Journal articles on the topic 'The DAS(Draw A secret)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'The DAS(Draw A secret).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Anchit Verma and Dr. Ganesh Dubey. "National and International Protection of Trade Secret." Legal Research Development an International Refereed e-Journal 5, no. III (2021): 11–17. http://dx.doi.org/10.53724/lrd/v5n3.04.
Full textApprich, Clemens. "Secret Agents." Digital Culture & Society 4, no. 1 (2018): 29–44. http://dx.doi.org/10.14361/dcs-2018-0104.
Full textWu, Jingbang, Xiyu Chen, Luyuan Zhang, Shufen Zhou, and Daoshun Wang. "A Multi-Secret Reputation Adjustment Method in the Secret Sharing for Internet of Vehicles." Security and Communication Networks 2022 (May 13, 2022): 1–13. http://dx.doi.org/10.1155/2022/1413976.
Full textOppermann, Eva. "Mary and the Mystery of the Strange Crying: Elements of the Detective Story in The Secret Garden." International Research in Children's Literature 11, no. 1 (2018): 80–90. http://dx.doi.org/10.3366/ircl.2018.0255.
Full textOdovichena, Y. A., та O. Y. Orlovskiy. "A соmmercial secret. How can employer protect his secrets?" Uzhhorod National University Herald. Series: Law 1, № 80 (2024): 312–18. http://dx.doi.org/10.24144/2307-3322.2023.80.1.44.
Full textSabater, César, Florian Hahn, Andreas Peter, and Jan Ramon. "Private Sampling with Identifiable Cheaters." Proceedings on Privacy Enhancing Technologies 2023, no. 2 (2023): 361–83. http://dx.doi.org/10.56553/popets-2023-0058.
Full textKinsella, Helen M. "Sex as the secret: counterinsurgency in Afghanistan." International Theory 11, no. 1 (2018): 26–47. http://dx.doi.org/10.1017/s1752971918000210.
Full textNguyen, Thanh An, and Yong Zeng. "A VISION BASED GRAPHICAL PASSWORD." Journal of Integrated Design and Process Science: Transactions of the SDPS, Official Journal of the Society for Design and Process Science 14, no. 2 (2010): 43–52. http://dx.doi.org/10.3233/jid-2010-14204.
Full textSiebert, Sabina, and Barbara Czarniawska. "Distrust: Not Only in Secret Service Organizations." Journal of Management Inquiry 29, no. 3 (2018): 286–98. http://dx.doi.org/10.1177/1056492618798939.
Full textEVATT, GEOFFREY W., CHRISTOPH MAYER, AMY MALLINSON, I. DAVID ABRAHAMS, MATTHIAS HEIL, and LINDSEY NICHOLSON. "The secret life of ice sails." Journal of Glaciology 63, no. 242 (2017): 1049–62. http://dx.doi.org/10.1017/jog.2017.72.
Full textTurton, Roger W. "Secret Snowflake: Analysis of a Holiday Gift Exchange." Mathematics Teacher 101, no. 5 (2007): 332–39. http://dx.doi.org/10.5951/mt.101.5.0332.
Full textLiu, Bo, Baokang Zhao, Bo Liu, and Chunqing Wu. "A Security Real-time Privacy Amplification Scheme in QKD System." JUCS - Journal of Universal Computer Science 19, no. (16) (2013): 2420–36. https://doi.org/10.3217/jucs-019-16-2420.
Full textKorobkova, O. K., and M. A. Shadrina. "CONFIDENTIAL INFORMATION OF AN ORGANIZATION IN THE CONDITIONS OF DIGITALIZATION OF THE ECONOMY: TOPICAL ISSUES OF ITS PROTECTION MEASURES." Vestnik of Khabarovsk State University of Economics and Law, no. 2(112) (May 31, 2023): 76–79. http://dx.doi.org/10.38161/2618-9526-2023-2-076-079.
Full textLin, Juan, Chin-Chen Chang, and Ji-Hwei Horng. "Asymmetric Data Hiding for Compressed Images with High Payload and Reversibility." Symmetry 13, no. 12 (2021): 2355. http://dx.doi.org/10.3390/sym13122355.
Full textJohnson, Marion. "Interesting Document, Dangerous Translation." History in Africa 14 (1987): 359–61. http://dx.doi.org/10.2307/3171846.
Full textBritton, Siobhan. "What we do, is (still) secret? Collection, care and accessibility of zines in UK collections." Art Libraries Journal 43, no. 2 (2018): 72–76. http://dx.doi.org/10.1017/alj.2018.4.
Full textZhyhylii, S. P. "Non-disclosure of trade secrets is one of the important conditions of an employment contract." Analytical and Comparative Jurisprudence, no. 2 (April 28, 2025): 421–25. https://doi.org/10.24144/2788-6018.2025.02.60.
Full textShpugаnych, I. I., and Y. Ya Samahalska. "Right to information on the digital environment." Uzhhorod National University Herald. Series: Law 4, no. 86 (2025): 65–70. https://doi.org/10.24144/2307-3322.2024.86.1.4.10.
Full textMushtaque, Ahmed. "USING BIOMETRICS SYSTEM IN MOBILE BANKING." International Journal of Research – Granthaalayah 4, no. 3 (2017): 119–23. https://doi.org/10.5281/zenodo.847018.
Full textBanawan, Salma, and Ibrahim Kamel. "Hiding Information in Reversible English Transforms for a Blind Receiver." Applied Computational Intelligence and Soft Computing 2015 (2015): 1–13. http://dx.doi.org/10.1155/2015/387985.
Full textSereda, Olena, and Tetyana Krasyuk. "Termination of the employment agreement in the case of abolition of admission to a state secret: to problem issues." Law and innovations, no. 2 (38) (June 24, 2022): 57–63. http://dx.doi.org/10.37772/2518-1718-2022-2(38)-7.
Full textTomita, Chihiro, Makoto Takita, Kazuhide Fukushima, Yuto Nakano, Yoshiaki Shiraishi, and Masakatu Morii. "Extracting the Secrets of OpenSSL with RAMBleed." Sensors 22, no. 9 (2022): 3586. http://dx.doi.org/10.3390/s22093586.
Full textLi, Yantong. "A Comparison on the Voltage Output of Al-Cu Primary Battery with its Electrolyte being Coca Cola With and Without Sugar." Insight - Material Science 3, no. 4 (2021): 67. http://dx.doi.org/10.18282/ims.v3i4.376.
Full textLiu, Zeyu, Tiecheng Xia, and Jinbo Wang. "Image Encryption Technology Based on Fractional Two-Dimensional Triangle Function Combination Discrete Chaotic Map Coupled with Menezes-Vanstone Elliptic Curve Cryptosystem." Discrete Dynamics in Nature and Society 2018 (2018): 1–24. http://dx.doi.org/10.1155/2018/4585083.
Full textGibson, Terrill L. "Secrets and Soul: A Jungian Fable about Pastoral Care." Journal of Pastoral Care 42, no. 1 (1988): 3–12. http://dx.doi.org/10.1177/002234098804200102.
Full textGalis, Meiran, Tomislav Unkašević, Zoran Banjac, and Milan Milosavljević. "Protocols for symmetric secret key establishment: Modern approach." Vojnotehnicki glasnik 70, no. 3 (2022): 604–35. http://dx.doi.org/10.5937/vojtehg70-36607.
Full textAbbe, Emmanuel, and Sophie Spirkl. "Entropic Matroids and Their Representation." Entropy 21, no. 10 (2019): 948. http://dx.doi.org/10.3390/e21100948.
Full textMorrison, Jago, and Alan Burton. "Secrets, leaks and the novel. Writers, British intelligence and the public sphere after World War Two." Arbeiten aus Anglistik und Amerikanistik 48, no. 1 (2023): 71–95. http://dx.doi.org/10.24053/aaa-2023-0004.
Full textHorianskyi, Stanislav. "The Birth of Mannerism: Jacopo Tintoretto’s Secret Dinners." Ethnic History of European Nations, no. 71 (2023): 24–28. http://dx.doi.org/10.17721/2518-1270.2023.71.03.
Full textThabit, Reema, Nur Izura Udzir, Sharifah Md Yasin, Aziah Asmawi, Nuur Alifah Roslan, and Roshidi Din. "A Comparative Analysis of Arabic Text Steganography." Applied Sciences 11, no. 15 (2021): 6851. http://dx.doi.org/10.3390/app11156851.
Full textAloufi, Asma, Peizhao Hu, Yongsoo Song, and Kristin Lauter. "Computing Blindfolded on Data Homomorphically Encrypted under Multiple Keys: A Survey." ACM Computing Surveys 54, no. 9 (2022): 1–37. http://dx.doi.org/10.1145/3477139.
Full textРомашев, Юрий, and YUriy Romashyev. "Limitations of Fundamental Human Rights and Freedoms in International Law and Novations in the Russian Criminal Legislation." Journal of Russian Law 1, no. 11 (2013): 75–84. http://dx.doi.org/10.12737/1209.
Full textTursun, Kh, and А. Kabyl. "Archival Data of the Activity of Sericul Aldabergenov, which Began from the Alash Idea and Ended with Migration." Iasaýı ýnıversıtetіnіń habarshysy 126, no. 4 (2022): 389–402. http://dx.doi.org/10.47526/2022-4/2664-0686.33.
Full textHallsby, Atilla. "Recanonizing Rhetoric: The Secret in and of Discourse." Journal for the History of Rhetoric 25, no. 3 (2022): 346–70. http://dx.doi.org/10.5325/jhistrhetoric.25.3.0346.
