1.

Record Nr.

UNISA996582050703316

Autore

Acksel Britta

Titolo

Städte auf dem Weg zur Nachhaltigkeit : Ethnographische Einblicke und Analysen / / Britta Acksel

Pubbl/distr/stampa

Bielefeld : , : transcript Verlag, , [2024]

©2024

ISBN

9783839469927

Descrizione fisica

1 online resource (302 p.)

Collana

VerKörperungen/MatteRealities - Perspektiven empirischer Wissenschaftsforschung ; ; 28

Soggetti

SOCIAL SCIENCE / Sociology / Urban

Lingua di pubblicazione

Tedesco

Formato

Materiale a stampa

Livello bibliografico

Monografia

Nota di contenuto

Frontmatter -- Inhalt -- Abbildungsverzeichnis -- Abkürzungs- und Übersetzungsverzeichnis -- Danksagungen -- 1. Städte als Orte der Transformation -- 2. »Das ist eben ne schöne Geschichte« -- 3. »For me that's just circus, the Mobility Week« -- 4. »How it actually works« -- 5. Einblicke in und durch den Werkzeugkasten gegenwärtiger Nachhaltigkeitsbemühungen -- Literaturverzeichnis

Sommario/riassunto

Angesichts von Extremwetterereignissen, Klimaprognosen und Bewegungen wie Fridays for Future lässt sich schwer leugnen, dass ein Teil der Menschheit auf eine Weise lebt, die eine gut bewohnbare Welt höchst unwahrscheinlich macht. Städten wird in dieser Situation eine zentrale Rolle zugeschrieben. Sie können die Welt vor der Erderwärmung retten - oder sie sind die Ersten, die untergehen. Doch was genau wird getan, um Städte in Richtung Nachhaltigkeit zu transformieren? Britta Acksel nimmt Aktionspläne, Klimafestivals, Awards und weitere Transformationsinstrumente in den Blick. Ethnographisch fundiert zeigt sie auf, wie sich die Arbeit mit dieser speziellen Form von Policy-Werkzeugen gestaltet - und welche Bemühungen besonders aussichtsreich erscheinen.



2.

Record Nr.

UNINA9910375821703321

Titolo

APL Berlin 2000 : proceedings of the APL Berlin 2000 Conference, held at the Technical University of Berlin, July 2000

Pubbl/distr/stampa

[Place of publication not identified], : ACM Press, 2001

Descrizione fisica

1 online resource (258 p.;)

Collana

APL quote quad APL Berlin 2000

Disciplina

005.13/3

Soggetti

APL (Computer program language)

Engineering & Applied Sciences

Computer Science

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Bibliographic Level Mode of Issuance: Monograph



3.

Record Nr.

UNISA996668471303316

Autore

Susilo Willy

Titolo

Information Security and Privacy : 30th Australasian Conference, ACISP 2025, Wollongong, NSW, Australia, July 14–16, 2025, Proceedings, Part III / / edited by Willy Susilo, Josef Pieprzyk

Pubbl/distr/stampa

Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2025

ISBN

981-9691-01-X

Edizione

[1st ed. 2025.]

Descrizione fisica

1 online resource (764 pages)

Collana

Lecture Notes in Computer Science, , 1611-3349 ; ; 15660

Altri autori (Persone)

PieprzykJosef

Disciplina

005.8

Soggetti

Data protection

Computer security

Cryptography

Data encryption (Computer science)

Data protection - Law and legislation

Computer networks - Security measures

Blockchains (Databases)

Data and Information Security

Principles and Models of Security

Cryptology

Privacy

Mobile and Network Security

Blockchain

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Nota di contenuto

-- Privacy Enhancing Technologies.  -- Comparing and Improving Frequency Estimation Perturbation Mechanisms under Local Differential Privacy.  -- Strong Federated Authentication With Password-based Credential Against Identity Server Corruption.  -- Anonymous Credentials with Credential Redaction and Its Application to SSI-based Plug Charge for Shared Vehicles.  -- Direction-Oriented Smooth Sensitivity and Its Application to Genomic Statistical Analysis.  -- Sentence Embedding Generation Method for Differential Privacy Protection. .-KD-IBMRKE-PPFL: A Privacy-Preserving Federated Learning



Framework Integrating Knowledge Distillation and Identity-Based Multi-Receiver Key Encapsulation.  -- AI Security and Privacy.  -- Identifying the Truth of Global Model: A Generic Solution to Defend Against Byzantine and Backdoor Attacks in Federated Learning. .-RAGLeak: Membership Inference Attacks on RAG-Based Large Language Models.  -- DeGain: Detecting GAN-based Data Inversion in Collaborative Deep Learning.  -- FRFL: Fair and Robust Federated Learning Incentive Model Based on Game Theory.  -- DPFedSub: A Differentially Private Federated Learning with Randomized Subspace Descend.  -- MG-Det: Deepfake Detection with Multi-Granularity.  -- LPIA: Label Preference Inference Attack against Federated Graph Learning.  -- DARA: Enhancing Vulnerability Alignment via Adaptive Reconstruction and Dual-Level Attention.  -- Zeroth-Order Federated Private Tuning for Pretrained Large Language Models.  -- Understanding the Robustness of Machine-Unlearning Models.  -- System Security.  -- Mitigating the Unprivileged User Namespaces based Privilege Escalation Attacks with Linux Capabilities.  -- SoK: From Systematization to Best Practices in Fuzz Driver Generation.  -- Facial Authentication Security Evaluation against Deepfake Attacks in Mobile Apps.  -- Short Papers.  -- EAPIR: Efficient and Authenticated Private Information Retrieval with Fast Server Processing.  -- Ransomware Encryption Detection: Adaptive File System Analysis Against Evasive Encryption Tactics.  -- Receiver-initiated Updatable Public Key Encryption: Construction, Security and Application.  -- Robust and Privacy-Preserving Dynamic Average Consensus with Individual Weight.  -- Improving RSA Cryptanalysis: Combining Continued Fractions and Coppersmith’s Techniques.  -- Shortest Printable Shellcode Encoding Algorithm Based on Dynamic Bitwidth Selection.  -- Position Paper.  -- Bridging Clone Detection and Industrial Compliance: A Practical Pipeline for Enterprise Codebases.

Sommario/riassunto

This three-volume set in LNCS constitutes the refereed proceedings of the 30th Australasian Conference on Information Security and Privacy, ACISP 2025, held in Wollongong, NSW, Australia, during July 14–16, 2025. The 54 full papers, 6 short papers and 1 invited paper included in this book were carefully reviewed and selected from 181 submissions. They were organized in topical sections as follows: symmetric-key cryptography and cryptanalysis; public-key encryption; digital signatures and zero knowledge; cryptographic protocols and blockchain; post-quantum cryptography; homomorphic encryption and applications; cryptographic foundations and number theory; privacy enhancing technologies; AI security and privacy; system security.