Academic literature on the topic 'Secret service and espionage'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Secret service and espionage.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Secret service and espionage"

1

Kim, Byeong jun. "A study on the organizations and duty of Korean and British Intelligence agencies." Korean Association of Public Safety and Criminal Justice 32, no. 3 (2023): 103–34. http://dx.doi.org/10.21181/kjpc.2023.32.3.103.

Full text
Abstract:
This study aims to find the cause of problems such as political intervention and human rights violations related to the National Intelligence Service in Korea. To this end, the organization and duty of Korean and British intelligence agencies were analyzed using literature review research methods. As a result of the analysis, the study identified that the problems related to the National Intelligence Service were caused by the obscurity of the regulation - ‘domestic security information’ - under the National Intelligence Service Act and the abuse of investigative power during intelligence acti
APA, Harvard, Vancouver, ISO, and other styles
2

Smith, Michael M. "The Mexican Secret Service in the United States, 1910-1920." Americas 59, no. 1 (2002): 65–85. http://dx.doi.org/10.1353/tam.2002.0091.

Full text
Abstract:
Throughout the era of the Mexican Revolution, the United States provided sanctuary for thousands of political exiles who opposed the regimes of Porfirio Díaz, Francisco Madero, Victoriano Huerta, and Venustiano Carranza. Persecuted enemies of Don Porfirio and losers in the bloody war of factions that followed the ouster of the old regime continued their struggle for power from bases of operation north of the international boundary in such places as San Francisco, Los Angeles, El Paso, San Antonio, New Orleans, and New York. As a consequence, Mexican regimes were compelled not only to combat th
APA, Harvard, Vancouver, ISO, and other styles
3

Bobylov, Yu. "Does Russia Need Establishing Foreign Economic Intelligence Service?" Voprosy Ekonomiki, no. 4 (April 20, 2003): 123–34. http://dx.doi.org/10.32609/0042-8736-2003-4-123-134.

Full text
Abstract:
The increasing role of foreign intelligence and industrial espionage in order to improve competitiveness of Russian business is noted in the article. In the author's view, Russia's WTO accession requires application of protective secret managing technologies. The establishment of a new Russian special service - the intelligence unit in the structure of the Ministry of Economic Development and Trade is proposed which will be able to perform important functions under conditions of Russia's growing integration in the world economy.
APA, Harvard, Vancouver, ISO, and other styles
4

Świerczek, Marek. "Working methods of the Russian secret services in the light of the Oleg Kulinich case." Przegląd Bezpieczeństwa Wewnętrznego 15, no. 29 (2023): 291–322. http://dx.doi.org/10.4467/20801335pbw.23.031.18773.

Full text
Abstract:
The author analyses the case of the detention of Ukrainian Security Service officer Oleg Kulinich on suspicion of espionage for the Federal Security Service of the Russian Federation. On the basis of the analysis of the tasks posed to this Russian agent, he concludes that the modus operandi of Russian counterintelligence is diametrically opposed to the methods of Western services. The main difference is the shifting of the centre of gravity of operational activities from reconnaissance-information work to attempts at agentic seizure of control over enemy institutions, mainly civilian and milit
APA, Harvard, Vancouver, ISO, and other styles
5

Leșcu, Artur. "The Russian Empire’s Intelligence and Counterintelligence Services – General Considerations." Romanian Military Thinking 2024, no. 1 (2024): 222–29. http://dx.doi.org/10.55535/rmt.2024.1.13.

Full text
Abstract:
The Russian Empire was based, since the early years of the nineteenth century, mainly on military force, in the composition of which an important role was played by the accumulation of information on opponents and the fight against foreign espionage inside the country. Despite the central role attributed to these secret services, the Russian Empire did not have a specialized body in the field of military espionage. In this context, based on a vast and new Russian historiographical material, accumulated as a result of research by the National Archives of the Republic of Moldova, the author pres
APA, Harvard, Vancouver, ISO, and other styles
6

Latkowska, Iwona. "Soviet espionage and anti-state activity in Corps District Command V Krakow in the interwar period. Selected examples." Prace Naukowe Uniwersytetu Humanistyczno-Przyrodniczego im. Jana Długosza w Częstochowie. Zeszyty Historyczne 19 (2021): 157–73. http://dx.doi.org/10.16926/zh.2021.19.08.

