Results for ' cryptographic security'

987 found
Order:
  1.  20
    Formal Verification of Security Proofs of Cryptographic Schemes Using Probabilistic Hoare Logic.Takahiro Kubota - 2012 - Kagaku Tetsugaku 45 (2):15-27.
  2. Cryptographic hash functions based on ALife.Mark A. Bedau, Richard Crandall & Michael J. Raven - 2009 - Psipress.
    There is a long history of cryptographic hash functions, i.e. functions mapping variable-length strings to fixed-length strings, and such functions are also expected to enjoy certain security properties. Hash functions can be effected via modular arithmetic, permutation-based schemes, chaotic mixing, and so on. Herein we introduce the notion of an artificial-life (ALife) hash function (ALHF), whereby the requisite mixing action of a good hash function is accomplished via ALife rules that give rise to complex evolution of a given (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  3.  14
    Lightweight Cryptographic Algorithms for Guessing Attack Protection in Complex Internet of Things Applications.Mohammad Kamrul Hasan, Muhammad Shafiq, Shayla Islam, Bishwajeet Pandey, Yousef A. Baker El-Ebiary, Nazmus Shaker Nafi, R. Ciro Rodriguez & Doris Esenarro Vargas - 2021 - Complexity 2021:1-13.
    As the world keeps advancing, the need for automated interconnected devices has started to gain significance; to cater to the condition, a new concept Internet of Things has been introduced that revolves around smart devicesʼ conception. These smart devices using IoT can communicate with each other through a network to attain particular objectives, i.e., automation and intelligent decision making. IoT has enabled the users to divide their household burden with machines as these complex machines look after the environment variables and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  4.  28
    Cyber Security and Key Management Issues for Internet of Things: Techniques, Requirements, and Challenges.Mohammad Faisal, Ikram Ali, Muhammad Sajjad Khan, Junsu Kim & Su Min Kim - 2020 - Complexity 2020:1-9.
    Internet of Things-based environments pose various challenges due to their anytime/anywhere computing, and the efficient cryptographic based key management is one of the major challenges in Internet of Things. The key management life cycle consists of initialization, key generation, key registration, key backup, key update, key recovery, and key revocation. Our contribution in this paper is to summarize the state-of-the-art key management schemes and techniques in different scenarios, such as mobile ad hoc networks, wireless sensor networks, and the Internet (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  5.  30
    Secure UAV-Based System to Detect Small Boats Using Neural Networks.Moisés Lodeiro-Santiago, Pino Caballero-Gil, Ricardo Aguasca-Colomo & Cándido Caballero-Gil - 2019 - Complexity 2019:1-11.
    This work presents a system to detect small boats to help tackle the problem of this type of perilous immigration. The proposal makes extensive use of emerging technologies like Unmanned Aerial Vehicles combined with a top-performing algorithm from the field of artificial intelligence known as Deep Learning through Convolutional Neural Networks. The use of this algorithm improves current detection systems based on image processing through the application of filters thanks to the fact that the network learns to distinguish the aforementioned (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  6.  63
    Automatic verification of temporal-epistemic properties of cryptographic protocols.Ioana Boureanu, Mika Cohen & Alessio Lomuscio - 2009 - Journal of Applied Non-Classical Logics 19 (4):463-487.
    We present a technique for automatically verifying cryptographic protocols specified in the mainstream specification language CAPSL. We define a translation from CAPSL models into interpreted systems, a popular semantics for temporal-epistemic logic, and rewrite CAPSL goals as temporal-epistemic specifications. We present a compiler that implements this translation. The compiler links to the symbolic model checker MCMAS. We evaluate the technique on protocols in the Clark-Jacobs library and in the SPORE repository against custom secrecy and authentication requirements.
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  7.  18
    Security in advanced metering infrastructures: Lightweight cryptography.Luis Hernández-Álvarez, Juan José Bullón Pérez & Araceli Queiruga-Dios - forthcoming - Logic Journal of the IGPL.
    Smart grids are designed to revolutionize the energy sector by creating a smarter, more efficient and reliable power supply network. The rise of smart grids is a response to the need for a more comprehensive and sophisticated energy system that caters to the needs of homes and businesses. Key features of smart grids include the integration of renewable energy sources, decentralized generation and advanced distribution networks. At the heart of smart grids is a sophisticated metering system, consisting of intelligent electronic (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  8.  19
