parametric conversion in second order nonlinear photonic crystals. For this purpose, we have designed and fabricated second order nonlinear photonic crystals. Firstly, we have considered the case of non collinear quasi-phase matching in 1D-PPLT crystals. We have studied multiple non collinear interactions versus the photonic crystal’s parameters. The generated wavelengths are spatially distributed at symmetrical positions around the non collinear direction. Secondly, we have studied the case of multiple quasi-phase matching in 2D nonlinear photonic crystals. We have demonstrated multiwavelength non collinear generation in 2D-PPLT crystals. In order to design an efficient multiwavelength optical source we have designed and achieved a singly resonant optical parametric oscillator based on 2D-PPLT crystals
Friedman, Yaron. "Les Nusayri-ʿAlawis : entre sunna et shiʿa, refus et acceptation selon les sources arabes médiévales et modernes". Paris 4, 2006. http://www.theses.fr/2006PA040012.
Повний текст джерелаThe study of the NuîayrÌ-AlawÌ sect is of particular importance, due to the fact that it is the only sect that rules a country in the Middle East. This research explores the NuîayrÌ-AlawÌ sect from a distinct perspective by dealing with their image as reflected in Muslim sources. This thesis identifies three major attitudes in the Muslim world toward the NuîayrÌ-AlawÌ sect :A strong hostility among the Sunni majority. A combination of indulgence and hostility that coexist in žÌ‘Ìsm. An apologetic response among the NuîayrÌ-AlawÌs themselves. A survey of medieval and modern Arabic texts suggests a continuity in the three attitudes towards the Nusayri-‘AlawÌs outlined above. This monographic study treats a number of issues that have not been adequately addressed in previous research, such as : The biography of the founders of the sect, especialy the main figure, al-usayn ibn amdªn al-ŽaîÌbÌ; the manuscript of the DÌwan (poetic corpus) of al al-ŽaîÌbÌ and the fatwa (decree) of Ibn Taymiyya against the NuîayrÌs
Delbe, Jean. "L'idf45 (inhibitory diffusible factor 45 kda) : un inhibiteur de croissance secrete par les fibroblastes de souris." Paris 6, 1991. http://www.theses.fr/1991PA066459.
Повний текст джерелаWang, Shiping. "Peptides as amino acid sources for the synthesis of secreted proteins by mammary tissue explants and cultured mammary epithelial cells." Diss., Virginia Tech, 1994. http://hdl.handle.net/10919/39137.
Повний текст джерелаКниги з теми "Secret des sources"
Snow California: Delicious destinations, secret hideaways, expert sources. Guilford, Conn: GPP Travel, 2009.
Знайти повний текст джерелаMétamorphose de Descartes: Le secret de Sartre. Paris]: Gallimard, 2022.
Знайти повний текст джерелаQuincey, Stewart Anthony Terence, and Great Britain. Public Record Office., eds. Michael Collins: The secret file. Belfast: Blackstaff, 1997.
Знайти повний текст джерелаWilkinson, Alan. The secret battle: Stoke Field, 16th June 1487. Nottingham: Midas of Nottingham, 1987.
Знайти повний текст джерелаJacquemin, Marion. La protection des sources des journalistes. Paris: CFPJ, 2000.
Знайти повний текст джерелаNath, Chopra Pran, and Bakshi S. R. 1935-, eds. Quit India Movement: British secret documents. New Delhi, India: Interprint, 1986.
Знайти повний текст джерелаThe passionate shopper: Secret sources for you and your home. New York: Hearst Books, 1999.
Знайти повний текст джерелаJournal secret: 1886-1889. [Paris]: Mercure de France, 2007.
Знайти повний текст джерелаBrejc, Miha. Vmesni čas: Varnostno-informativna služba in nastajanje nove slovenske države, 1990-1993. Ljubljana: Mladinska knjiga, 1994.
Знайти повний текст джерелаForrások a titkosszolgálatok politológiai tanulmányozásához. Szeged: JATEPress, 2010.
Знайти повний текст джерелаЧастини книг з теми "Secret des sources"
Mayne, Andrew. "Sources and Background." In The Secret Agent by Joseph Conrad, 6–9. London: Macmillan Education UK, 1987. http://dx.doi.org/10.1007/978-1-349-09206-2_2.
