05099nam 2200529 450 991079488570332120231129203618.03-8382-6845-8(CKB)4330000000012452(EBL)4549256(OCoLC)952247163(MiAaPQ)EBC4549256(MiAaPQ)EBC5782793(EXLCZ)99433000000001245220160717h20162016 uy 0engur|n|---|||||rdacontentrdamediardacarrierLimits of a post-Soviet State how informality replaces, renegotiates, and reshapes governance in contemporary Ukraine /Abel Polese ; with a foreword by Colin C. WilliamsStuttgart, Germany :ibidem-Verlag,2016.©20161 online resource (259 p.)Soviet and Post-Soviet Politics and Society,1614-3515Description based upon print version of record.3-8382-0885-4 Includes bibliographical references at the end of each chapters.Intro; Table of Contents; Acknowledgements; Foreword; Introduction: where is informality?; Informality and the (welfare) state; Informality, borders and boundaries; Border crossing, petty trade and the role of informality in breaking artificial monopolies; Informality and grey areas: introducing the ""brift""; Informality between private and state initiative; The guest at the dining table: economic transitions and informal renegotiations of hospitality; Why bazaars are not wiped out by supermarkets: reflections on a possible bazaar economyNew directions in informality studies? policy making and implementationBy way of conclusion: on current and further directions in informality research; How much of this book is about Ukraine?; What is informality?; Main themes of this book: (Over) Regulation and informality; 'In spite of the state' and 'beyond the state'; Morality, compliance Informality and the cubic watermelon paradigm; Cited works; 1 Introduction; 2 Welfare and the role of the state in post-socialism; 3 Individual agency and bottom-up welfare provision; 4 Reforms to the pension system from the bottom: Uzbekistan5 Access (or lack thereof) to healthcare: Lithuania6 Welfare as childcare: Romania; 7 Conclusion; Cited works; 1 Redefining borders and their morality; 2 Scenes from a border; 3 A false bottom train; 4 Alternative ways of crossing; 5 Concluding remarks; Cited works; 1 Introduction: a running bazaar; 2 Hum, I am Sorry. . . Where is the Border?; 3 Smugglers or Traders?; 4 Do you have a Tomato? Scenes of ""Legal"" Corruption; 5 Conclusion; Cited works; 1 If I receive it, it is a gift. If I demand it, then it is a bribe.; 2 Informal payments and the role of the state; 3 Switching moralities4 The academic 'moral code'5 'Survival techniques' of hospitals; 6 Concluding remarks; Cited works; 1 Introduction; 2 Informality and (lack of) Welfare; 3 Structure and agency in debates on informality; 4 Chernobyl; 5 Chernobyl Welfare; 6 Food and welfare; 7 Rejecting welfare and embracing place; 8 Conclusion; Cited works; 1 What's So Special about Eating? What All that Food Means; 2 What is Hospitality?; 3 Who is a Guest? Who is a Stranger?; 4 Step I: Entertaining the Host's Belly; 5 Food without Borders: The Dinner; 6 Discovering your Limits: Drinking7 Final Reflections on Hospitality, Food and GuestsCited works; 1 Introduction: the role of bazaars in Odessa; 2 On the persistence of informal economic practices in the (post-Soviet) world; 3 The origins of bazaars in Odessa; 4 The morphology and function of bazaars of Odessa; 5 Post-1991 bazaars and their challenges; 6 The transformation of bazaars; 7 The future of bazaars in Odessa; Cited works; 1 Methodological considerations; 2 The context: evolution of language statuses in Ukraine; 3 Domesticating Ukrainian identities; 4 Concluding remarks; Cited worksThough informed by case studies conducted in Ukraine, this book transcends its country-specific scope. It explains why informality in governance is not necessarily transitory or temporary but a constant in most political systems. The book discusses self-protective mechanisms, responses to incomplete or unfocused policy making, and strategies employed by individuals, classes, and communities to respond to unusual