• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 122
  • 118
  • 29
  • 26
  • 15
  • 10
  • 7
  • 6
  • 6
  • 6
  • 3
  • 3
  • 3
  • 2
  • 2
  • Tagged with
  • 416
  • 49
  • 46
  • 45
  • 41
  • 41
  • 38
  • 37
  • 33
  • 32
  • 32
  • 31
  • 25
  • 23
  • 22
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
251

Vasculhando a vida alheia: o diário íntimo de José Vieira Couto de Magalhães (1880-1887) / Watching the other life: the diary secret of José Vieira Couto de Magalhães (1880-1887)

Araújo, Patrícia Simone 10 May 2013 (has links)
Submitted by Marlene Santos (marlene.bc.ufg@gmail.com) on 2016-05-04T18:13:51Z No. of bitstreams: 2 Dissertação - Patrícia Simone de Araújo - 2013.pdf: 4303327 bytes, checksum: 0f5f281d7b35b68244bbb5301ef3566c (MD5) license_rdf: 19874 bytes, checksum: 38cb62ef53e6f513db2fb7e337df6485 (MD5) / Approved for entry into archive by Luciana Ferreira (lucgeral@gmail.com) on 2016-05-05T12:48:03Z (GMT) No. of bitstreams: 2 Dissertação - Patrícia Simone de Araújo - 2013.pdf: 4303327 bytes, checksum: 0f5f281d7b35b68244bbb5301ef3566c (MD5) license_rdf: 19874 bytes, checksum: 38cb62ef53e6f513db2fb7e337df6485 (MD5) / Made available in DSpace on 2016-05-05T12:48:03Z (GMT). No. of bitstreams: 2 Dissertação - Patrícia Simone de Araújo - 2013.pdf: 4303327 bytes, checksum: 0f5f281d7b35b68244bbb5301ef3566c (MD5) license_rdf: 19874 bytes, checksum: 38cb62ef53e6f513db2fb7e337df6485 (MD5) Previous issue date: 2013-05-10 / Coordenação de Aperfeiçoamento de Pessoal de Nível Superior - CAPES / This study examines the diary of José Vieira Couto de Magalhães, focusing on themes: sexuality, body, health and disease. The interlocution of this document with the rest produced by the same author - books, reports, among others - evidenced a egocentric personality, which in an ingenious way built up a heroic image for themselves. Legitimized by their peers, by historiography and especially the imperial regime, Couto enters the pages of history as the great hero of the War of Paraguay.But if in public boasted an image of strong and courageous man, in his diary brought out moments of anguish and fears, above all when was considering the possibility of becoming ill. Furthermore, her writing secret also reveals a look interpretive and original about your oneiric universe - soaked a homoerotic desire - challenger in relation to moral values of the nineteenth century. / Este estudo analisa o diário íntimo de José Vieira Couto de Magalhães privilegiando as temáticas: sexualidades, corpo, saúde e doença. A interlocução desse documento com outros produzidos pelo mesmo – livros, relatórios, dentre outros – evidenciou uma personalidade que de forma engenhosa construiu uma imagem heroica para si. Legitimado pelos seus pares, pela historiografia e principalmente pelo regime imperial, Couto adentra as páginas da história como o grande heroi da Guerra do Paraguai. Mas, se em público ostentava uma imagem de um homem forte e corajoso, em seu diário aflorou momentos de angústias e temores, sobretudo quando cogitava a possibilidade de adoecer. Além disso, sua escrita íntima também revela um olhar interpretativo original sobre o seu universo onírico - embebido de um desejo homoerótico - e desafiador em relação aos valores morais do século XIX.
252

A Lab System for Secret Sharing / Utveckling av laborationssystem för secret sharing

Olsson, Fredrik January 2004 (has links)
Finnegan Lab System is a graphical computer program for learning how secret sharing works. With its focus on the algorithms and the data streams, the user does not have to consider machine-specific low-level details. It is highly modularised and is not restricted to secret sharing, but can easily be extended with new functions, such as building blocks for Feistel networks or signal processing. This thesis describes what secret sharing is, the development of a new lab system designed for secret sharing and how it can be used.
253

