Cyber-Leviathan
نویسندگان
چکیده
منابع مشابه
Ethical Perspectives on the Postmodern Communications Leviathan
Advertising and other forms of promotional activity have proliferated to such an extent that they may constitute a form of social pollution (Kitchen, 1994). The quantity and tone of communications to which consumers are exposed may have a subtle but pervasive effect on the social ecology of the developed world. Not only are Marketing Communications delivered in unprecedented quantities (Kitchen...
متن کاملBias in the LEVIATHAN Stream Cipher
We show two methods of distinguishing the LEVIATHAN stream cipher from a random stream using 2 bytes of output and proportional effort; both arise from compression within the cipher. The first models the cipher as two random functions in sequence, and shows that the probability of a collision in 64-bit output blocks is doubled as a result; the second shows artifacts where the same inputs are pr...
متن کاملLeviathan: SPL Support on Filesystem Level
A lot of configurable software, especially in the domain of embedded and operating systems, is configured with a source preprocessor, mostly to avoid run-time overhead. However, developers then have to face a myriad of preprocessor directives and the corresponding complexity in the source code, even when they might only be working on the implementation of a single feature at a time. Thus, it ha...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Schweizerisches Jahrbuch für Entwicklungspolitik
سال: 2003
ISSN: 1660-5926,1663-9677
DOI: 10.4000/sjep.573