Results 71 to 80 of about 1,240,487 (287)

THE CONFIDENTIALITY OF THE MEDICAL ACT IN THE DEPRIVATION OF LIBERTY ENVIRONMENT [PDF]

open access: yesChallenges of the Knowledge Society, 2018
Respecting the medical secrecy is one of the essential conditions underlying the protection of private life. Medical information obtained from patients in the context of a physician - patient relationship should be protected by confidentiality ...
Laurenţia Florentina GĂIŞTEANU (ŞTEFAN)
doaj  

Cryptography and randomization to dispose of data and boost system security

open access: yesCogent Engineering, 2017
Massive public pressure is arising to achieve data privacy and protection. One way to maintain data privacy is to perform efficient data disposal processes.
Shaikhah B. Alkhadhr   +1 more
doaj   +1 more source

Intertextualité et symbolisme dans Les secrets du sorcier noir de Bali Nébié [PDF]

open access: yesPensées Genre, Penser Autrement, 2022
En référence à sa culture Nuna, Bali Nébié dévoile dans son œuvre « Les secrets du sorcier noir » que tout Nuna croit en l’existence de la sorcellerie. Il décrit deux types dont celle considérée comme un don de Dieu et celle, associée aux forces du mal.
Hamidou Kader Aristide NIKIEMA
doaj  

Circularity, Sustainability, and the Quality of Coffee Sold via Vending Machines: What Do Italian Consumers Prefer?

open access: yesAgribusiness, EarlyView.
ABSTRACT Vending is an important sector in the daily lives of many people, and coffee is the most frequently consumed product in the European market. Like many other sectors, vending is responding to the challenge of sustainable development by taking various actions, such as offering increasingly ecologically sound coffee while maintaining/improving ...
Alberto Bertossi   +2 more
wiley   +1 more source

La face cachée de l’injonction de transparence

open access: yesLes Dossiers du GRIHL, 2014
In this paper, weintended todevelop a philosophical andpolitical criticism– inspired by a liberal conception of democracy– of the widespreadideologicalinjunction of transparency, which applies to theprivate lives of citizensas to the publiclife, that may
Jean-Pierre Cavaillé
doaj   +1 more source

Quantum correlations and secret bits

open access: yes, 2005
It is shown that (i) all entangled states can be mapped by single-copy measurements into probability distributions containing secret correlations, and (ii) if a probability distribution obtained from a quantum state contains secret correlations, then ...
Antonio Acín   +6 more
core   +2 more sources

Respirable Dust Exposure in Western Australian Mining: Trends, Variability, and Implications for Occupational Health

open access: yesAmerican Journal of Industrial Medicine, EarlyView.
ABSTRACT Background Mining workers are exposed to a range of respiratory hazards, including respirable dust. While exposure to respirable crystalline silica in the mining industry has been found to be common, less is known about trends in measured levels of exposure to respirable dust overall.
Renee N. Carey   +4 more
wiley   +1 more source

ÉROTISME ET SECRET DANS LA POÉSIE DE GUILLAUME APOLLINAIRE [PDF]

open access: yesStudii si Cercetari Filologice: Seria Limbi Romanice, 2015
Associée à une esthétique de la surprise, la poésie de Guillaume Apollinaire cultive un érotisme discret, appuyé sur l’ouverture envers l’autre alternant avec le secret de l’apparence.
Razvan VENTURA
doaj  

LES ABUS SEXUELS INTRAFAMILIAUX : CAS DE L’INCESTE COMMIS SUR UN ENFANT [PDF]

open access: yesCahiers Africains des Droits de l’Homme et de la Démocratie ainsi que du Développement Durable, 2022
Les violences sexuelles envers les enfants, perpétrées par les adultes au sein de la famille, est l’une des formes les moins visibles de maltraitance d’enfants, car elle se produit le plus souvent dans l’intimité de la vie domestique, mais elle n’en est ...
Annie BAPU KASONGO
doaj  

Multiparty Quantum Secret Sharing Based on Entanglement Swapping

open access: yes, 2004
A multiparty quantum secret sharing (QSS) protocol is proposed by using swapping quantum entanglement of Bell states. The secret messages are imposed on Bell states by local unitary operations.
B. Schneier   +5 more
core   +1 more source

Home - About - Disclaimer - Privacy