High-speed continuous-variable quantum key distribution over atmospheric turbulent channels

Qu, Zhen, Djordjevic, Ivan B. 20 February 2017 (has links)
We experimentally demonstrate a RF-assisted four-state continuous-variable quantum key distribution (CV-QKD) system in the presence of turbulence. The atmospheric turbulence channel is emulated by two spatial light modulators (SLMs) on which two randomly generated azimuthal phase patterns are recorded yielding Andrews' azimuthal phase spectrum. Frequency and phase locking are not required in our system thanks to the proposed digital phase noise cancellation (PNC) stage. Besides, the transmittance fluctuation can be monitored accurately by the DC level in this PNC stage, which is free of post-processing noise. The mean excess noise is measured to be 0.014, and the maximum secret key rate of >20Mbit/s can be obtained with the transmittance of 0.85, while employing the commercial PIN photodetectors.
254

Le bien-information / The asset-information

Bigot-Destreguil, Marine 31 March 2017 (has links)
Dans un contexte de mondialisation et, dans une société de l'information et de l'innovation stratégique, l'information est devenue un élément de fonctionnement et un facteur de développement économique indispensable aux entreprises. Face à de nouveaux enjeux politiques, économiques et même sociologiques, la nécessité d'identifier l'information est devenue de plus en plus ardente. Néanmoins, l'incertitude demeure quant à la notion même d'information et, malgré les nombreuses tentatives du législateur, il semble difficile de la cerner avec exactitude. C'est pourquoi, l'élaboration d'une définition de l'information semblait nécessaire. Il a été jugé préférable de recourir à une définition négative et positive de l'information. L'analyse juridique de l'information implique ensuite de procéder à une opération de qualification, laquelle peut paraître délicate, tant la réalité juridique de l'information est diverse. Dans le cas présent, c'est la valeur­ investissement, qui permet d'attraire l'information dans la catégorie des biens. A cet égard, la nouveauté suscitée par la valeur immatérielle de l 'information ne paraît pas adaptée à la conception classique du droit de propriété. L'information s'inscrit en effet, comme un fournisseur potentiel de revenus, et la propriété telle que retenue dans la démonstration. est celle qui doit garantir à son propriétaire d'exploiter toutes les utilités du bien. C'est donc une propriété plus souple qui ne se laisse pas enfermer dans le simple triptyque de l 'usus, abusus et fructus, mais qui, au contraire, développe un champ des possibilités infinies, pourvu que le propriétaire ait une maitrise absolue sur son bien-information. / In an environment of globalization, and in a strategic innovation and information society, information has become an element of functioning and an essential factor of economic development for companies. Faced with new political, economic and even sociological issues, the need to identify information has become more and more ardent. Nevertheless, uncertainty remains as to the notion of information and, despite the many attempts of the legislator, it seems difficult to define if precisely. Therefore, the development of a definition of information seemed necessary. It was considered preferable to use a negative and positive definition of information. The legal analysis of information then involves carrying out a qualification operation, which may seem delicate, as the legal reality of information is diverse. In the case at end, it is the investment-value, which makes it possible to attract the information in the category of assets. In this respect, the novelty aroused by the immaterial value of the information does not seem to be adapted to the classical conception of the right of property. The information is actually a potential supplier of income, and the property as retained in the demonstration, is the one that must guarantee to ifs owner to exploit al! the utilities of the asset. It is therefore a more flexible property which does not allow itself to be enclosed in the simple triptych of the usus, abusus and fructus, but which, on the contrary, develops infinite possibilities, provided that the owner has absolute control over his asset-information.
255

Le Paradoxe de l'action furtive. / The paradox of furtive actions

Lapalu, Sophie 27 January 2017 (has links)
Au cours du XXème siècle jusqu’à aujourd’hui, des artistes d’horizons divers ont revendiqué comme oeuvres des gestes banals, effectués dans l’espace public. Réalisées au sein de la foule des grandes villes, aucune de ces actions n’a pourtant eu lieu en présence d’un spectateur. En raison de leur indiscernabilité artistique lors de leur effectuation, nous les nommons des « actions furtives ». Considérant que l’adjectif furtif qualifie ce qui cherche « à échapper au regard, à passer inaperçu », comment ces actions deviennent-elles oeuvres ? Notre travail s’attache à étudier ce paradoxe à travers notamment l’oeuvre de Vito Acconci, Adrian Piper, Jiří Kovanda ou Francis Alÿs. Nous cherchons à saisir l’élan qui a mené ces artistes à quitter les lieux traditionnellement consacrés à l’art pour embrasser la foule des grandes villes et faisons l’hypothèse d’une « attitude de la modernité » ; l’artiste s’engage activement dans le monde et son élaboration. Nous étudions ensuite la façon dont l’action furtive devient oeuvre et la structure qui se dessine, entre dissimulation et révélation. Les publications permettent à l’action furtive de faire oeuvre et fonctionnent comme des « écrans » qui désignent l’acte passé et le cachent à la fois, orientant la perception du spectateur à rebours. Enfin nous analysons la réception de l’action furtive devenue oeuvre, dont le délai instaure une relation dialogique et contribue à transformer le public. L’oeuvre affirme ainsi sa valeur d’exemplarité et invite le spectateur à agir. / Throughout the XXth century and still today, artists of diverse horizons have claimed for ordinary acts done out in public spaces the status of artworks. Created amidst big city crowd, none of these acts, however, took place in the presence of a spectator. Due to artistic indiscernibility during their effectuation, we name them “furtive actions”. Considering the adjective “furtive” to qualify which seeks to “to escape the look, to go unnoticed”, how might such actions become artworks? Our task is to study this paradox, notably through the works of Vito Acconci, Adrian Piper, Jiří Kovanda or Francis Alÿs.We aim to apprehend the energy that led these artists to leave the sites traditionally dedicated to art in order to embrace the metropolitan crowds. We propose as hypothesis an “attitude of the modern”; the artist engages actively within the world and its elaboration. We then study the way furtive action becomes art work and the structure that takes shape, between dissimulation and revelation. These publications enable the furtive action to become art and to function as “screens” that indicate the past act and at the same time conceal it, orienting in reverse the perception by the spectator. Finally, we analyze reception of the furtive action become art work, wherein the time-lapse sets up a dialogic relationship and contributes to a transformation of the public. The art work thus asserts its value of exemplarity and invites the spectator toward action.
256

La confidentialité de l'arbitrage / Confidentiality of arbitration

Al Allaf, Yamen 05 October 2015 (has links)
Étant le mode naturel de règlement des litiges dans le commerce international, l’arbitrage a pour avantage de maintenir le secret des affaires. D’abord, les débats arbitraux sont tenus à huis clos. La contractualisation de l’arbitrage traduit la volonté des parties d’un débat privé. Ensuite, les éléments produits au cours du procès sont couverts par la confidentialité. Enfin, la sentence arbitrale ne doit être publique qu’avec le consentement des parties. La confidentialité s’oppose notamment à un principe fondamental du droit processuel : la publicité des débats. La confidentialité, pourtant enracinée dans l’esprit des acteurs de l’arbitrage, est aujourd’hui remise en cause par des préconisations qui élèvent la voix pour ouvrir les portes des tribunaux arbitraux afin de répondre aux besoins de transparence jaillie de l’ordre public, et pour s’harmoniser avec l’époque de mondialisation et de technologie omniprésente. Compte tenu de la judiciarisation, juridictionnalisation, et la marchandisation auxquelles s’expose l’arbitrage actuel, la pondération entre ces impératifs enchevêtrés est-elle possible ? A la lumière de tous ces défis, nous mènerons l’étude sur la confidentialité d’un arbitrage de nature mixte (juridictionnelle et contractuelle), afin de savoir si cette confidentialité est l’essence même de ce mode si particulier de résolution des litiges / Arbitration is the natural dispute settlement mechanism of the international business as it presents the advantage of binding commercial secrecy. The contractualisation of the Arbitration reflects the parties’ willingness to keep the proceedings private. Firstly, arbitral discussions are heard in closed session. Then, any evidences produced during the trial are covered by the confidentiality. At last, the arbitral award may not be public without the consent of the parties. The confidentiality goes against the open-court principle which is a basic rule of Procedural law. Confidentialy is deeply rooted in the Arbitration community. However, this principle is nowadays questioned. Some are raising their voice to open the doors of the Arbitration Courts to submit those jurisdictions to transparency, globalization and ubiquous technology. Considering that modern Arbitration is going through judicialisation, jurisdictionalisation and commoditisation, the question is now raised of a balance between those new tangled and inter-related imperatives. In the context of all these challenges, we are going to undertake a study on the confidentialy of an Arbitration having a hybrid nature (jurisdictional and contractual) in order to know if that confidentialy is the very essence of that peculiar dispute settlement mechanism
257

Crowned in shamrocks erin't Broad Acres : the emergence of the Irish Catholic community in Yorkshire, and the evolution of the West Riding's forgotten Irish rugby clubs, 1860-c 1920

Holmes, David January 2010 (has links)
This thesis examines the emergence of the Irish Catholic diaspora in the industrial diocese of the West Riding of Yorkshire, and the evolution of the West Riding's forgotten Irish rugby clubs, 1860-c 1920. In addition to considering the contributions of Irish immigrants in the history of rugby football this thesis explores their religious, nationalist, social and cultural experiences, set within the wider history of Irish immigration in England. The history and establishment of parochial and non-parochial Irish Catholic rugby clubs in the West Riding can be traced back to the 1870s. Diasporic Irish Catholics settled in the county have always been part of rugby football since it's inception, albeit, at a much slower and punctuated rate than that observed among English Protestant communities. The foremost aim of this thesis is to scrutinise the rugby antecedents of Irish Catholics domiciled in the manufacturing centres of the West Riding during the Victorian and early Edwardian periods. In the late nineteenth century, towns and cities across the West Riding had become the great citadels of rugby football. Rugby attracted much participation, giving rise to the Catholic Church establishing its own internalised parochial rugby clubs, which were intended to improve the spiritual and physical well-being of its poor Irish adherents. This thesis, moreover, examines the establishment of non-parochial Irish rugby clubs which acted as sporting auxiliaries to Irish nationalist clubs. Finally, this thesis investigates those opportunities which allowed some working-class Irish Catholics to participate in games of rugby league outside of their own ethno-religious clubs for some of the county's senior professional rugby clubs. Since the main objective of Irish nationalist organisations was to offer financial support and political muscle to the Irish Parliamentary Party, this thesis will argue that the establishment of non-parochial nationalist Irish rugby clubs initially centred on the sport's by products, "gate-money".
258

La fiscalité directe au Liban : Histoire et processus d'une modernisation / The direct taxation in Lebanon : History and Modernization process

Al Arja, Rabih 05 September 2011 (has links)
Plusieurs cultures se sont mêlées à la conception du système fiscal actuel au Liban. Ce système cédulaire, inchangeable depuis les années cinquante, se caractérise par la prédominance des impôts indirects reflétant une difficulté à atteindre l’assiette des impôts directs.C’est dans cette perspective qu’une révision intégrale du système fiscal Libanais s’avère cruciale. Cette révision doit tenir en compte les spécificités de l’économie libanaise basée sur les secteurs du tourisme et des finances et caractérisée par un secret bancaire très développé, des finances publiques rongées par le poids de la dette publique et du déficit budgétaire, et de la situation géopolitique du Liban, situé dans une région objet de conflits permanents.Dans ce cadre, plusieurs réformes ont déjà été mises en place; l’introduction de la TVA en 2002 constituait la réforme majeure des impôts indirects, la création de la DASS, de la DGE du côté des impôts directs.Toutefois la réforme en cours traite l’unification des impôts cédulaires en un impôt global; cela peut établir une meilleure justice entre les contribuables et engendrer une augmentation des recettes fiscales. Le secret bancaire constitue un important défi à ce type d’imposition. A noter que l’abolition du secret bancaire n’est pas envisageable actuellement considérant son rôle majeur dans l’attraction des capitaux étrangers. Pour cela, la nouvelle loi doit essayer de trouver des solutions pour parvenir à la bonne application de l’imposition globale. A ce niveau, les expériences égyptienne (contrôle fiscal des revenus des capitaux mobiliers, des activités commerciales et industrielles et des professions libérales) et tunisienne (l’application des « acomptes provisionnelles » et de « la retenue à la source ») peuvent constituer des sources d’inspiration. / Many cultures contributed to draw the current Lebanese tax system. This system, where taxes differ according to the source of income, haven’t been reformed since the fifties. The predominance of indirect taxation is the main characteristic reflecting the disability to reach the tax base within the direct taxation.Under this perspective, a full revision of the taxation system seems to be crucial. This revision should take into consideration the specificity of the Lebanese economy based on tourism and financial sectors and where banking secrecy is very developed, the public finance gnaw at by the public debt burden and the budget deficit, and the geopolitical situation where Lebanon is located in the heart of a conflict region.Many reforms had been already undertaken; the VAT implementation in 2002 is the main indirect tax reform; the introduction of DASS and DGE are the reform undertaken on the direct taxes side.Moreover, the current reform aim to unify the different income tax under one global tax; this can lead to a better justice among taxpayers and therefore to an increase in tax revenues.The banking secrecy is an important challenge to this taxation. In fact, due to its major role attracting the foreign capitals, the abolition of this system is not currently considered. For this reason, the new law should figure out the appropriate conducts for a better application of the global tax.At this level, the Egyptian and the Tunisian experiences could be sources of inspiration. The first one regarding the tax audit on the revenues from movable capitals, commercial and industrial activities and the liberal professions. The second one related to the application of the “forecasted installments” and the “stopping at source”.
259

Reconstrução da chave secreta do RSA multi-primo / Reconstructing the secret key of RSA multi-prime

Reynaldo Caceres Villena 23 September 2013 (has links)
Em 2009, N. Heninger e H. Shacham apresentaram um algoritmo de reconstrução que permite recuperar a chave secreta sk do criptossistema RSA básico em tempo polinomial tendo em forma aleatória 27 % dos seus bits. Sabemos que podemos obter uma versão com erros (bits modicados) da chave secreta RSA graças aos ataques cold boot. O algoritmo apresentado por Heninger-Shacham corrige esses erros fazendo uso das relações matemáticas que existe entre as chaves pública e secreta do criptossistema RSA básico. O objetivo deste trabalho é estudar esse algoritmo para implementar e analisar seu análogo para o criptossistema RSA multi-primo. Os resultados obtidos mostram que para reconstruir a chave secreta sk do criptossistema RSA u-primos é preciso ter uma fração de bits corretos maior a 2 - 2^((u+2)/(2u+1)), mostrando assim que a segurança oferecida pelo criptossistema RSA multi-primo (u>/ 3) é maior com relação ao criptossistema RSA básico (u = 2). / In 2009, N. Heninger and H. Shacham presented an algoritm for reconstructing the secret key sk of the basic RSA cryptosystem in polynomial time With a fraction of random bits greater or equal to 0.27 of its bits. We know that secret key with errors sk can be obtained from DRAM using cold-boot attacks. The Heninger and Shacham\'s algorithm xes these errors using the redundancy of secret and public key of basic RSA cryptosystem. In this work, the topic is to study this algoritm to implement and analyze its analogous for the multi-prime RSA cryptosystem. Our obtained results show the secret key sk of multi-prime RSA cryptosystem can be Reconstructed having a fraction equal or greater than 2 - 2^((u+2)/(2u+1)) of random bits. therefore the security of multi-prime RSA cryptosystem (u >/ 3) is greater than basic RSA cryptosystem (u = 2).
260

Vote électronique : définitions et techniques d'analyse / Electronic Voting : Definitions and Analysis Techniques