Повний текст джерелаDodis, Yevgeniy, Krzysztof Pietrzak, and Bartosz Przydatek. "Separating Sources for Encryption and Secret Sharing." In Theory of Cryptography, 601–16. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11681878_31.
Повний текст джерелаDanbury, Richard, and Judith Townend. "Can you keep a secret? Legal and technological obstacles to protecting journalistic sources 1." In Journalism, Power and Investigation, 95–111. London ; New York : Routledge, 2019.: Routledge, 2019. http://dx.doi.org/10.4324/9781315181943-6.
Повний текст джерелаHesz, Ágnes. "Secret police informer files as sources for the study of vernacular religion under communism." In The Secret Police and the Religious Underground in Communist and Post-Communist Eastern Europe, 213–33. London: Routledge, 2021. http://dx.doi.org/10.4324/9780429331466-14.
Повний текст джерелаMuramatsu, Jun, and Shigeki Miyake. "Uniform Random Number Generation and Secret Key Agreement for General Sources by Using Sparse Matrices." In Mathematical Modelling for Next-Generation Cryptography, 177–98. Singapore: Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-5065-7_10.
Повний текст джерелаKrasner, David. "Secrets and Sources." In An Actor’s Craft, 77–102. London: Macmillan Education UK, 2012. http://dx.doi.org/10.1007/978-0-230-35772-3_5.
Повний текст джерелаGibson, Stevyn D. "Exploring the role and value of open source intelligence." In Secret Intelligence, 95–106. 2nd ed. London: Routledge, 2019. http://dx.doi.org/10.4324/9780429029028-8.
Повний текст джерелаAzcárate, Asunción López-Varela. "Private Secrets and Open Sources." In Neglected American Women Writers of the Long Nineteenth Century, 116–29. New York, NY: Routledge, 2019. | Series: Routledge: Routledge, 2019. http://dx.doi.org/10.4324/9780429201837-9.
Повний текст джерелаPearson, Mark. "Confidentiality, secrets, sources and disclosure." In The Communicator's Guide to Media Law and Ethics, 142–74. London: Routledge, 2023. http://dx.doi.org/10.4324/9781003372752-8.
Повний текст джерелаAraújo, Hugo André Flores Fernandes. "Secrecy, War, and Communication: Challenges and Strategies of the General-Government of the State of Brazil in the Second Half of the Seventeenth Century." In Privacy at Sea, 173–97. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-35847-0_8.
Повний текст джерелаТези доповідей конференцій з теми "Secret des sources"
Prabhakaran, Vinod M., Krishnan Eswaran, and Kannan Ramchandran. "Secrecy via sources and channels — A secret key - Secret message rate tradeoff region." In 2008 IEEE International Symposium on Information Theory - ISIT. IEEE, 2008. http://dx.doi.org/10.1109/isit.2008.4595139.
Повний текст джерелаEswaran, Krishnan, Vinod M. Prabhakaran, and Kannan Ramchandran. "Secret communication using sources and channels." In 2008 42nd Asilomar Conference on Signals, Systems and Computers. IEEE, 2008. http://dx.doi.org/10.1109/acssc.2008.5074492.
Повний текст джерелаNitinawarat, Sirin. "Secret key generation for correlated Gaussian sources." In 2008 IEEE International Symposium on Information Theory - ISIT. IEEE, 2008. http://dx.doi.org/10.1109/isit.2008.4595077.
Повний текст джерелаReny, Jian, Lein Harnz, and Tongtong Li. "How to leak a secret from multiple sources." In MILCOM 2008 - 2008 IEEE Military Communications Conference (MILCOM). IEEE, 2008. http://dx.doi.org/10.1109/milcom.2008.4753202.
Повний текст джерелаLin, Pin-Hsun, Carsten R. Janda, Eduard A. Jorswieck, and Rafael F. Schaefer. "Stealthy keyless secret key generation from degraded sources." In 2017 51st Asilomar Conference on Signals, Systems, and Computers. IEEE, 2017. http://dx.doi.org/10.1109/acssc.2017.8335126.
Повний текст джерелаAleksandrova, Elena Mikhaylovna. "THE SECRET SOCIETY: GAME OF FAITH." In Themed collection of papers from Foreign International Scientific Conference «Trends in the development of science and Global challenges» Ьу НNRI «National development» in cooperation with AFP. April 2023. - Managua (Nicaragua). Crossref, 2023. http://dx.doi.org/10.37539/230415.2023.56.16.023.
Повний текст джерелаKhisti, Ashish, Suhas N. Diggavi, and Gregory Wornell. "Secret-key generation with correlated sources and noisy channels." In 2008 IEEE International Symposium on Information Theory - ISIT. IEEE, 2008. http://dx.doi.org/10.1109/isit.2008.4595138.
Повний текст джерелаLing, Cong, Laura Luzzi, and Matthieu R. Bloch. "Secret key generation from Gaussian sources using lattice hashing." In 2013 IEEE International Symposium on Information Theory (ISIT). IEEE, 2013. http://dx.doi.org/10.1109/isit.2013.6620701.
Повний текст джерелаCao, Daming, and Wei Kang. "Secret key generation from correlated sources and secure link." In 2017 9th International Conference on Wireless Communications and Signal Processing (WCSP). IEEE, 2017. http://dx.doi.org/10.1109/wcsp.2017.8171157.
Повний текст джерелаChan, Chung, Navin Kashyap, Praneeth Kumar Vippathalla, and Qiaoqiao Zhou. "One-Shot Perfect Secret Key Agreement for Finite Linear Sources." In 2019 IEEE International Symposium on Information Theory (ISIT). IEEE, 2019. http://dx.doi.org/10.1109/isit.2019.8849668.
Повний текст джерелаЗвіти організацій з теми "Secret des sources"
Mcalpin, Jerry D. Information Requirements for the Secure Transportation of Radioactive Sources. Office of Scientific and Technical Information (OSTI), March 2019. http://dx.doi.org/10.2172/1499300.
Повний текст джерелаRobitaille, George E. Small Modular Reactors: The Army's Secure Source of Energy? Fort Belvoir, VA: Defense Technical Information Center, March 2012. http://dx.doi.org/10.21236/ada561802.
Повний текст джерелаBagnulo, M., and A. Garcia-Martinez. SEcure Neighbor Discovery (SEND) Source Address Validation Improvement (SAVI). RFC Editor, May 2014. http://dx.doi.org/10.17487/rfc7219.
Повний текст джерелаBarton, Adam. The Secret Sauce of Development Professionals: Tools for Assessing TOR Potential to Source Scalable Learning Interventions. Research on Improving Systems of Education (RISE), March 2023. http://dx.doi.org/10.35489/bsg-rise-ri_2023/054.
Повний текст джерелаEhud Greenspan. STAR: The Secure Transportable Autonomous Reactor System - Encapsulated Fission Heat Source. Office of Scientific and Technical Information (OSTI), October 2003. http://dx.doi.org/10.2172/816808.
Повний текст джерелаSaydjari, Sami. Defense Advanced Research Project Agency (DARPA) Information Assurance Program: Secure Open Source OS Workshop. Fort Belvoir, VA: Defense Technical Information Center, November 1999. http://dx.doi.org/10.21236/ada399895.
Повний текст джерелаTsvetkov, Pavel Valeryevich, Salvador B. Rodriguez, David E. ,. II Ames, and Gary Eugene Rochau. High fidelity nuclear energy system optimization towards an environmentally benign, sustainable, and secure energy source. Office of Scientific and Technical Information (OSTI), September 2009. http://dx.doi.org/10.2172/992316.
Повний текст джерелаTsvetkov, Pavel Valeryevich, Salvador B. Rodriguez, David E. ,. II Ames, and Gary Eugene Rochau. High fidelity nuclear energy system optimization towards an environmentally benign, sustainable, and secure energy source. Office of Scientific and Technical Information (OSTI), October 2010. http://dx.doi.org/10.2172/992769.
Повний текст джерелаLohn, Andrew. Poison in the Well: Securing the Shared Resources of Machine Learning. Center for Security and Emerging Technology, June 2021. http://dx.doi.org/10.51593/2020ca013.
Повний текст джерелаGreenspan, Ehud. STAR: The Secure Tranportable Autonomous Reactor system, Encapsulated Fission Heat Source. Progress report for period terminating March 31, 2000. Office of Scientific and Technical Information (OSTI), April 2000. http://dx.doi.org/10.2172/761826.
Повний текст джерела