1.

Record Nr.

UNINA9910451368003321

Autore

King Anthony D.

Titolo

Spaces of global cultures : architecture, urbanism, identity / / Anthony D. King

Pubbl/distr/stampa

London ; ; New York : , : Routledge, , 2004

ISBN

1-134-64446-9

0-415-19619-1

1-280-07872-3

0-203-48312-X

Descrizione fisica

1 online resource (277 p.)

Collana

Architext series

Disciplina

720/.1/03

Soggetti

Architecture and globalization

Architecture and society

Architecture, British colonial

City planning - Asia

Postcolonialism - Asia

Electronic books.

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Description based upon print version of record.

Nota di bibliografia

Includes bibliographical references and index.

Nota di contenuto

Book Cover; Title; Contents; List of illustrations; Illustration acknowledgments; Preface and introduction; Acknowledgments; THEORIES; WORLDS IN THE CITY: FROM WONDERS OF MODERN DESIGN TO WEAPONS OF MASS DESTRUCTION; INTERROGATING GLOBAL CULTURE(S); CULTURES AND SPACES OF POSTCOLONIAL KNOWLEDGES; THE TIMES AND SPACES OF MODERNITY; WRITING TRANSNATIONAL PLANNING HISTORIES: THE DIALECTICS OF DUAL DEVELOPMENT; HISTORIES; SUBURB/ETHNOBURB/GLOBURB: THE MAKING OF CONTEMPORARY MODERNITIES; VILLAFICATION: THE TRANSFORMATION OF CHINESE CITIES

IMAGINING THE WORLD AT HOME: THE DISTANT SPACES OF THE INDIAN CITYTRANSNATIONAL DELHI REVISITED: THE SPATIAL LANGUAGE OF THREE MODERNITIES; IMPERIALISM, COLONIALISM AND ARCHITECTS OF THE ARTS AND CRAFTS IN BRITAIN; PASTS/PRESENTS/FUTURES; WAYS OF SEEING: SERENDIPITY, VISUALITY, EXPERIENCE; AFTERWORD;



References; Name index; Subject index;

Sommario/riassunto

^SDraws on social, cultural and postcolonial writings and architectural evidence from various cities around the world to examine existing theories of globalization and also develop new ones.

2.

Record Nr.

UNINA9910786277603321

Autore

Evans Eric J. <1945-, >

Titolo

Thatcher and Thatcherism / / Eric J. Evans

Pubbl/distr/stampa

Abingdon, Oxon : , : Routledge, , 2013

ISBN

0-203-06689-8

1-299-14824-7

1-135-07688-X

Edizione

[3rd ed.]

Descrizione fisica

1 online resource (xvi, 206 pages)

Collana

Making of the contemporary world

Disciplina

941.085/8092

Soggetti

Conservatism - Great Britain - History - 20th century

World politics - 1945-1989

Great Britain Politics and government 1979-1997

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Description based upon print version of record.

Nota di bibliografia

Includes bibliographical references and index.

Nota di contenuto

The 1970s: explanations and origins -- Election and depression, 1979-81 -- Thatcher triumphant -- Thatcherism and the Conservative Party -- The attack on the government ethic -- The attack on the professional ethic -- Thatcher abroad I: Europe -- Thatcher abroad II: defence and the Americas -- Thatcher abroad III: influence and prejudice -- The fall -- The Thatcher legacy I: the major years 1990-97 -- The Thatcher legacy II: the new Labour experiment -- Interpretations.

Sommario/riassunto

This book focuses on the career of former British prime minister Margaret Thatcher and surveys the origins and impact of 'Thatcherism' as a cultural construct and an economic creed.



3.

Record Nr.

UNINA9910143623403321

Titolo

Advances in Cryptology - CRYPTO 2000 : 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000. Proceedings / / edited by Mihir Bellare

Pubbl/distr/stampa

Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2000

ISBN

3-540-44598-6

Edizione

[1st ed. 2000.]

Descrizione fisica

1 online resource (XI, 543 p.)

Collana

Lecture Notes in Computer Science, , 0302-9743 ; ; 1880

Disciplina

005.8/2

Soggetti

Computer networks

Data encryption (Computer science)

Algorithms

Management information systems

Computer science

Computer science - Mathematics

Computer Communication Networks

Cryptology

Algorithm Analysis and Problem Complexity

Management of Computing and Information Systems

Computational Mathematics and Numerical Analysis

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Bibliographic Level Mode of Issuance: Monograph

Nota di bibliografia

Includes bibliographical references and index.

Nota di contenuto

XTR and NTRU -- The XTR Public Key System -- A Chosen-Ciphertext Attack against NTRU -- Privacy for Databases -- Privacy Preserving Data Mining -- Reducing the Servers Computation in Private Information Retrieval: PIR with Preprocessing -- Secure Distributed Computation and Applications -- Parallel Reducibility for Information-Theoretically Secure Computation -- Optimistic Fair Secure Computation -- A Cryptographic Solution to a Game Theoretic Problem -- Algebraic Cryptosystems -- Differential Fault Attacks on Elliptic Curve Cryptosystems -- Quantum Public-Key Cryptosystems -- New Public-Key Cryptosystem Using Braid Groups -- Message Authentication -- Key Recovery and Forgery Attacks on the MacDES



MAC Algorithm -- CBC MACs for Arbitrary-Length Messages: The Three-Key Constructions -- L-collision Attacks against Randomized MACs -- Digital Signatures -- On the Exact Security of Full Domain Hash -- Timed Commitments -- A Practical and Provably Secure Coalition-Resistant Group Signature Scheme -- Provably Secure Partially Blind Signatures -- Cryptanalysis -- Weaknesses in the SL2( ) Hashing Scheme -- Fast Correlation Attacks through Reconstruction of Linear Polynomials -- Traitor Tracing and Broadcast Encryption -- Sequential Traitor Tracing -- Long-Lived Broadcast Encryption -- Invited Talk -- Taming the Adversary -- Symmetric Encryption -- The Security of All-or-Nothing Encryption: Protecting against Exhaustive Key Search -- On the Round Security of Symmetric-Key Cryptographic Primitives -- New Paradigms for Constructing Symmetric Encryption Schemes Secure against Chosen-Ciphertext Attack -- To Commit or Not to Commit -- Efficient Non-malleable Commitment Schemes -- Improved Non-committing Encryption Schemes Based on a General Complexity Assumption -- Protocols -- A Note on the Round-Complexity of Concurrent Zero-Knowledge -- An Improved Pseudo-random Generator Based on Discrete Log -- Linking Classical and Quantum Key Agreement: Is There “Bound Information”? -- Stream Ciphers and Boolean Functions -- Maximum Correlation Analysis of Nonlinear S-boxes in Stream Ciphers -- Nonlinearity Bounds and Constructions of Resilient Boolean Functions -- Almost Independent and Weakly Biased Arrays: Efficient Constructions and Cryptologic Applications.

Sommario/riassunto

This book constitutes the refereed proceedings of the 20th Annual International Cryptology Conference, CRYPTO 2000, held in Santa Barbara, CA, USA in August 2000. The 32 revised full papers presented together with one invited contribution were carefully reviewed and selected from 120 submissions. The papers are organized in topical sections on XTR and NTRU, privacy for databases, secure distributed computation, algebraic cryptosystems, message authentication, digital signatures, cryptanalysis, traitor tracing and broadcast encryption, symmetric encryption, to commit or not to commit, protocols, and stream ciphers and Boolean functions.