| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910495906303321 |
|
|
Autore |
Centemeri Laura |
|
|
Titolo |
La permaculture ou L'art de réhabiter : conférence-débat organisée par le groupe Sciences en questions à l'Inra d'Angers le 16 novembre 2017 et à l'Inra d'Avignon le 7 décembre 2017 / / Laura Centemeri |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Versailles, : Éditions Quæ, 2019 |
|
Versailles Cedex : , : Editions Quae, , 2019 |
|
|
|
|
|
|
|
|
|
ISBN |
|
2-7592-3406-1 |
2-7592-2990-4 |
2-7592-2989-0 |
|
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (163 pages) |
|
|
|
|
|
|
Collana |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Sommario/riassunto |
|
La permaculture est un mouvement écologiste qui a connu une remarquable croissance transnationale, à partir des années 1980. Il témoigne d’une forme d’activisme environnemental dont les sciences sociales ont du mal à saisir l’originalité. On en comprend d’autant mieux l’intérêt que la transition écologique est aussi un défi politique, celui d’élaborer l'imaginaire sociotechnique d'une société écologique. Cet ouvrage retrace l’histoire du mouvement de la permaculture et de sa diffusion planétaire, ainsi que les principales influences intellectuelles ayant contribué à l’élaboration de sa proposition culturelle et politique. Celle-ci pourrait se définir comme « l’art de réhabiter » ou comment concevoir, de manière écologiquement et socialement durable, la réponse aux besoins fondamentaux des êtres humains. À partir des résultats d’une enquête menée en Italie, l’auteure discute des apports de la permaculture à l’effort collectif pour imaginer des articulations entre les interdépendances écologiques dans un milieu, la lutte contre les inégalités et les aspirations à l’émancipation. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910484940103321 |
|
|
Titolo |
Innovative Security Solutions for Information Technology and Communications : 10th International Conference, SecITC 2017, Bucharest, Romania, June 8–9, 2017, Revised Selected Papers / / edited by Pooya Farshim, Emil Simion |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2017.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (XII, 201 p. 35 illus.) |
|
|
|
|
|
|
Collana |
|
Security and Cryptology, , 2946-1863 ; ; 10543 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Data protection |
Data structures (Computer science) |
Information theory |
Computer networks |
Computer systems |
Computers, Special purpose |
Computer science - Mathematics |
Data and Information Security |
Data Structures and Information Theory |
Computer Communication Networks |
Computer System Implementation |
Special Purpose and Application-Based Systems |
Mathematics of Computing |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di contenuto |
|
Faster Zero-Knowledge Protocols and Applications -- Stochastic Side-Channel Leakage Analysis via Orthonormal Decomposition -- Key-policy Attribute-based Encryption from Bilinear Maps -- Security of Pseudo-Random Number Generators with Input -- Securing the Foundations of Democracy -- Exploring Naccache-Stern Knapsack Encryption -- Proximity Assurances Based on Natural and Artificial Ambient Environments -- Challenges of Federating National Data |
|
|
|
|
|
|
|
|
|
|
|
Access Infrastructures -- Strongly Deniable Identification Schemes Immune to Prover's and Verifier's Ephemeral Leakage -- Evolution of the McEliece Public Key Encryption Scheme -- New Algorithm for Modeling S-box in MILP Based Differential and Division Trail Search -- Secretly Embedding Trapdoors into Contract Signing Protocols -- On A Key Exchange Protocol. . |
|
|
|
|
|
|
Sommario/riassunto |
|
This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Security for Information Technology and Communications, SecITC 2017, held in Bucharest, Romania, in June 2017. The 6 revised full papers presented together with 7 invited talks were carefully reviewed and selected from 22 submissions. The papers present advances in the theory, design, implementation, analysis, verification, or evaluation of secure systems and algorithms. |
|
|
|
|
|
|
|
| |