| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA990003255190403321 |
|
|
Autore |
Dainelli, Giotto <1878-1968> |
|
|
Titolo |
La CONQUISTA DELLA TERRA |
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Torino : Unione Tipografico Editrice, 1950 |
|
|
|
|
|
|
|
Descrizione fisica |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Locazione |
|
|
|
|
|
|
Collocazione |
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
2. |
Record Nr. |
UNINA9910162845603321 |
|
|
Autore |
Reeves Joshua |
|
|
Titolo |
Citizen Spies : The Long Rise of America's Surveillance Society / / Joshua Reeves |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
New York, NY : , : New York University Press, , [2017] |
|
©2017 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (viii, 229 pages) : illustrations |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Privacy |
Crime prevention - United States - Citizen participation |
Public safety - United States |
Electronic books. |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Front matter -- Contents -- Acknowledgments -- Introduction -- 1. |
|
|
|
|
|
|
|
|
|
|
|
The Power of the Crowd -- 2. Citizen Equipment -- 3. Neighborhood Watching -- 4. Recognize, Resist, Report -- 5. Terror Citizenship -- Conclusion -- Notes -- References -- Index -- About the Author |
|
|
|
|
|
|
Sommario/riassunto |
|
The history of recruiting citizens to spy on each other in the United States. Ever since the revelations of whistleblower Edward Snowden, we think about surveillance as the data-tracking digital technologies used by the likes of Google, the National Security Administration, and the military. But in reality, the state and allied institutions have a much longer history of using everyday citizens to spy and inform on their peers. Citizen Spies shows how “If You See Something, Say Something” is more than just a new homeland security program; it has been an essential civic responsibility throughout the history of the United States. From the town crier of Colonial America to the recruitment of youth through “junior police,” to the rise of Neighborhood Watch, AMBER Alerts, and Emergency 9-1-1, Joshua Reeves explores how ordinary citizens have been taught to carry out surveillance on their peers. Emphasizing the role humans play as “seeing” and “saying” subjects, he demonstrates how American society has continuously fostered cultures of vigilance, suspicion, meddling, snooping, and snitching. Tracing the evolution of police crowd-sourcing from “Hue and Cry” posters and America’s Most Wanted to police-affiliated social media, as well as the U.S.’s recurrent anxieties about political dissidents and ethnic minorities from the Red Scare to the War on Terror, Reeves teases outhow vigilance toward neighbors has long been aligned with American ideals of patriotic and moral duty. Taking the long view of the history of the citizen spy, this book offers a much-needed perspective for those interested in how we arrived at our current moment in surveillance culture and contextualizes contemporary trends in policing.The history of recruiting citizens to spy on each other in the United States. Ever since the revelations of whistleblower Edward Snowden, we think about surveillance as the data-tracking digital technologies used by the likes of Google, the National Security Administration, and the military. But in reality, the state and allied institutions have a much longer history of using everyday citizens to spy and inform on their peers. Citizen Spies shows how “If You See Something, Say Something” is more than just a new homeland security program; it has been an essential civic responsibility throughout the history of the United States. From the town crier of Colonial America to the recruitment of youth through “junior police,” to the rise of Neighborhood Watch, AMBER Alerts, and Emergency 9-1-1, Joshua Reeves explores how ordinary citizens have been taught to carry out surveillance on their peers. Emphasizing the role humans play as “seeing” and “saying” subjects, he demonstrates how American society has continuously fostered cultures of vigilance, suspicion, meddling, snooping, and snitching. Tracing the evolution of police crowd-sourcing from “Hue and Cry” posters and America’s Most Wanted to police-affiliated social media, as well as the U.S.’s recurrent anxieties about political dissidents and ethnic minorities from the Red Scare to the War on Terror, Reeves teases outhow vigilance toward neighbors has long been aligned with American ideals of patriotic and moral duty. Taking the long view of the history of the citizen spy, this book offers a much-needed perspective for those interested in how we arrived at our current moment in surveillance culture and contextualizes contemporary trends in policing. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
3. |
Record Nr. |
UNINA9910508435903321 |
|
|
Titolo |
Theory of Cryptography : 19th International Conference, TCC 2021, Raleigh, NC, USA, November 8–11, 2021, Proceedings, Part I / / edited by Kobbi Nissim, Brent Waters |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2021.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (799 pages) |
|
|
|
|
|
|
Collana |
|
Security and Cryptology, , 2946-1863 ; ; 13042 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Cryptography |
Data encryption (Computer science) |
Coding theory |
Information theory |
Computer engineering |
Computer networks |
Data protection |
Cryptology |
Coding and Information Theory |
Computer Engineering and Networks |
Computer Communication Networks |
Data and Information Security |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Secure Quantum Computation with Classical Communication -- Secure Software Leasing from Standard Assumptions -- Post-quantum Resettably-Sound Zero Knowledge -- Secure Software Leasing Without Assumptions -- The Round Complexity of Quantum Zero-Knowledge -- Rate-1 Quantum Fully Homomorphic Encryption -- Unifying Presampling via Concentration Bounds -- Quantum Key-length Extension -- Relationships between quantum IND-CPA notions -- Classical Binding for Quantum Commitments -- Unclonable Encryption, Revisited -- Somewhere Statistical Soundness, Post-Quantum Security, |
|
|
|
|
|
|
|
|
|
|
|
and SNARGs -- Black-Box Impossibilities of Obtaining 2-Round Weak ZK and Strong WI from Polynomial Hardness -- Tight Security Bounds for Micali's SNARGs -- Acyclicity Programming for Sigma-Protocols.-Statistical ZAPs from Group-Based Assumptions -- Generalized Proofs of Knowledge with Fully Dynamic Setup -- Fully-succinct Publicly Verifiable Delegation from Constant-Size Assumptions -- On expected polynomial runtime in cryptography.-Information-Theoretically Secure MPC against Mixed Dynamic Adversaries -- Round-Efficient Byzantine Agreement and Multi-Party Computation with Asynchronous Fallback -- Two-Round Maliciously Secure Computation with Super-Polynomial Simulation -- Adaptive Security of Multi-Party Protocols, Revisited.-On Actively-Secure Elementary MPC Reductions -- Environmentally Friendly Composable Multi-Party Computation in the Plain Model from Standard (Timed) Assumptions.-. |
|
|
|
|
|
|
Sommario/riassunto |
|
The three-volume set LNCS 13042, LNCS 13043 and LNCS 13044 constitutes the refereed proceedings of the 19th International Conference on Theory of Cryptography, TCC 2021, held in Raleigh, NC, USA, in November 2021. The total of 66 full papers presented in this three-volume set was carefully reviewed and selected from 161 submissions. They cover topics on proof systems, attribute-based and functional encryption, obfuscation, key management and secure communication. |
|
|
|
|
|
|
|
| |