Full text
Abstract:
The article attempts to present and analyze examples of espionage and anti-state activities, inspired by the services of the USSR and illegal communist environments. The area of their activity was limited to the territory of the District Command No. V Kraków, i.e. the provinces of Kraków, Silesia and parts of Kielce one, which also were under the supervision of the Independent Information Office, that was part of its structure. It was its duties that included regular inspections in garrisons or military units, observations of people suspected of espionage and, finally, liquidation of scandals
APA, Harvard, Vancouver, ISO, and other styles
7

Makarov, A. V., N. Yu Gusevskaya, and A. S. Petrov. "Counteraction to High Treason in Russian Legislation of the Second Half of the 19th — Early 20th Centuries." Nauchnyi dialog, no. 1 (January 27, 2021): 337–56. http://dx.doi.org/10.24224/2227-1295-2021-1-337-356.

Full text
Abstract:
The problem of improving the criminal liability of the subjects of the Russian Empire at the end of the nineteenth century for espionage and spilling state secrets to a foreign state is considered. The relevance of the study is due to the importance of the problem under study for the effective functioning of the Russian state. The study is based on historical sources of a regulatory and legal nature and is interdisciplinary in nature. Particular attention is paid to the study of legal norms, the identification of the type and amount of punishments for the commission of espionage by Russian cit
APA, Harvard, Vancouver, ISO, and other styles
8

Leșcu, Artur. "Serviciile de spionaj și contraspionaj ale Imperiului Rus – de la origini până la Primul Război Mondial. Aspecte generale." Gândirea Militară Românească 2024, no. 1 (2024): 228–35. http://dx.doi.org/10.55535/gmr.2024.1.13.

Full text
Abstract:
The Russian Empire was based, since the early years of the nineteenth century, mainly on military force, in the composition of which an important role was played by the accumulation of information on opponents and the fight against foreign espionage inside the country. Despite the central role attributed to these secret services, the Russian Empire did not have a specialized body in the field of military espionage. In this context, based on a vast and new Russian historiographical material, accumulated as a result of research by the National Archives of the Republic of Moldova, the author pres
APA, Harvard, Vancouver, ISO, and other styles
9

Vlasenko, V. M., and Е. А. Murashko. "COMPOSITION AND STRUCTURE OF THE SPECIAL INFORMATION SERVICE (based on Hnat Porokhivsky’s archive-investigative case materials)." Sums'ka Starovyna (Ancient Sumy Land), no. 56 (2020): 21–31. http://dx.doi.org/10.21272/starovyna.2020.56.2.

Full text
Abstract:
The lack of the scientific literature concerning the Intelligence Service of Romania (Special Information Service) is stated. Only some references to the activities of the Intelligence Service of Romania on the territory of Ukraine are mentioned in the isolated publications. The authors used the documents and materials from Hnat Porokhivsky’s archive-investigative case which is kept in the Sectoral State Archive of the Security Service of Ukraine. The materials mentioned above are representative and fill the gap in the issue concerning the structure of the Special Information Service of Romani
APA, Harvard, Vancouver, ISO, and other styles
10

Li, Wei. "The Security Service for Chinese Central Leaders." China Quarterly 143 (September 1995): 814–27. http://dx.doi.org/10.1017/s030574100001506x.

Full text
Abstract:
National leaders need security protection against political assassinations, espionage, terrorism and many other dangers, and therefore almost every country has a specialized organization to provide such protection. In the United States, the President is protected by the Secret Service of the Treasury Department, and in the Soviet Union, the Kremlin denizens were guarded by the Ninth Directorate of the KGB. The Chinese security system for the top leadership, consisting mainly of the Central Security Bureau in Zhongnanhai, is however distinctive in several respects. Institutionally it has a pecu
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Secret service and espionage"

1

Ritchey, David (David Benjamin. "George Washington's Development as an Espionage Chief." Thesis, University of North Texas, 1993. https://digital.library.unt.edu/ark:/67531/metadc500803/.

Full text
Abstract:
The American Revolution was a war of movement over great distances. Timely intelligence regarding the strength and location of the enemy was vital to the commanders on both sides. Washington gained his early experience in intelligence gathering in the wilderness during the French and Indian War. By the end of the American Revolution, Washington had become a skilled manager of intelligence. He sent agents behind enemy lines, recruited tory intelligence sources, questioned travelers for information, and initiated numerous espionage missions. Many heroic patriots gathered the intelligence that he
APA, Harvard, Vancouver, ISO, and other styles
2

Blistène, Pauline. "Voir et faire voir le secret de l'État : fonctions et enjeux de la fiction d’espionnage contemporaine." Thesis, Paris 1, 2020. http://www.theses.fr/2020PA01H219.

