نتایج جستجو برای: compromising international security
تعداد نتایج: 487404 فیلتر نتایج به سال:
Relationship between the UN Security Council, the institution of international criminal justice demonstrates a deep relationship between peace and justice. Therefore by ratification of statute of international criminal court, in different cases we can see the roles of UN Security Council in prosecute, trail and punishment those who commit the crimes within the jurisdiction of international cr...
the convention on the prevention and punishment of the crime of genocide was adopted by the un general assembly in december 1948. in former yugoslavia and rwanda occurred many heinous crimes and majority ruling powers tried to destroy molem and totsi minority groups. the un security council established the international criminal tribunal for the former yugoslavia (icty) and rwanda (ictr). the u...
the chechen republic (commonly referred to as chechnya) is a part of vast territory of russian federation that has been a source of contention since collapse of the soviet :union:. identity elements and tattered cultural bonds have strained ties between two nations of chechnya and russia. various aspects of crisis in chechnya have been addressed by many theoretical approaches of international r...
SECURITY IMPLICATIONS OF CONVERGED NETWORKS AND PROTECTING THEM, WITHOUT COMPROMISING EFFICIENCY By
One of humanity's major challenges of the 21st century will be meeting future food demands on an increasingly resource constrained-planet. Global food production will have to rise by 70 percent between 2000 and 2050 to meet effective demand which poses major challenges to food production systems. Doing so without compromising environmental integrity is an even greater challenge. This study look...
(1) IIASA, Laxenburg, Austria, (2) INRA, Paris, France, (3) CGIAR Research Program on Climate Change, Agriculture and Food Security, (4) Gund Institute, University of Vermont, Burlington, USA, (5) University of Lviv, Lviv, Ukraine, (6) CSIRO, Commonwealth Scientific and Industrial Research Organization, St Lucia, Australia, (7) Institute of Biological and Environmental Sciences, University of A...
We present a framework for modeling adversaries in security protocol analysis, ranging from a Dolev-Yao style adversary to more powerful adversaries who can reveal different parts of principals’ states during protocol execution. Our adversary models unify and generalize many existing security notions from both the computational and symbolic settings. We extend an existing symbolic protocol-veri...
The security problem of screen image leakage on a display unit through electromagnetic radiation from several meters away has attracted wide interest by security researchers since van Eck wrote about this problem. To solve the problem, techniques for reducing the S/N ratio of emanating information by signal reduction and noise generation have been proposed as countermeasures. Different from the...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید