| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910157454903321 |
|
|
Autore |
Haft Jeremy <1970-> |
|
|
Titolo |
Unmade in China : the hidden truth about China's economic miracle / / Jeremy R. Haft |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cambridge, England ; ; Malden, Massachusetts : , : Polity, , 2015 |
|
©2015 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (414 p.) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Industries - China |
Electronic books. |
China Economic conditions 2000- |
China Social conditions 2000- |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
|
|
|
|
|
Nota di contenuto |
|
Cover; Dedication; Title page; Copyright page; Figures; Acknowledgments; Preface; Notes; 1: Three Myths; Myth #1: China's Economy is about to Surpass US; Myth #2: Everything is "Made in China"; Myth #3: China's Currency Manipulation Kills Jobs; Notes; 2: Jobs and Jeopardy; The Threat: Unsafe Imports; The Opportunity: Jobs; China's Holdings of Treasury Bills; Chinese Direct Investment in US Firms; Notes; 3: The Bad Earth; Poisoned Water, Land, and Air; Risk and Reward; Responding to Export Challenges; Chinese Investment; Notes; 4: Risky Business; The Threat from Farms; The Threat from Firms |
ShipbuildingRefineries; Bridge Building; Nuclear Power Plants; Pharmaceuticals; Risky Chinese Firms Support US Jobs; Intellectual Property Theft and High-Speed Rail; The People's Liberation Army and Cyber-Spying; Light Bulbs; Notes; 5: Chain of Fools; Fragmentation; Toys; Luxury Cars; Logistics; Pharmaceuticals; The Pentagon; Dairy; Notes; 6: When Regs are Dregs; Regulatory Fragmentation; Environmental Protection; Nuclear Power; Food and Drugs; Consumer Products; Health Care; Notes; 7: What to Do; What You Can Do; What Companies Can Do; What the US Government Can Do; Notes; Index |
End User License Agreement |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910642767303321 |
|
|
Titolo |
Sunflower science and technology / / editor, Jack F. Carter |
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Madison, Wisconsin : , : American Society of Agronomy : , : Crop Science Society of America : , : Soil Science Society of America, , 1978 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (xx, 505 pages) |
|
|
|
|
|
|
Collana |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
3. |
Record Nr. |
UNINA9910999664603321 |
|
|
Titolo |
Advances in Cryptology – EUROCRYPT 2025 : 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Madrid, Spain, May 4–8, 2025, Proceedings, Part III / / edited by Serge Fehr, Pierre-Alain Fouque |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025 |
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2025.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (XX, 457 p. 24 illus., 8 illus. in color.) |
|
|
|
|
|
|
Collana |
|
Lecture Notes in Computer Science, , 1611-3349 ; ; 15603 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Cryptography |
Data encryption (Computer science) |
Computer networks - Security measures |
Computer networks |
Application software |
Data protection |
Cryptology |
Mobile and Network Security |
Computer Communication Networks |
Computer and Information Systems Applications |
Security Services |
Xifratge (Informàtica) |
|
|
|
|
|
|
|
|
|
|
|
|
Seguretat informàtica |
Congressos |
Llibres electrònics |
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di contenuto |
|
Advanced Cryptographic Schemes: Multi-Authority Registered Attribute-Based Encryption -- Almost Optimal KP and CP-ABE for Circuits from Succinct LWE -- Universal Computational Extractors and Multi-Bit AIPO from Lattice Assumptions -- Faster ABE for Turing Machines from Circular Evasive LWE -- Snake-eye Resistant PKE from LWE for Oblivious Message Retrieval and Robust Encryption -- Quasi-Linear Indistinguishability Obfuscation via Mathematical Proofs of Equivalence and Applications -- On Quantum Money and Evasive Obfuscation -- A Simple Framework for Secure Key Leasing -- Quantum Key Leasing for PKE and FHE with a Classical Lessor -- Secret Sharing with Publicly Verifiable Deletion -- Optimal Traitor Tracing from Pairings -- A Generic Approach to Adaptively-Secure Broadcast Encryption in the Plain Model -- Fully Homomorphic Encryption for Cyclotomic Prime Moduli -- SHIP: A Shallow and Highly Parallelizable CKKS Bootstrapping Algorithm -- Anamorphism Beyond One-To-One Messaging: Public-Key with Anamorphic Broadcast Mode. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
This eight-volume set, LNCS 15601-15608, constitutes the proceedings of the 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2025, held in Madrid, Spain, during May 4–8, 2025. The 123 papers included in these proceedings were carefully reviewed and selected from 602 submissions. They are organized in topical sections as follows: Part I: Secure Multiparty Computation I Part II: Public-Key Cryptography and Key-Exchange Part III: Advanced Cryptographic Schemes Part IV: (Non-)Interactive Proofs and Zero-Knowledge Part V: Secure Multiparty Computation II Part VI: MPC II: Private Information Retrieval and Garbling; Algorithms and Attacks Part VII: Theoretical Foundations Part VIII: Real-World Cryptography. |
|
|
|
|
|
|
|
| |