Full text
Abstract:
Quelle est la valeur politique, morale et philosophique des fictions dites « d’espionnage » ? Nous examinons cette question à partir d’une méthodologie innovante mêlant analyse de séries télévisées contemporaines (Homeland, Le Bureau des Légendes) et enquêtes de terrain auprès des acteurs du renseignement (CIA, DGSE) et du divertissement (showrunners, scénaristes). La thèse que nous défendons est celle d’une modification du statut ontologique et épistémique des films ou séries d’espionnage en raison de l’engagement de véritables espions dans leur fabrication. L’importance politique et philosop
APA, Harvard, Vancouver, ISO, and other styles
3

Genêt, Stéphane. "Renseignement militaire et actions secrètes de la guerre de succession d’Autriche au traité de Paris (1740-1763)." Thesis, Paris 4, 2010. http://www.theses.fr/2010PA040174.

Full text
Abstract:
Ce travail aborde la question du renseignement militaire de la guerre de succession d’Autriche (1740) au traité de Paris (1763). Le renseignement militaire est d’abord replacé dans la réflexion stratégique de la période qui l’évoque peu tout en soulignent paradoxalement l’importance pour les armées. Les différentes sources de l’information militaire constituent la seconde partie. L’espion d’armée, figure méconnue de la période joue un rôle quotidien auprès des armées d’Ancien Régime. Situé à la marge de la société civile et de la sphère militaire, attiré par le gain mais aussi par le goût de l
APA, Harvard, Vancouver, ISO, and other styles
4

Le, Voguer Gildas. "Secret et démocratie dans l'Amérique de l'après-guerre : le contrôle parlementaire de l'activité des services de renseignement, 1947-1987." Orléans, 1992. http://www.theses.fr/1995ORLE1012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Genêt, Stéphane. "Renseignement militaire et actions secrètes de la guerre de succession d’Autriche au traité de Paris (1740-1763)." Electronic Thesis or Diss., Paris 4, 2010. https://accesdistant.sorbonne-universite.fr/login?url=https://theses-intra.sorbonne-universite.fr/2010PA040174.pdf.

Full text
Abstract:
Ce travail aborde la question du renseignement militaire de la guerre de succession d’Autriche (1740) au traité de Paris (1763). Le renseignement militaire est d’abord replacé dans la réflexion stratégique de la période qui l’évoque peu tout en soulignent paradoxalement l’importance pour les armées. Les différentes sources de l’information militaire constituent la seconde partie. L’espion d’armée, figure méconnue de la période joue un rôle quotidien auprès des armées d’Ancien Régime. Situé à la marge de la société civile et de la sphère militaire, attiré par le gain mais aussi par le goût de l
APA, Harvard, Vancouver, ISO, and other styles
6

Gleghorn, Todd E. "Exposing the seams : the impetus for reforming U.S. counterintelligence." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03sep%5FGleghorn.pdf.

Full text
Abstract:
Thesis (M.A. in National Security Affairs)--Naval Postgraduate School, September 2003.<br>Thesis advisor(s): David C. Tucker, James Russell. Includes bibliographical references (p. 87-91). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
7

Davies, Philip H. J. "Organisational development of Britain's Secret Intelligence Service 1909-1979." Thesis, University of Reading, 1997. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.363245.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

PARIS, XAVIER-LOUIS. "Le secret medical dans le service de sante de l'armee." Nantes, 1991. http://www.theses.fr/1991NANT030M.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Harlow, Richard. "Two missions, one secret service : the value of the investigative mission." Thesis, Monterey, California. Naval Postgraduate School, 2011. http://hdl.handle.net/10945/5587.

Full text
Abstract:
CHDS State/Local<br>Approved for public release; distribution is unlimited<br>The dual missions of the United States Secret Service, investigations and protection, appear to be without relationship or value to the other, and as a result, support and attention for the investigative mission has waned. This lack of attention to investigations is dangerous for the Secret Service and for the country it serves. To make this argument, this thesis attempts to determine whether the investigative mission is actually important to the successful performance of its protective mission. Through the use of a
APA, Harvard, Vancouver, ISO, and other styles
10

Newswander, Chad B. "Agency of Crisis: The Chaos and Reordering of Presidential Security." Thesis, Virginia Tech, 2008. http://hdl.handle.net/10919/31879.

