Has Patriarchy been Stealing the Feminists' Clothes? Conflict-related Sexual Violence and UN Security Council Resolutions
نویسندگان
چکیده
منابع مشابه
Wireless Network Security Still Has no Clothes
As the popularity of wireless networks increases, so does the need to protect them. Encryption algorithms play a main role in information security systems. On the other side, those algorithms consume a significant amount of computing resources such as CPU time, memory, and battery power. This paper illustrates the key concepts of security, wireless networks, and security over wireless networks....
متن کاملThe UN Security Council, Indifference, and Genocide in Rwanda
Habyarimana of Rwanda had mysteriously crashed as it approached the Kigali airport. My first response was to study the photograph of the dead president; after closely covering his comings and goings for the past several months, it struck me as odd that the first time that I would see his face was in a newspaper article announcing his death. Then I felt frustration bordering on exasperation. As ...
متن کاملReforming the Working Methods of the UN Security Council
Toachieveitsaims,ACTwillhavetoavoidbeingcaughtupinthestalleddebateover Councilmembershipreform.Thegroup,currentlydominatedbysmallstates,will alsoneednewpartnersfromdifferentgeographicalregions,andwithmorepolitical weight.Moreover,ifACTwantstoinvolvethepermanentmembersoftheSecurity Council,itmayhavetolimititsemphasisontheroleof...
متن کاملThe Emperor Has No Clothes
Like many in academia, Kocherlakota associates modern macroeconomics with a particular school of thought that takes something called the “Lucas critique” as its guiding principle. The Lucas critique refers to an argument put forth by the Nobel Prize-winning macroeconomist Robert Lucas about how the changing expectations of economic agents will confound forecasting and policy analysis based on m...
متن کاملThe Security of Ciphertext Stealing
We prove the security of CBC encryption with ciphertext stealing. Our results cover all versions of ciphertext stealing recently recommended by NIST. The complexity assumption is that the underlying blockcipher is a good PRP, and the security notion achieved is the strongest one commonly considered for chosen-plaintext attacks, indistinguishability from random bits (ind$-security). We go on to ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IDS Bulletin
سال: 2014
ISSN: 0265-5012
DOI: 10.1111/1759-5436.12071