نتایج جستجو برای: security arrangements
تعداد نتایج: 198305 فیلتر نتایج به سال:
abstract the third millennium has started, but the world is facing with serious challenges in achieving international security and peace. various human rights violations have lead the states to find means to protect human rights. also article 55 of the united nations charter introduces the respect to human rights and fundamental freedom as the most suitable ways to realize peace and security. ...
this research is about the political economy of china in central asia. in this research the political & economic interactions affected on chinas political economy in central asia are examined. chinas goal of presence in central asia including political-security, economic and energy goals is described in one part. in another part, the trade relations between china and central asian countries ar...
Complex IT outsourcing arrangements promise numerous benefits such as increased cost predictability and reduced costs, higher flexibility and scalability upon demand. Organizations trying to realize these benefits, however, face several security and compliance challenges. In this article, we investigate the pressure to take action with respect to such challenges and discuss avenues toward promi...
The number of disasters, both natural as well as man-made, has been increasing in frequency in the recent years. This leads to short as well as long-term effects on food security and shelter, requiring humanitarian assistance. This article aims to identify the principles and standards that are applicable to food and shelter related aid that needs to be provided by the co-operation of the local ...
The millennium promises a dramatic politicisation of the food question. In addition to the prominent issues of food security, hunger and nutrition, bioengineering, food safety and quality, there are related issues of environmental sustainability, power, sovereignty and rights. All these issues are deeply implicated in the current corporate form of globalisation, which is transforming historic g...
This article examines the changing transatlantic security architecture since the end of the Cold War. It argues that the absence of a unifying military threat and the subsequent broadening of the notion of security from states to societies has led to the increasing differentiation of security policy arrangements since the beginning of the 1990s. Not only have international institutions prolifer...
The security of a passive plug-and-play QKD arrangement in the case of finite (resources) key lengths is analysed. It is assumed that the eavesdropper has full access to the channel so an unknown and untrusted source is assumed. To take into account the security of the BB84 protocol under collective attacks within the framework of quantum adversaries, a full treatment provides the well-known eq...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید