Results 11 to 20 of about 617,080 (246)
Atomic secrets and governmental lies : nuclear science, politics and security in the Pontecorvo case [PDF]
This paper focuses on the defection of nuclear physicist Bruno Pontecorvo from Britain to the USSR in 1950 in an attempt to understand how government and intelligence services assess threats deriving from the unwanted spread of secret scientific ...
Turchetti, Simone
core +1 more source
ABOUT INTELLIGENCE - tabs in the history of intelligence services [PDF]
The approach of intelligence from the historic point of view regarding intelligence services in Romania contributes to defining the „intelligence branch” and describing essential aspects referring to the mechanisms of secret service functioning and ...
Eugen Siteanu
doaj
Keeping Authorities "Honest or Bust" with Decentralized Witness Cosigning [PDF]
The secret keys of critical network authorities - such as time, name, certificate, and software update services - represent high-value targets for hackers, criminals, and spy agencies wishing to use these keys secretly to compromise other hosts.
Ford, Bryan +8 more
core +3 more sources
When the First World War began, only the Central Powers collaborated with regards to secret war, Germany provided leadership in matter of spying and counter-spying.
Olivier Lahaie
doaj +1 more source
The state and the organized crime [PDF]
In this article the author speaks about the ways of connection between the state and the organized crime. Corruption is the common way of that connection, but here the author pays special attention to another way of that connection, when the state, its ...
Ćirić Jovan
doaj +1 more source
Going 'below the waterline': the paradoxical regulation of secret surveillance in the UK [PDF]
The Investigatory Powers Tribunal recently found that government surveillance was unlawful, marking the first time that the secretive court has ever ruled against the UK’s Intelligence Services.
Keenan, Bernard
core +3 more sources
O artigo analisa a formação dos agentes de informação e/ou repressão que atuaram em dependências públicas civis e/ou militares durante a última ditadura brasileira (1964-1985).
Samantha Viz Quadrat
doaj +1 more source
Why Do People Conceal Their Consumption Practice?:
The purpose of this paper was to conduct an interpretive analysis of the motives for keeping consumption secret, in order to shed light on the motives that existing studies have addressed, and to reconstruct the classification framework.
Shunta Rokushima
doaj +1 more source
Providing distributed certificate authority service in mobile ad hoc networks [PDF]
In this paper, we propose an architecture for providing distributed Certificate Authority (CA) service in Mobile Ad Hoc Networks (MANET), based on threshold cryptography. We have two major contributions: 1) we make use of the cluster structure to provide
Dong, Y +5 more
core +1 more source
Quantum key distribution (QKD) promises to deliver secure keys, which can be applied for security demands in optical networks by using cost-efficient and scalable lightpaths.
Hua Wang +7 more
doaj +1 more source