demands. The book argues that when state or company expectations exceed normative behavior, informal behavior continues to thrive. New tactics help cope with the reality of governance.Soviet and post-Soviet politics and society.UkrainePolitics and government1991-2014UkrainePolitics and government2014-947.7086Polese Abel1477051Williams Colin C.MiAaPQMiAaPQMiAaPQBOOK9910794885703321Limits of a post-Soviet State3692015UNINA04498nam 22006495 450 99663566400331620251225185030.09783031804083303180408210.1007/978-3-031-80408-3(MiAaPQ)EBC31836176(Au-PeEL)EBL31836176(CKB)37011149100041(DE-He213)978-3-031-80408-3(OCoLC)1481784519(EXLCZ)993701114910004120241213d2025 u| 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierSecurity, Privacy, and Applied Cryptography Engineering 14th International Conference, SPACE 2024, Kottayam, India, December 14–17, 2024, Proceedings /edited by Johann Knechtel, Urbi Chatterjee, Domenic Forte1st ed. 2025.Cham :Springer Nature Switzerland :Imprint: Springer,2025.1 online resource (329 pages)Lecture Notes in Computer Science,1611-3349 ;153519783031804076 3031804074 -- Attacks and Countermeasures for Digital Microfluidic Biochips. -- SideLink: Exposing NVLink to Covert- and Side-Channel Attacks. -- Faster and more Energy-Efficient Equation Solvers over GF(2). -- Transferability of Evasion Attacks Against FHE Encrypted Inference. -- Security Analysis of ASCON Cipher under Persistent Faults. -- Privacy-Preserving Graph-Based Machine Learning with Fully Homomorphic Encryption for Collaborative Anti-Money Laundering. -- CoPrIME: Complete Process Isolation using Memory Encryption. -- Online Testing Entropy and Entropy Tests with a Two State Markov Model. -- DLShield: A Defense Approach against Dirty Label Attacks in Heterogeneous Federated Learning. -- Benchmarking Backdoor Attacks on Graph Convolution Neural Networks: A Comprehensive Analysis of Poisoning Techniques. -- Spatiotemporal Intrusion Detection Systems for IoT Networks. -- High Speed High Assurance implementations of Mutivariate Quadratic based Signatures. -- ”There’s always another counter”: Detecting Micro-architectural Attacks in a Probabilistically Interleaved Malicious/Benign Setting. -- FPGA-Based Acceleration of Homomorphic Convolution with Plaintext Kernels. -- Post-Quantum Multi-Client Conjunctive Searchable Symmetric Encryption from Isogenies. -- BlockDoor: Blocking Backdoor Based Watermarks in Deep Neural Networks. -- Adversarial Malware Detection. -- ML based Improved Differential Distinguisher with High Accuracy: Application to GIFT-128 and ASCON.This book constitutes the refereed proceedings of the 14th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2024, held in Kottayam, India, during December 14–17, 2024. The 8 full papers, 10 short papers and 1 invited paper included in this book were carefully reviewed and selected from 43 submissions. They were organized in topical sections as follows: security, privacy, applied cryptographic engineering, integration of machine learning techniques, reflecting the growing prominence of this approach in contemporary research on security and cryptography, hardware security, the exploration of post-quantum cryptography, and the development of efficient implementations for emerging cryptographic primitives.Lecture Notes in Computer Science,1611-3349 ;15351Data protectionComputer networksImage processingDigital techniquesComputer visionData and Information SecurityComputer Communication NetworksComputer Imaging, Vision, Pattern Recognition and GraphicsData protection.Computer networks.Image processingDigital techniques.Computer vision.Data and Information Security.Computer Communication Networks.Computer Imaging, Vision, Pattern Recognition and Graphics.005.8Knechtel Johann1782639Chatterjee Urbi1782640Forte Domenic720715MiAaPQMiAaPQMiAaPQBOOK996635664003316Security, Privacy, and Applied Cryptography Engineering4309037UNISA