• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 121
  • 118
  • 29
  • 26
  • 15
  • 10
  • 7
  • 6
  • 6
  • 6
  • 3
  • 3
  • 3
  • 2
  • 2
  • Tagged with
  • 414
  • 49
  • 46
  • 45
  • 41
  • 41
  • 38
  • 37
  • 33
  • 32
  • 32
  • 31
  • 24
  • 23
  • 22
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

Qui sont ces personnes qui respectent les secrets? : le rôle des traits de personnalité

Hamid, Mariam 04 1900 (has links) (PDF)
La présente recherche a pour objectif d'étudier l'effet exercé par les traits de personnalité sur le sentiment d'obligation des employés à respecter les accords de secret. Le concept de traits de personnalité appelé noyau d'évaluation de soi (Core self evaluation ou CSE) est composé de quatre principaux traits qui sont l'estime de soi, l'auto efficacité, la stabilité émotionnelle et le locus de contrôle. Ces traits de personnalité sont mis en relation avec les trois dimensions de l'engagement organisationnel à savoir l'engagement affectif, normatif et de continuité. L'obligation de respecter les accords de secret fait référence à la dimension de continuité de l'engagement mais également à la dimension normative de l'engagement. Le but principal de cette recherche est de faire progresser les connaissances académiques dans ce domaine. La recherche repose sur une démarche hypothético-déductive. Les hypothèses ont été testées sur un échantillon de 115 employés d'une filiale canadienne de technologie. La méthode de collecte des données est un questionnaire et la technique d'analyse de celle-ci est la méthode des moindres carrés ordinaires. Le test de 'student' a été appliqué pour apprécier la significativité individuelle des variables. Les résultats montrent que le locus de contrôle interne et l'auto efficacité généralisée influencent le sentiment d'obligation des employés à protéger le secret commercial tandis que l'estime de soi et la stabilité émotionnelle ne semblent a priori avoir aucune incidence. La perception de la compatibilité entre l'employé et l'organisation (Perceived Organizational Fit) et l'obligation des employeurs sont les variables de contrôle les plus importantes car, elles sont significatives dans quasiment tous les modèles. ______________________________________________________________________________ MOTS-CLÉS DE L’AUTEUR : Accords de secret, noyau d'évaluation de soi, traits de personnalité, propriété intellectuelle, engagement, obligation des employeurs, locus de contrôle, estime de soi, auto efficacité généralisée, stabilité émotionnelle
22

La protection du secret en droit des personnes et de la famille /

Abravanel-Jolly, Sabine, January 1900 (has links)
Texte remanié de: Thèse de doctorat--Droit privé--Lyon 3, 1999. / Bibliogr. p. 277-310. Index.
23

Youth triad-related subcultures : some case studies /

Wong, Shui-wai. January 1992 (has links)
Thesis (M. Soc. Sc.)--University of Hong Kong, 1992.
24

Beiträge zur russischen Geschichte 1816-1825 (Dekabristenaufstand) /

Bogatina, Sophie. January 1907 (has links)
Thesis--Bern. / Includes bibliographical references.
25

Youth triad-related subcultures some case studies /

Wong, Shui-wai. January 1992 (has links)
Thesis (M.Soc.Sc.)--University of Hong Kong, 1992. / Also available in print.
26

Real World Secret Leaking / REAL WORLD SECRET LEAKING: THE DESIGN AND ANALYSIS OF A PROTOCOL CREATED FOR THE PURPOSE OF LEAKING DOCUMENTS UNDER SURVEILLANCE

Knopf, Karl January 2019 (has links)
In scenarios where an individual wishes to leak confidential information to an unauthorized party, he may do so in a public or an anonymous way. When acting publicly a leaker exposes his identity, whereas acting anonymously a leaker can introduce doubts about the information’s authenticity. Current solutions assume anonymity from everyone except a trusted third party or rely on the leaker possessing prior cryptographic keys, both of which are inadequate assumptions in real-world secret leaking scenarios. In this research we present a system called the attested drop protocol which provides confidentiality for the leaker, while still allowing leaked documents to have their origins verified. The protocol relies on identities associated with common communication mediums, and seeks to avoid having the leaker carry out sophisticated cryptographic operations. We also present two constructions of the general protocol, where each is designed to protect against different forms of adversarial surveillance. We use ceremony analysis and other techniques from the provable security paradigm to formally describe and evaluate security goals for both constructions. / Thesis / Master of Science (MSc) / Whistleblowing is an activity where an individual leaks some secrets about an organization to an unauthorized entity, often for moral or regulatory reasons. When doing so, the whistleblower is faced with the choice of acting publicly, and risking retribution or acting anonymously and risking not being believed. We have designed a protocol called the attested drop protocol, which protects the identity of the whistleblower, while allowing the unauthorized entity to have a means of verifying that the leak came from the organization. This protocol makes use of preexisting identities associated with a communication medium, such as emails, to avoid using cryptographic primitives that are impractical.
27