Full text
Abstract:
Crisis situations have the power to restructure knowledge, norms, rules and discourse. The status quo can be changed, transformed, and revolutionized through shocks to a system. These events often lead to chaos and reordering. Deflecting blame, assigning praise and guilt, transcending the situation, and corrective actions are secondary concerns when an organization is trying to change its core identity and epistemic reality. These shocks to the system provide a momentary break in time in which new discursive spaces open and become available. In particular, crisis situations that become ma
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Secret service and espionage"

1

Campbell, Duncan. Secret service. Gloucester Press, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Lloyd, Mark. The Guinness book of espionage. Da Capo Press, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lloyd, Mark. The Guinness book of espionage. Guinness, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Polmar, Norman. Spy book: The encyclopedia of espionage. Random House, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

(consultant), Macrakis Kristie, ed. World War II espionage. ABDO Publishing Company, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

West, Nigel. Games of intelligence: The classified conflictof international espionage. Weidenfeld and Nicolson, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Smith, Michael, 1952 May 1-, ed. The spying game: The secret history of British espionage. Politico's, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Plowden, Alison. The Elizabethan secret service. Harvester Wheatsheaf, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

1960-, Satō Masaru, ред. インテリジェンス武器なき戦争. Gentōsha, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Piekałkiewicz, Janusz. World history of espionage: Agents, systems, operations. National Intelligence Book Center, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Secret service and espionage"

1

Wippl, Joseph W. "Observations on successful espionage." In Secret Intelligence, 2nd ed. Routledge, 2019. http://dx.doi.org/10.4324/9780429029028-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Usborne, Richard. "Our Secret Service." In Special Operations. Routledge, 2021. http://dx.doi.org/10.4324/9781003206613-19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Gagné, Michel Jacques. "The secret cleaning service." In Thinking Critically About the Kennedy Assassination. Routledge, 2022. http://dx.doi.org/10.4324/9781003222460-18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Green, John. "Münzenberg’s British Secret Service Files." In Willi Münzenberg. Routledge, 2019. http://dx.doi.org/10.4324/9780429326035-15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Danylenko, Andrii. "On the Caliph's Secret Service." In Portraits of Medieval Europe, 800–1400. Routledge, 2024. http://dx.doi.org/10.4324/9781003318972-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Mulvenon, James. "Economic Espionage and Trade Secret Theft Cases in the US." In China’s Quest for Foreign Technology. Routledge, 2020. http://dx.doi.org/10.4324/9781003035084-23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Iordanou, Ioanna. "Venice’s Secret Agents." In Venice's Secret Service. Oxford University Press, 2019. http://dx.doi.org/10.1093/oso/9780198791317.003.0005.

Full text
Abstract:
This chapter discusses the different types of secret agents whom the Venetian authorities employed for their intelligence pursuits. These were drawn from all strata of Venetian society. Representing the patriciate, Venetian ambassadors and governors acted as semi-professional informants whose intelligence-gathering activities were coterminous with the norms of diplomatic decorum. Venetian merchants from either the patriciate or the social order of the cittadini also offered their services as amateur intelligence gatherers, protected under the guise of their professional activity. For outright espionage missions, however, when the spy had to infiltrate foreign lands, the Ten handpicked run-of-the-mill mercenary spies who were willing to risk their lives for a cash reward, an official privilege, or a political favour. The chapter shows how the Council of Ten commodified the practice of intelligence-gathering and espionage and turned it into a business transaction between the government and the governed.
APA, Harvard, Vancouver, ISO, and other styles
8

"8 The Coyote, the Roadrunner, and the Reds under the Bed: Communist Espionage and Subversion." In Secret Service. University of Toronto Press, 2012. http://dx.doi.org/10.3138/9781442662377-010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Otto, Heilbrunn. "A Classic in Espionage: The ‘Red Orchestra’, 1941–43." In The Soviet Secret Services. Routledge, 2020. http://dx.doi.org/10.4324/9781003103158-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Piekarz, Agnieszka. "Characteristics and Activities of the US Secret Service." In Corporate Espionage, Geopolitics, and Diplomacy Issues in International Business. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-1031-4.ch017.

Full text
Abstract:
The United States Secret Service is one of the world's oldest and most elite security agencies protecting the most important people in the country such as the President and Vice President, among others. However, this is not the agency's only responsibility. This chapter covers the organization's other duties such as locating counterfeit money, discovering fake documents such as passports, fraud, and intelligence / counterintelligence. Furthermore, the chapter explains how the Secret Service was established, how its responsibilities have changed over the years, and major historical events which highly influenced the entire agency. Finally, the chapter examines the agency's international cooperation with the Polish security agency, Biuro Ochrony Rzadu (BOR), and domestic cooperation with the US Diplomatic Security Service (DSS).
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Secret service and espionage"

1

Jalil, Juriah Abd. "Addressing the Threats of Online Theft of Trade Secret and Cyber Espionage in Malaysia: The Legal Landscape." In 2018 6th International Conference on Cyber and IT Service Management (CITSM). IEEE, 2018. http://dx.doi.org/10.1109/citsm.2018.8674061.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Miteva, Boryana. "Bulgarian scientific and technical intelligence in Japan during the Cold War." In 9th International e-Conference on Studies in Humanities and Social Sciences. Center for Open Access in Science, Belgrade - Serbia, 2023. http://dx.doi.org/10.32591/coas.e-conf.09.06055m.

Full text
Abstract:
Since Bulgarian-Japan relations have already been well researched by the scholar Evgeny Kandilarov, this study aims to pose an accent on a very specific aspect of their Cold War interaction. Based primary on Bulgarian declassified documents of ex-socialist secret services it attempts to supplement Cold War studies and knowledge about Sofia-Tokyo relations as a part of Japan’s relations with the Soviet Union and the East European countries as a whole. It provides analysis regarding aims, methodology, expansion, cooperation, and results of Bulgarian scientific and technical intelligence in Japan
APA, Harvard, Vancouver, ISO, and other styles
3

Namin, A. S., Ruizhong Wei, Weiming Shen, and H. Ghenniwa. "Applying secret sharing schemes to service reputation." In Proceedings of the Ninth International Conference on Computer Supported Cooperative Work in Design. IEEE, 2005. http://dx.doi.org/10.1109/cscwd.2005.194269.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Zidaru, Marian. "�THE TRUST� STALIN�S OWN SECRET SERVICE ORGANISATIONS." In 9th SWS International Scientific Conferences on SOCIAL SCIENCES - ISCSS 2022. SGEM WORLD SCIENCE, 2022. http://dx.doi.org/10.35603/sws.iscss.2022/s01.006.

Full text
Abstract:
�The Trust� Stalin�s own secret service organizations were appropriately named in 1930, for the exclusive purpose of using the emigration upon which he considered the OGPU has not concentrated sufficiently or used to the fullest extent, and this he believed to be because the OGPU, was already overloaded with work in other directions. The work of �The Trust� was the subject of the direct personal control of Stalin who had expressed the opinion that with the advance of Hitler to power in Germany, the political importance of Russian Emigration was growing with the increasing internal difficulties
APA, Harvard, Vancouver, ISO, and other styles
5

Ke, Chenyutao, Hiroaki Anada, Junpei Kawamoto, Kirill Morozov, and Kouichi Sakurai. "Cross-group Secret Sharing for Secure Cloud Storage Service." In IMCOM '16: The 10th International Conference on Ubiquitous Information Management and Communication. ACM, 2016. http://dx.doi.org/10.1145/2857546.2857610.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Bissoli, Andrea, and Fabrizio d'Amore. "Authentication as A Service Based on Shamir Secret Sharing." In 2021 International Symposium on Computer Science and Intelligent Controls (ISCSIC). IEEE, 2021. http://dx.doi.org/10.1109/iscsic54682.2021.00072.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Cheng, Qi, Xiaopu Ma, Qin-Yun Xu, and Yun-Qiu Chen. "A Family of Non-Representable Secret Sharing Matroids." In 2009 International Conference on Management and Service Science (MASS). IEEE, 2009. http://dx.doi.org/10.1109/icmss.2009.5304342.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Lee, Chih-Hung, Kun-Sheng Sun, Yun-Qiao Wang, Ji-Hwei Horng, and Chin-Chen Chang. "Secret Message CDMA Multiplexing via QR Codes." In ASSE' 22: 2022 3rd Asia Service Sciences and Software Engineering Conference. ACM, 2022. http://dx.doi.org/10.1145/3523181.3523189.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Gyongyosi, Laszlo, and Sandor Imre. "Quantum Informational Geometry for Secret Quantum Communication." In 2009 Computation World: Future Computing, Service Computation, Cognitive, Adaptive, Content, Patterns (COMPUTATIONWORLD). IEEE, 2009. http://dx.doi.org/10.1109/computationworld.2009.58.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Chen, Zhuo. "Multi-Organization Key Agreement and Secret Sharing for CERS." In 2009 International Conference on Management and Service Science (MASS). IEEE, 2009. http://dx.doi.org/10.1109/icmss.2009.5303859.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Secret service and espionage"

1

Kwan, S., P. Garg, J. Gilroy, L. Esibov, J. Westhead, and R. Hall. Generic Security Service Algorithm for Secret Key Transaction Authentication for DNS (GSS-TSIG). RFC Editor, 2003. http://dx.doi.org/10.17487/rfc3645.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!