Full textBenjelloun, M’hammed. "The Slumber and Wake of Dada in Mahi Binebine’s The Slumber of the Slave." International Journal of English Literature and Social Sciences 7, no. 4 (2022): 040–47. http://dx.doi.org/10.22161/ijels.74.7.
Full textZhyhylii, S. P. "Normative legal support of trade secrets and the place of labor legislation in it." Uzhhorod National University Herald. Series: Law 1, no. 78 (2023): 309–14. http://dx.doi.org/10.24144/2307-3322.2023.78.1.50.
Full textAqdas, Shayan. "Unraveling Madness: Linguistic Complexities in ‘Waiting for the Barbarian’ and ‘The Secret History’." International Journal of English Literature and Social Sciences 8, no. 5 (2023): 177–84. http://dx.doi.org/10.22161/ijels.85.28.
Full textXing, Fengyue, Xuehu Yan, Long Yu, and Longlong Li. "A Novel General (n, n)-Threshold Multiple Secret Images Sharing Scheme Based on Information Hiding in the Sharing Domain." Entropy 24, no. 3 (2022): 318. http://dx.doi.org/10.3390/e24030318.
Full textEgorova, K. B. "Riots in Svisloch Gymnasium: Persecution of Secret Societies among Polish-Lithuanian Youth." Nauchnyi dialog 12, no. 3 (2023): 382–97. http://dx.doi.org/10.24224/2227-1295-2023-12-3-382-397.
Full textRoy, George J., Jennifer A. Eli, Hendrix Leslie, and LuAnn Graul. "Using History to Model with Mathematics: The German Tank Problem." Mathematics Teaching in the Middle School 23, no. 7 (2018): 370–77. http://dx.doi.org/10.5951/mathteacmiddscho.23.7.0370.
Full textYounus, Zeyad Safaa, and Ghada Thanoon Younus. "Video Steganography Using Knight Tour Algorithm and LSB Method for Encrypted Data." Journal of Intelligent Systems 29, no. 1 (2019): 1216–25. http://dx.doi.org/10.1515/jisys-2018-0225.
Full textAttisani, Antonio. "Acta Gnosis." TDR/The Drama Review 52, no. 2 (2008): 75–106. http://dx.doi.org/10.1162/dram.2008.52.2.75.
Full textIslam, Ahmad Fikrul, and Zaenal Arifin. "Tinjauan Sosiologi Hukum terhadap Penyelesaian Talak di Bawah Tangan." Hukum dan Demokrasi (HD) 24, no. 4 (2024): 231–46. http://dx.doi.org/10.61234/hd.v24i4.45.
Full textMcEldowney, John F. "Legal aspects of the Irish secret service fund, 1793–1833." Irish Historical Studies 25, no. 98 (1986): 129–37. http://dx.doi.org/10.1017/s0021121400026444.
Full textANDROSHCHUK, H., and Ya KOPIL. "Institute of secret inventions in ensuring national security of the state: problem issues." INFORMATION AND LAW, no. 2(45) (May 30, 2023): 172–85. http://dx.doi.org/10.37750/2616-6798.2023.2(45).282338.
Full textDănilă, Adriana. "Das Frauenbild im Sozialismus. Eine exemplarische Untersuchung der Tageszeitung der rumäniendeutschen Minderheit Neuer Weg (1950)." Germanistische Beiträge 50, no. 1 (2024): 304–20. http://dx.doi.org/10.2478/gb-2024-0017.
Full textZarubina, K. A. "POLICE SURVEILLANCE OR METHODS OF WORKING WITH «POLITICALLY UNRELIABLE PERSONS» IN THE SECOND HALF OF THE XIX- EARLY XX CENTURIES (ON THE EXAMPLE OF KURSK PROVINCE)." Vestnik Bryanskogo gosudarstvennogo universiteta 06, no. 02 (2022): 57–62. http://dx.doi.org/10.22281/2413-9912-2022-06-02-57-62.
Full textBeglov, Alexey. "Special Services and Religious Organizations in the Soviet State: Collaboration Mechanisms, Survival Strategies, Sources." ISTORIYA 13, no. 6 (116) (2022): 0. http://dx.doi.org/10.18254/s207987840021686-3.
Full textKent, Candice. "‘The secret self’: time, memory and childhood in two short stories by Katherine Mansfield." Acta Academica: Critical views on society, culture and politics 39, no. 3 (2007): 1–20. https://doi.org/10.38140/aa.v39i3.1148.
Full textVirtue, Patrick. "GANs Unplugged." Proceedings of the AAAI Conference on Artificial Intelligence 35, no. 17 (2021): 15664–68. http://dx.doi.org/10.1609/aaai.v35i17.17845.
Full text