• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 122
  • 118
  • 29
  • 26
  • 15
  • 10
  • 7
  • 6
  • 6
  • 6
  • 3
  • 3
  • 3
  • 2
  • 2
  • Tagged with
  • 416
  • 49
  • 46
  • 45
  • 41
  • 41
  • 38
  • 37
  • 33
  • 32
  • 32
  • 31
  • 25
  • 23
  • 22
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
191

Cryptography and Computer Communications Security. Extending the Human Security Perimeter through a Web of Trust

Adeka, Muhammad I. January 2015 (has links)
This work modifies Shamir’s algorithm by sharing a random key that is used to lock up the secret data; as against sharing the data itself. This is significant in cloud computing, especially with homomorphic encryption. Using web design, the resultant scheme practically globalises secret sharing with authentications and inherent secondary applications. The work aims at improving cybersecurity via a joint exploitation of human factors and technology; a human-centred cybersecurity design as opposed to technology-centred. The completed functional scheme is tagged CDRSAS. The literature on secret sharing schemes is reviewed together with the concepts of human factors, trust, cyberspace/cryptology and an analysis on a 3-factor security assessment process. This is followed by the relevance of passwords within the context of human factors. The main research design/implementation and system performance are analysed, together with a proposal for a new antidote against 419 fraudsters. Two twin equations were invented in the investigation process; a pair each for secret sharing and a risk-centred security assessment technique. The building blocks/software used for the CDRSAS include Shamir’s algorithm, MD5, HTML5, PHP, Java, Servlets, JSP, Javascript, MySQL, JQuery, CSS, MATLAB, MS Excel, MS Visio, and Photoshop. The codes are developed in Eclipse IDE, and the Java-based system runs on Tomcat and Apache, using XAMPP Server. Its code units have passed JUnit tests. The system compares favourably with SSSS. Defeating socio-cryptanalysis in cyberspace requires strategies that are centred on human trust, trust-related human attributes, and technology. The PhD research is completed but there is scope for future work. / Petroleum Technology Development Fund (PTDF), Abuja, Nigeria.
192

SEXUALIZING THE BODY POLITIC: NARRATING THE FEMALE BODY ANDTHE GENDER DIVIDE IN SECRET HISTORY

Horansky, Eileen A. 19 May 2015 (has links)
No description available.
193

REDUCED COMPLEMENTARY DYNAMIC AND DIFFERENTIAL CMOS LOGIC: A DESIGN METHODOLOGY FOR DPA RESISTANT CRYPTOGRAPHIC CIRCUITS

RAMMOHAN, SRIVIDHYA 03 July 2007 (has links)
No description available.
194

Redesigning sedentary office environments, guided by new ergonomics theory

Zhao, Yingxue 25 September 2012 (has links)
No description available.
195

SECRET HISTORY IN CONTEMPORARY AMERICA: RE-READING <i>ALL THE KING'S MEN</i> AND <i>PRIMARY COLORS</I>

Petraska, Megan Nicole 29 April 2016 (has links)
No description available.
196

Selected Original Piano Solo Works of Robert Boury: Emphasis on Performance and Practice Suggestions

Shimizu-Grow, Rina 16 December 2011 (has links)
No description available.
197

The Rites of Manhood : a performative embodiment

Nilsson, Moa-Matilda January 2024 (has links)
This paper explores which role textile has in the staging of masculinity through an investigation of fraternal groups. The project combines the themes textile craft, gender studies and men only secret societies and in this paper I explain the key concepts of my theoretical interests of my artistic practice which is performativity, masculinity and ritualization.
198

Child as Cure: The Idealized Child in the Works of Frances Hodgson Burnett

Ewing, Rachel Marie 13 June 2022 (has links)
This thesis traces the figure of the idealized child through three of Frances Hodgson Burnett's children's books: Editha's Burglar (1888), Little Lord Fauntleroy (1886), and The Secret Garden (1911). In all three books Frances Hodgson Burnett introduces child characters who have a nuanced understanding of the world around them that allows them to cure the brokenness in the adult world. Burnett's use of the child figure and of illness as a representation of flaws in society reflected increased focus on these topics in the nineteenth century; they also rose from her belief in mind cure. This thesis examines the source of the curative power each protagonist wields, the impacts of their cure, and what the need for cure says about the larger society and the characters themselves. It also emphasizes how this cure was shaped by the children's gender and socioeconomic status. I argue that throughout all three works Burnett's protagonists take on traits of the idealized child to restore the world to her view of the natural world order. In doing this, Burnett reaffirms traditional family structure, separate spheres ideology, and class hierarchy. / Master of Arts / This thesis traces the figure of the idealized child through three of Frances Hodgson Burnett's children's books: Editha's Burglar (1888), Little Lord Fauntleroy (1886), and The Secret Garden (1911). In all three books Frances Hodgson Burnett introduces child characters who have a nuanced understanding of the world around them that allows them to cure the brokenness in the adult world. Burnett's use of the child figure and of illness as a representation of flaws in society reflected increased focus on these topics in the nineteenth century; they also rose from her belief in mind cure. This thesis examines the source of the curative power each protagonist wields, the impacts of their cure, and what the need for cure says about the larger society and the characters themselves. It also emphasizes how this cure was shaped by the children's gender and socioeconomic status. I argue that throughout all three works Burnett's protagonists take on traits of the idealized child to restore the world to her view of the natural world order. In doing this, Burnett reaffirms traditional family structure, separate spheres ideology, and class hierarchy.
199

Presidential Security: Bodies, Bubbles, & Bunkers

Newswander, Chad B. 07 May 2009 (has links)
The purpose of this research is to show how the idea of presidential security is a construct that has taken on several different meanings and rationalities in the American context due to shifting power relations, new practices of presidential security, and the constant re-formulation of the friend/enemy distinction. The United States Service has had to continually think and re-think the concept of presidential security in order to provide suitable protection for the President of the United States. In creating these spaces of protection, the practices of the Secret Service have slowly contributed to re-constituting the sovereign to fit the agency's particular logics and rationalities. The capturing of the Chief Executive Officer does not only rest on disciplinary techniques that restrict, but are also founded on the truth production of the Secret Service: presidents begin to accept and internalize the modus operandi of the Secret Service. They begin to self-monitor their own desires and actions related to security concerns. The walls of protection are coupled with a conscious capitulation to accept the barriers of protection. The cage is no longer only imposed from without, but also emerges internally. By problematizing how this evolving security bubble encapsulates the president, this dissertation is able to examine how the Secret Service begins to reshape and reformulate key democratic governance values by protecting the public and private body of the president through a disciplinary apparatus that seeks to control and contain as well as display and deliberate. Democratic norms that privilege openness have to be challenged, if not curtailed, to adequately protect the Chief Executive Officer. Everyone and everything is a risk that must be inspected, catalogued, and watched, even the president cannot be trusted with his own safety. With its mission to protect, the Secret Service has constructed an organizational operation to ostracize the other, permanently put the president behind protective procedures, and present a pleasing public persona fitting to the status of the POTUS. These overt actions have allowed an administrative agency to redefine key democratic governance values. The agency has been able to delineate who is a suspicious other, justify the placement of barricades that separate the president from the people, instill a preventive/security ethos in the Office of the President, and display the president as the apex of a constitutional order. Because of its successes and failures, presidential protection has become normal, acceptable, legitimate, and absolutely necessary, which has provided the Service the ability to give shape to a particular rationality concerning what the president can and cannot do. This constitutive role of a public agency has had a dramatic impact on how the people come to experience and interact with the POTUS. The development of the Secret Service and its protective procedures, however, has been sporadic and tenuous. For the past 100 years, this emerging rationality was produced by a multitude of sources that have helped construct the idea and practice of presidential security. The subjects of insecurity and security mutually created the idea of POTUS endangerment and safety. Enemies of the state have helped mold state action while friends of the president have sought to project an image of presidential grandeur. In this context, the Service has had to secure territorial spaces in order to conceal and confuse threats while simultaneously having to display and disclose the presidential body to the public. The capacity to control threats and to coordinate the presidential spectacle has enabled the Service to direct the body and mind of the POTUS. With this disciplinary apparatus in place, the Secret Service is able to construct bubbles and bunkers that are designed to protect and trap the president's two bodies. / Ph. D.
200

Caractéristiques sociodémographiques et psychologiques des individus gardant secrète leur infidélité

Simard, Marie-Lyliane 24 April 2018 (has links)
L’infidélité fait partie des problématiques conjugales à la fois les plus prévalentes et les plus souffrantes sur le plan psychologique. La notion de secret, qui lui est centrale, s’avère pourtant un aspect très peu étudié. Ce mémoire doctoral compare les caractéristiques psychologiques et conjugales des individus gardant secrète leur infidélité (n = 81) à celles des individus l’ayant révélée (n = 48) et ceux ne déclarant pas de conduites infidèles dans leur relation de couple actuelle (n = 459). Six questionnaires complétés en ligne sont utilisés, ceux-ci mesurant les caractéristiques sociodémographiques, les relations extraconjugales, les motivations à l’infidélité, la satisfaction conjugale, les traits de personnalité du Big-Five et le style d’attachement. Les résultats démontrent que le fait d’être âgé de plus de 35 ans, de posséder un style d’attachement non-sécurisant, d’avoir des conduites infidèles motivées par des raisons sexuelles, de ne pas comprendre les raisons de son infidélité et d’envisager poursuivre la relation extraconjugale seraient des prédicteurs d’une infidélité gardée secrète. Ces constats permettent d’avancer l’idée que de garder son infidélité secrète pourrait avoir deux buts principaux : éviter les conséquences psychologiques et conjugales pouvant découler du dévoilement de son infidélité et faire perdurer la relation extraconjugale afin de permettre que la satisfaction des besoins non comblés dans le couple se poursuive.

Page generated in 0.0661 seconds