One Time Password Scheme Via Secret Sharing Techniques

Miceli, Christopher 20 May 2011 (has links)
Many organizations today are seeking to improve security by implementing multi-factor authentication, i.e. authentication requiring more than one independent mechanism to prove one's identity. One-time passwords in the form of hardware tokens in combination with conventional passwords have emerged as the predominant means in high security environments to satisfy the independent identification criteria for strong authentication. However, current popular public one-time passwords solutions such as HOTP, mOTP, TOTP, and S/Key depend on the computational complexity of breaking encryption or hash functions for security. This thesis will present an efficient and information-theoretically secure one-time password system called Shamir-OTP that is based upon secret sharing techniques.
28

Design, analysis and applications of cryptographic techniques

Yeun, Chan Yeob January 2000 (has links)
No description available.
29

Grey Level Visual Cryptography for General Access Structures

MacPherson, Lesley January 2002 (has links)
Visual cryptography, first introduced by Naor and Shamir, allows a secret (black and white) image to be encoded and distributed to a set of participants such that certain predefined sets of participants may reconstruct the image without any computation. In 2000, Blundo, De Santis, and Naor introduced a model for grey-level visual cryptography which is a generalization of visual cryptography for general access structures. Grey-level visual cryptography extends this model to include grey-scale images. Decoding is done by the human visual system. In this thesis we survey known results of grey-level visual cryptography and visual cryptography for general access structures. We extend several visual cryptography constructions to grey-level visual cryptography, and derive new results on the minimum possible pixel expansion for all possible access structures on at most four participants.
30

Secret et procès pénal / Confidentiality and the criminal process

Messeroux, Yasmine 01 February 2011 (has links)
Le secret participe à l'idée de respect de l'intégrité morale de l'individu. A ce titre, il apparaît comme une valeur universellement reconnue et internationalement consacrée. Assurément rattaché à la notion d'individualisme, le secret est lié à la progression des Droits de l'Homme. Obstacle à toutes les formes d'appétences étatiques, il est naturellement consacré en tant qu'élément protecteur du respect de l'individu, par les textes internationaux fondamentaux tels que la Déclaration universelle des Droits de l'Homme adoptée par l'Assemblée générale des Nations-Unies le 10 décembre 1948, la Convention européenne des Droits de l'Homme et des libertés fondamentales adoptée par le Conseil de l'Europe le 4 novembre 1950 ou le Pacte des Nations-Unies relatif aux droits civils et politiques adopté par les Nations-Unies le 16 décembre 1966. Cette protection internationale est par ailleurs complétée par des dispositions internes propres à chaque État, conjuguant dans la majorité des cas des mesures civiles et pénales. Le secret apparait à chacune des étapes du procès pénal : que ce soit à la phase de l'enquête policière et l'instruction, ou de celle du jugement et des délibérations sur l'innocence ou la culpabilité de la personne mise en examen. Et au-delà du procès proprement dit, pour faciliter la réinsertion du condamné, le secret réapparait. / Confidentiality calls for the respectful preservation of the individual's rights and integrity during the criminal process. Therefore, it has been universally recognized and deemed important worldwide. Seen as sacred to the individual, confidentiality is a continuation of Human rights. Seen as an obstacle to any attempt of governmental intrusion, it is therefore important to the protection of the individual's rights, as stated by the following international bodies of law: the Universal Declaration of Human Rights adopted by the United Nations General Assembly on December 10, 1948, the European Convention on Human Rights and Basic Freedoms adopted by the European Council on November 4, 1950, and the International Covenant on Civil and Political Rights adopted by the United Nations on December 16, 1966. This international protection is reinforced by internal decisions made in every country, combining in most cases some aspects of civil and cri minal nature. Confidentiality appears in every stage of the criminal process : during the police investigation and charges or during trial and jury deliberations on the innocence or guilt of the defendant. Even beyond the trial, confidentiality becomes integral in the rehabilitation of the condemned.

Page generated in 0.0568 seconds