    An Efficient Conformable Fractional Chaotic Map-Based Online/Offline IBSS Scheme for Provable Security in ROM.Chandrashekhar Meshram, Rabha W. Ibrahim & Rafida M. Elobaid - 2022 - Complexity 2022:1-11.
    Chaos distributes with a covert method to condense the dynamic of complexity and satisfies the security requirements of a cryptographic system. This study gives an ability online/offline ID-based short signature scheme using conformable fractional chaotic maps. Furthermore, we establish its security under IBSS existential unforgeability of identity-based short signature under chosen message attack in the random oracle model. Some of the stimulating preparations of obtainable processes are that they give a multiperiod application of the offline storage, which (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  9. Randomization and Fair Judgment in Law and Science.Julio Michael Stern - 2020 - In Jose Acacio de Barros & Decio Krause, A True Polymath: A Tribute to Francisco Antonio Doria. College Publications. pp. 399-418.
    Randomization procedures are used in legal and statistical applications, aiming to shield important decisions from spurious influences. This article gives an intuitive introduction to randomization and examines some intended consequences of its use related to truthful statistical inference and fair legal judgment. This article also presents an open-code Java implementation for a cryptographically secure, statistically reliable, transparent, traceable, and fully auditable randomization tool.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  10. Meaningful electronic signatures based on an automatic indexing method.Maxime Wack, Ahmed Nait-Sidi-Moh, Sid Lamrous & Nathanael Cottin - 2006 - Artificial Intelligence and Law 14 (3):161-175.
    Legal information certification and secured storage combined with documents electronic signature are of great interest when digital documents security and conservation are in concern. Therefore, these new and evolving technologies offer powerful abilities, such as identification, authentication and certification. The latter contribute to increase the global security of legal digital archives conservation and access. However, currently used cryptographic and hash coding concepts cannot intrinsically enclose cognitive information about both the signer and the signed content. Indeed, an evolution (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark  
  11.  24
    An optimization of color halftone visual cryptography scheme based on Bat algorithm.Salama A. Mostafa, Ihsan Salman & Firas Mohammed Aswad - 2021 - Journal of Intelligent Systems 30 (1):816-835.
    Visual cryptography is a cryptographic technique that allows visual information to be encrypted so that the human optical system can perform the decryption without any cryptographic computation. The halftone visual cryptography scheme (HVCS) is a type of visual cryptography (VC) that encodes the secret image into halftone images to produce secure and meaningful shares. However, the HVC scheme has many unsolved problems, such as pixel expansion, low contrast, cross-interference problem, and difficulty in managing share images. This article aims (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  12.  57
    Quantum Cryptography.Serge Fehr - 2010 - Foundations of Physics 40 (5):494-531.
    Quantum cryptography makes use of the quantum-mechanical behavior of nature for the design and analysis of cryptographic schemes. Optimally (but not always), quantum cryptography allows for the design of cryptographic schemes whose security is guaranteed solely by the laws of nature. This is in sharp contrast to standard cryptographic schemes, which can be broken in principle, i.e., when given sufficient computing power. From a theory point of view, quantum cryptography offers a beautiful interplay between the mathematics (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  13.  28
    Using the Spanish national identity card in social networks.V. Gayoso MartÍnez, L. HernÁndez Encinas, A. MartÍn MuÑoz & R. DurÁn DÍaz - 2020 - Logic Journal of the IGPL 28 (4):519-530.
    The distinctive security features of the Spanish electronic national identity card, known as Documento Nacional de Identidad electrónico, allow us to propose the usage of this cryptographic smart card in an authentication framework that can be used during the registration and login phases of internet services where the validation of the user’s age and real identity are key elements, as it is the case for example of the so-called social networks. Using this mechanism with NFC-capable devices, the identity (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  14.  22
