Cyber-Leviathan

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Ethical Perspectives on the Postmodern Communications Leviathan

Advertising and other forms of promotional activity have proliferated to such an extent that they may constitute a form of social pollution (Kitchen, 1994). The quantity and tone of communications to which consumers are exposed may have a subtle but pervasive effect on the social ecology of the developed world. Not only are Marketing Communications delivered in unprecedented quantities (Kitchen...

متن کامل

Bias in the LEVIATHAN Stream Cipher

We show two methods of distinguishing the LEVIATHAN stream cipher from a random stream using 2 bytes of output and proportional effort; both arise from compression within the cipher. The first models the cipher as two random functions in sequence, and shows that the probability of a collision in 64-bit output blocks is doubled as a result; the second shows artifacts where the same inputs are pr...

متن کامل

Leviathan: SPL Support on Filesystem Level

A lot of configurable software, especially in the domain of embedded and operating systems, is configured with a source preprocessor, mostly to avoid run-time overhead. However, developers then have to face a myriad of preprocessor directives and the corresponding complexity in the source code, even when they might only be working on the implementation of a single feature at a time. Thus, it ha...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Schweizerisches Jahrbuch für Entwicklungspolitik

سال: 2003

ISSN: 1660-5926,1663-9677

DOI: 10.4000/sjep.573