China's oil diplomacy: is it a global security threat?
نویسندگان
چکیده
منابع مشابه
Technology Perspective: Is Green IT a Threat to IT Security?
Industries are pushed by the regulations to reduce the CO2 footprint of their production lines. According to the latest statistics 3% of the CO2 footprint is generated by the IT industry. Currently a high percentage of the information being accessed by the users is produced and managed centrally. With the growth of data generation by users, e.g. social networking and YouTube websites, the stori...
متن کاملDisease diplomacy: international norms and global health security.
disease diplomacy international norms and global health health security disease diplomacy: international norms and disease diplomacy project muse disease diplomacyinternational norms and global health the politics of global health security disease diplomacy international norms and global health disease diplomacy international norms and global health books in public health and health policy aust...
متن کاملJapan's strategy for global health diplomacy: why it matters.
Global health is standing at a crossroads. The past decade has been a glorious period for global health because aid to the health sector has surged, and newly formed public–private partnerships have increased the effectiveness of development assistance. Japan has played a significant part, for example by leading discussions at the G8 Kyushu-Okinawa Summit in 2000 and by helping in the establish...
متن کاملJames Bond and Global Health Diplomacy
In the 21st Century, distinctions and boundaries between global health, international politics, and the broader interests of the global community are harder to define and enforce than ever before. As a result, global health workers, leaders, and institutions face pressing questions around the nature and extent of their involvement with non-health endeavors, including international conflict reso...
متن کاملDifferential Power Analysis: A Serious Threat to FPGA Security
Differential Power Analysis (DPA) implies measuring the supply current of a cipher-circuit in an attempt to uncover part of a cipher key. Cryptographic security gets compromised if the current waveforms obtained correlate with those from a hypothetical power model of the circuit. As FPGAs are becoming integral parts of embedded systems and increasingly popular for cryptographic applications and...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Third World Quarterly
سال: 2007
ISSN: 0143-6597,1360-2241
DOI: 10.1080/01436590701192645