    Clouded data: Privacy and the promise of encryption.Liam Magee, Tsvetelina Hristova & Luke Munn - 2019 - Big Data and Society 6 (1).
    Personal data is highly vulnerable to security exploits, spurring moves to lock it down through encryption, to cryptographically ‘cloud’ it. But personal data is also highly valuable to corporations and states, triggering moves to unlock its insights by relocating it in the cloud. We characterise this twinned condition as ‘clouded data’. Clouded data constructs a political and technological notion of privacy that operates through the intersection of corporate power, computational resources and the ability to obfuscate, gain insights from and (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  15.  22
    Improved 2D Discrete Hyperchaos Mapping with Complex Behaviour and Algebraic Structure for Strong S-Boxes Generation.Musheer Ahmad & Eesa Al-Solami - 2020 - Complexity 2020:1-16.
    This paper proposes to present a novel method of generating cryptographic dynamic substitution-boxes, which makes use of the combined effect of discrete hyperchaos mapping and algebraic group theory. Firstly, an improved 2D hyperchaotic map is proposed, which consists of better dynamical behaviour in terms of large Lyapunov exponents, excellent bifurcation, phase attractor, high entropy, and unpredictability. Secondly, a hyperchaotic key-dependent substitution-box generation process is designed, which is based on the bijectivity-preserving effect of multiplication with permutation matrix to obtain satisfactory (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  16. Auditable Blockchain Randomization Tool.Julio Michael Stern & Olivia Saa - 2019 - Proceedings 33 (17):1-6.
    Randomization is an integral part of well-designed statistical trials, and is also a required procedure in legal systems. Implementation of honest, unbiased, understandable, secure, traceable, auditable and collusion resistant randomization procedures is a mater of great legal, social and political importance. Given the juridical and social importance of randomization, it is important to develop procedures in full compliance with the following desiderata: (a) Statistical soundness and computational efficiency; (b) Procedural, cryptographical and computational security; (c) Complete auditability and traceability; (d) (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  17.  28
    Continuous Variable Controlled Quantum Conference.Anirban Pathak & Ashwin Saxena - 2022 - Foundations of Physics 53 (1):1-23.
    Using different quantum states (e.g., two mode squeezed-state, multipartite GHZ-like-states) as quantum resources, two protocols for "continuous variable (CV) controlled quantum conference" are proposed. These CV protocols for controlled quantum conferences (CQCs) are the first of their kind and can be reduced to CV protocols for various other cryptographic tasks. In the proposed protocols, Charlie is considered the controller, having the power to terminate the protocol at any time and to control the flow of information among the other users (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  18.  18
    A New Multistage Encryption Scheme Using Linear Feedback Register and Chaos-Based Quantum Map.Adel R. Alharbi, Jawad Ahmad, Undefined Arshad, Sajjad Shaukat Jamal, Fawad Masood, Yazeed Yasin Ghadi, Nikolaos Pitropakis & William J. Buchanan - 2022 - Complexity 2022:1-15.
    With the increasing volume of data transmission through insecure communication channels, big data security has become one of the important concerns in the cybersecurity domain. To address these concerns and keep data safe, a robust privacy-preserving cryptosystem is necessary. Such a solution relies on chaos encryption algorithms over standard cryptographic methods that possess multistage encryption levels, including high speed, high security, low compute overheads, and procedural power, among other characteristics. In this work, a secure image encryption scheme (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  19.  20
    modification proposal for the reconciliation mechanism of the key exchange algorithm NewHope.V. Gayoso Martínez, L. Hernández Encinas & A. Martín Muñoz - 2022 - Logic Journal of the IGPL 30 (6):1028-1040.
    The latest advances in quantum computing forced the National Institute of Standards and Technology (NIST) to launch an initiative for selecting quantum-resistant cryptographic algorithms. One of the best-known proposals is NewHope, an algorithm that was initially designed as a key exchange algorithm. In its original design, NewHope presented a reconciliation mechanism that is complex and represents an entry barrier for potential implementers. This contribution presents equivalent schemes in one, two and three dimensions, which allow anyone to make the transition (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  20.  28
    Quantum Bit Commitment and the Reality of the Quantum State.R. Srikanth - 2018 - Foundations of Physics 48 (1):92-109.
    Quantum bit commitment is insecure in the standard non-relativistic quantum cryptographic framework, essentially because Alice can exploit quantum steering to defer making her commitment. Two assumptions in this framework are that: Alice knows the ensembles of evidence E corresponding to either commitment; and system E is quantum rather than classical. Here, we show how relaxing assumption or can render her malicious steering operation indeterminable or inexistent, respectively. Finally, we present a secure protocol that relaxes both assumptions in a quantum (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  21.  15
    A Color Image Encryption Scheme Based on a Novel 3D Chaotic Mapping.Chunyuan Liu & Qun Ding - 2020 - Complexity 2020:1-20.
    Low-dimensional chaotic mappings are simple functions that have low computation cost and are easy to realize, but applying them in a cryptographic algorithm will lead to security vulnerabilities. To overcome this shortcoming, this paper proposes the coupled chaotic system, which coupled the piecewise and Henon mapping. Simulation results indicate that the novel mapping has better complexity and initial sensitivity and larger key space compared with the original mapping. Then, a new color image encryption algorithm is proposed based on (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  22.  15
    (1 other version)Contourner les systèmes de traçabilité.Jean-Marc Manach - 2009 - Hermès: La Revue Cognition, communication, politique 53 (1):167.
    Brian Gladman est un ancien directeur des communications électroniques stratégiques du ministère de la Défense britannique et de l'Otan; Ian Brown, est un cryptographe anglais, membre de l'ONG Privacy International. En l'an 2000, ils rendaient public un texte expliquant comment contourner, en toute légalité, les diverses mesures de « cybersurveillance » adoptées par les législateurs. Ces techniques s'avéreraient en effet « techniquement ineptes et inefficaces à l'encontre des criminels » et risqueraient, a contrario, de « saper le droit à la (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  23.  35
    Hybrid Real-Time Protection System for Online Social Networks.Muneer Bani Yassein, Shadi Aljawarneh & Yarub Wahsheh - 2020 - Foundations of Science 25 (4):1095-1124.
    The impact of Online Social Networks on human lives is foreseen to be very large with unprecedented amount of data and users. OSN users share their ideas, photos, daily life events, feelings and news. Since OSNs’ security and privacy challenges are more potential than ever before, it is necessary to enhance the protection and filtering approaches of OSNs contents. This paper explores OSNs’ threats and challenges, and categorize them into: account-based, URL-based and content-based threats. In addition, we analyze the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  24.  17
    Revocable Anonymisation in Video Surveillance: A ‘Digital Cloak of Invisibility’.Feiten Linus, Sebastian Sester, Christian Zimmermann, Sebastian Weydner-Volkmann, Laura Wehle & Bernd Becker - 2016 - In Feiten Linus, Sebastian Sester, Christian Zimmermann, Sebastian Weydner-Volkmann, Laura Wehle & Bernd Becker, Technology and Intimacy: Choice or Coercion. HCC 2016. IFIP Advances in Information and Communication Technology, vol 474. Cham.: pp. 314-327.
    Video surveillance is an omnipresent phenomenon in today’s metropolitan life. Mainly intended to solve crimes, to prevent them by realtime-monitoring or simply as a deterrent, video surveillance has also become interesting in economical contexts; e.g. to create customer profiles and analyse patterns of their shopping behaviour. The extensive use of video surveillance is challenged by legal claims and societal norms like not putting everybody under generalised suspicion or not recording people without their consent. In this work we propose a technological (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  25.  43
    Reflections on espionage.Harvey Klehr - 2004 - Social Philosophy and Policy 21 (1):141-166.
    In 1995 the United States National Security Agency , the Central Intelligence Agency , and the Federal Bureau of Investigation made public the story of a forty-year American intelligence operation code-named Venona. Shortly after the Nazi-Soviet Pact in 1939, American military intelligence had ordered companies that were sending and receiving coded cables overseas, such as Western Union, to turn over copies to the U.S. government. Hundreds of thousands of cables were sent or received by Soviet government bodies. Beginning in (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  26. Illan Rua Wall.Turbulent Legality : Sovereignty, Security & The Police - 2018 - In Andreas Philippopoulos-Mihalopoulos, Routledge Handbook of Law and Theory. New York, NY: Routledge.
     
    Export citation  
     
    Bookmark  
  27. The Very Idea of Theory in Business History.Alan Roberts & Isma Centre for Education and Research in Securities Markets - 1998 - University of Reading, Department of Economics, and Isma Centre for Education and Research in Securities Markets.
     
    Export citation  
     
    Bookmark  
  28.  61
    Precommitment Regimes for Intervention: Supplementing the Security Council.Allen Buchanan & Robert O. Keohane - 2011 - Ethics and International Affairs 25 (1):41-63.
    As global governance institutions proliferate and become more powerful, their legitimacy is subject to ever sharper scrutiny. Yet what legitimacy means in this context and how it is to be ascertained are often unclear. In a previous paper in this journal, we offered a general account of the legitimacy of such institutions and a set of standards for determining when they are legitimate. In this paper we focus on the legitimacy of the UN Security Council as an institution for (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  29.  2
    Clothing the Naked Soldier: Virtuous Conduct on the Augmented Reality Battlefield.Strategy Anna Feuer School of Global Policy, Usaanna Feuer is an Assistant Teaching Professor at the School of Global Policy Ca, Focusing on Insurgency San Diegoher Research is in International Security, Defense Technology Counterinsurgency, the Environment War & at the School of Oriental Politics at Oxford - 2024 - Journal of Military Ethics 23 (3-4):264-276.
    Volume 23, Issue 3-4, November - December 2024, Page 264-276.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  30. Towards Responsible Research and Innovation in the Information and Communication Technologies and Security Technologies Fields.Rene Von Schomberg (ed.) - 2011 - Publications Office of the European Union.
  31.  31
    Tracking and Targeting: Sociotechnologies of (In)security.Jutta Weber, Karolina Follis & Lucy Suchman - 2017 - Science, Technology, and Human Values 42 (6):983-1002.
    This introduction to the special issue of the same title sets out the context for a critical examination of contemporary developments in sociotechnical systems deployed in the name of security. Our focus is on technologies of tracking, with their claims to enable the identification of those who comprise legitimate targets for the use of violent force. Taking these claims as deeply problematic, we join a growing body of scholarship on the technopolitical logics that underpin an increasingly violent landscape of (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   7 citations  
  32. Matters of Trust as Matters of Attachment Security.Andrew Kirton - 2020 - International Journal of Philosophical Studies 28 (5):583-602.
    I argue for an account of the vulnerability of trust, as a product of our need for secure social attachments to individuals and to a group. This account seeks to explain why it is true that, when we trust or distrust someone, we are susceptible to being betrayed by them, rather than merely disappointed or frustrated in our goals. What we are concerned about in matters of trust is, at the basic level, whether we matter, in a non-instrumental way, to (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  33.  74
    The regulatory intersections between artificial intelligence, data protection and cyber security: challenges and opportunities for the EU legal framework.Jozef Andraško, Matúš Mesarčík & Ondrej Hamuľák - forthcoming - AI and Society:1-14.
    The presented paper focuses on the analysis of strategic documents at the level of the European Union concerning the regulation of artificial intelligence as one of the so-called disruptive technologies. In the first part of the article, we outline the basic terminology. Subsequently, we focus on the summarizing and systemizing of the key documents adopted at the EU level in terms of artificial intelligence regulation. The focus of the paper is devoted to issues of personal data protection and cyber (...) included in these strategic documents. The final part contains recommendations for future research and evaluation of its key features. (shrink)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  34.  14
    The tacit dimension of expertise: Professional vision at work in airport security.Chiara Bassetti - 2021 - Discourse Studies 23 (5):597-615.
    Whereas “professional vision” has been mostly analyzed in apprenticeship and other settings where knowledge is made explicit or reflected upon, I focus on how expertise tacitly plays out in task-oriented interaction among practitioners. The paper considers orientation both to the coworker’s and one’s own expertise in the collaborative accomplishment of airport security work. I show how screeners recruit action from colleagues in largely underspecified ways, based on shared access to the visibility field and expected professional vision. Requesting is tacitly (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  35. Neuroethics and national security.Turhan Canli, Susan Brandon, William Casebeer, Philip J. Crowley, Don DuRousseau, Henry T. Greely & Alvaro Pascual-Leone - 2007 - American Journal of Bioethics 7 (5):3 – 13.
    Science is driven by technical innovations, and perhaps nowhere as visibly as in neuroscience. In the past decade, advances in methods have led to an explosion of studies in cognitive (Gazzaniga et...
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   20 citations  
  36. Farmer Participatory Approach to Increase Fodder Security Through Agroforestry Systems.B. Rajasekaran, M. Warren & S. C. Babu - 1994 - Agriculture and Human Values 11 (1):1-9.
     