Lallemand, Joseph 08 November 2019 (has links)
Cette thèse porte sur l'étude de différents aspects de la sécurité des protocoles de vote électronique à distance. Ces protocoles décrivent comment organiser des élections par Internet de manière sécurisée. Ils ont notamment pour but d'apporter des garanties de secret du vote, et de vérifiabilité - ie, il doit être possible de s'assurer que les votes sont correctement comptabilisés. Nos contributions portent sur deux aspects principaux. Premièrement, nous proposons une nouvelle technique d'analyse automatique de propriétés d'équivalence, dans le modèle symbolique. De nombreuses propriétés en lien avec la vie privée s'expriment comme des propriétés d'équivalence, telles que le secret du vote en particulier, mais aussi l'anonymat ou la non-traçabilité. Notre approche repose sur le typage: nous mettons au point un système de typage qui permet d'analyser deux protocoles pour prouver leur équivalence. Nous montrons que notre système de typage est correct, c'est-à-dire qu'il implique effectivement l'équivalence de traces, à la fois pour des nombres bornés et non bornés de sessions. Nous comparons l'implémentation d'un prototype de notre système avec les autres outils existants pour l'équivalence symbolique, sur divers protocoles de la littérature. Cette étude de cas montre que notre procédure est bien plus efficace que la plupart des autres outils - au prix d'une perte de précision (notre outil peut parfois échouer à prouver certaines équivalences). Notre seconde contribution est une étude des définitions du secret du vote et de la vérifiabilité - ou, plus précisément, la vérifiabilité individuelle, une propriété qui requiert que chaque votant soit en mesure de vérifier que son propre vote a bien été pris en compte. Nous prouvons, aussi bien dans les modèles symboliques que calculatoire, que le secret du vote implique la vérifiabilité individuelle, alors même que l'intuition et des résultats voisins déjà établis semblaient indiquer que ces deux propriétés s'opposent. Notre étude met également en évidence une limitation des définitions existantes du secret du vote par jeux cryptographiques : elles supposent une urne honnête, et par conséquent expriment des garanties significativement plus faibles que celles que les protocoles visent à assurer. Nous proposons donc une nouvelle définition (par jeu) du secret du vote, contre une urne malhonnête. Nous relions notre définition à une notion de secret du vote par simulation, pour montrer qu'elle apporte des garanties fortes. Enfin, nous menons une étude de cas sur plusieurs systèmes de vote existants. / In this thesis we study several aspects of the security of remote electronic voting protocols. Such protocols describe how to securely organise elections over the Internet. They notably aim to guarantee vote privacy - ie, votes must remain secret -and verifiability - it must be possible to check that votes are correctly counted. Our contributions are on two aspects. First, we propose a new approach to automatically prove equivalence properties in the symbolic model. Many privacy properties can be expressed as equivalence properties, such as in particular vote privacy, but also anonymity or unlinkability. Our approach relies on typing: we design a type system that can typecheck two protocols to prove their equivalence. We show that our type system %, together with some additional conditions on the messages exchanged by the protocols, soundly implies trace equivalence, both for bounded and unbounded numbers of sessions. We compare a prototype implementation of our typechecker with other existing tools for symbolic equivalence, on a variety of protocols from the literature. This case study shows that our procedure is much more efficient than most other tools - at the price of losing precision (our tool may fail to prove some equivalences). Our second contribution is a study of the definitions of privacy and verifiability - more precisely, individual verifiability, a property that requires each voter to be able to check that their own vote is counted. We prove that, both in symbolic and computational models, privacy implies individual verifiability, contrary to intuition and related previous results that seem to indicate that these two properties are opposed. Our study also highlights a limitation of existing game-based definitions of privacy: they assume the ballot box is trusted, which makes for significantly weaker guarantees than what protocols aim for. Hence we propose a new game-based definition for vote privacy against a dishonest ballot box. We relate our definition to a simulation-based notion of privacy, to show that it provides meaningful guarantees, and conduct a case study on several voting schemes.

Page generated in 0.0616 seconds