    Export citation  
     
    Bookmark  
  37.  19
    Health and the Governance of Security: A Tale of Two Systems.Sevgi Aral, Scott Burris & Clifford Shearing - 2002 - Journal of Law, Medicine and Ethics 30 (4):632-643.
    The provision of police services and the suppression of crime is one of the first functions of civil government. Article 3 of the Universal Declaration of Human Rights speaks of a right to “security of person.” “The term ‘police’ traditionally connoted social organization, civil authority, or formation of a political community—the control and regulation of affairs affecting the general order and welfare of society,” including the protection of public health. Civil dispute resolution is also an important part of a (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  38. A view into the fray : lived testimony of minorities in the UK peace, security and foreign policymaking fields.Aditi Gupta & Mélina Villeneuve - 2024 - In Hannah Partis-Jennings & Clara Eroukhmanoff, Feminist policymaking in turbulent times: critical perspectives. New York, NY: Routledge, Taylor & Francis Group.
  39. Legal Dimension of Deep Learning in Digital Healthcare for Privacy, Security, and Governance.Araka Okolieaboh, Rishabha Malviya & Bhupinder Singh - 2025 - In Bhupindara Siṅgha, Christian Kaunert, Balamurugan Balusamy & Rajesh Kumar Dhanaraj, Computational intelligence in healthcare law: AI for ethical governance and regulatory challenges. Boca Raton: Chapman & Hall, CRC Press.
     
    Export citation  
     
    Bookmark  
  40. JH Hulse, Science, agriculture, and food security.L. Busch - 1997 - Agriculture and Human Values 14:191-191.
     
    Export citation  
     
    Bookmark  
  41. Better Common Bean Production Would Boost Global Food Security.U. S. Embassy - 2012 - In Zdravko Radman, The Hand. MIT Press.
     
    Export citation  
     
    Bookmark  
  42.  1
    Two Children's Stories about Food Security.Michael Glassman & Shantanu Tilak (eds.) - 2023 - Columbus, Ohio: The Ohio State University.
    These texts were created as part of a federally funded project (R305A200364) funded by the Institute of Education Sciences (IES), targeted towards the use of low-tech immersive learning for social studies instruction in Ohio's fourth and fifth grade classrooms. Texts and materials created as part of the Digital Civic Learning curriculum are free for use for educational purposes.
    Direct download  
     
    Export citation  
     
    Bookmark  
  43. Bioethical approach to biotechnology: Bio security.S. Kaplan & N. Çobanoglu - forthcoming - Bioethics Congress.
     
    Export citation  
     
    Bookmark  
  44. Moral economy and knowledge production in a security bureaucracy: the case of the German officer for the protection of the constitution.Werner Schiffauer - 2020 - In Julia M. Eckert, The bureaucratic production of difference: ethos and ethics in migration administrations. Bielefeld: Transcript.
    No categories
     
    Export citation  
     
    Bookmark  
  45.  91
    Building General Knowledge of Mechanisms in Information Security.Jonathan M. Spring & Phyllis Illari - 2019 - Philosophy and Technology 32 (4):627-659.
    We show how more general knowledge can be built in information security, by the building of knowledge of mechanism clusters, some of which are multifield. By doing this, we address in a novel way the longstanding philosophical problem of how, if at all, we come to have knowledge that is in any way general, when we seem to be confined to particular experiences. We also address the issue of building knowledge of mechanisms by studying an area that is new (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  46.  11
    Between Economy and the State: Private Security and Rule Enforcement in Russia.Vadim Volkov - 2000 - Politics and Society 28 (4):483-501.
    This article explores how the segments of the state police and security organs were transformed into a large private security industry in Russia after 1992. As market reforms were launched, the numbers of private property owners grew dramatically, but the state institutions for the protection of property and dispute settlement were either absent or defunct. This gap was consequently filled with various private institutions, private protection companies and private security services being the major ones. The article studies (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  47. The Making of a Terrorist: A Need for Understanding from the Field Testimony before the House Appropriations Subcommittee on Homeland Security, Washington, DC, March 12, 2008.Scott Atran - unknown
    Soccer, paintball, camping, hiking, rafting, body building, martial arts training and other forms of physically stimulating and intimate group action create a bunch of buddies, which becomes a “band of brothers” in a simple heroic cause. It's usually enough that a few of these action buddies identify with a cause, and its heroic path to glory and esteem in the eyes of peers, for the rest to follow even unto death. Humans need to socially organize, to lead and be led; (...)
     
    Export citation  
     
    Bookmark  
  48. The Historical Development of the UN's Role in International Security.Michael Howard - 2007 - Nankai University (Philosophy and Social Sciences) 3:2-9.
    The United Nations is the world's most extensive international organization whose primary task is to create a new international security framework, the maintenance of international peace and security. United Nations not only to retain the World Health Organization, International Labour Organization, International Court of Justice and other international cooperation organizations, to promote throughout the world from Euro-centric changes to the global system, but also provides a world political center stage, but it has not succeeded in expectations of its (...)
    No categories
     
    Export citation  
     
    Bookmark  
  49.  30
    Rethinking the Just Intelligence Theory of National Security Intelligence Collection and Analysis: The Principles of Discrimination, Necessity, Proportionality and Reciprocity.Seumas Miller - 2021 - Social Epistemology 35 (3):211-231.
    In this article, it is argued that the constitutive principles of Just War Theory and the jus ad bellum/jus in bello duality do not transfer all that well to national security intelligence activity...
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  50.  19
    Theory and practice in Epicurean political philosophy: security, justice and tranquility.Javier Aoiz - 2023 - London: Bloomsbury Academic. Edited by Marcelo D. Boeri.
    The opponents of Epicureanism in antiquity, including Cicero, Plutarch and Lactantius, succeeded in establishing a famous cliché: the theoretical and practical disinterest of Epicurus and the Epicureans in political communities. However, this anti-Epicurean literature did not provide considerations of Epicurean political theory or the testimonies about Epicurean lifestyle. Therefore, the purpose of this book is to shed light on the contribution of Epicurean thought to political life in the ancient world. Incorporating the most up-to-date archaeological material, including papyri which have (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
1 — 50 / 987