04097nam 2200601 450 991078803880332120200520144314.090-04-27710-2(CKB)2670000000578885(EBL)1877193(SSID)ssj0001381452(PQKBManifestationID)11766691(PQKBTitleCode)TC0001381452(PQKBWorkID)11391970(PQKB)10602394(MiAaPQ)EBC1877193(nllekb)BRILL9789004277106(Au-PeEL)EBL1877193(CaPaEBR)ebr10992594(CaONFJC)MIL666148(OCoLC)897378866(PPN)184928737(EXLCZ)99267000000057888520141216h20152015 uy 0engurcnu||||||||txtccrInvestigating operational incidents in a military context law, justice, politics /edited by David W. Lovell ; contributors, Thomas E. Ayres [and nine others]Leiden, Netherlands :Brill Nijhoff,2015.©20151 online resource (273 p.)International Humanitarian Law Series ;Volume 43Description based upon print version of record.1-322-34866-9 90-04-27709-9 Includes bibliographical references and index.Preliminary material /Editors Investigating Operational Incidents in a Military Context: Law, Justice, Politics --Introduction: The Challenges of Investigating Operational Incidents /David W. Lovell --A Strategic Commander’s Perspective /Rear Admiral James Goldrick --Bloody Sunday: Politics, Truth and Justice in the Widgery and Saville Inquiries /David Blaazer --The Maxim of Thucydides: Transparency, Fact-Finding, and Accountability in East Timor /Clinton Fernandes --The UK in Basra and the Death of Baha Mousa /Rachel Kerr --Haditha: A Case Study in Response to War Crimes /Tom Ayres --Investigating Violations of International Human Rights Law and International Humanitarian Law through an International Commission of Inquiry: Libya and Beyond /Annemarie Devereux --Ethics or Politics? The Palmer Commission Report on the 2010 Gaza Flotilla Incident /Deane-Peter Baker --The Challenges of Green-on-Blue Investigations in Afghanistan /Clive Williams --The Tension between Secrecy and Transparency: Investigations in the ‘Wiki Age’ /David W. Lovell --The Emerging Paradigm for Operational Incident Investigation /Rob McLaughlin --Bibliography /Editors Investigating Operational Incidents in a Military Context: Law, Justice, Politics --Index /Editors Investigating Operational Incidents in a Military Context: Law, Justice, Politics.‘Operational incidents’ denotes misconduct, misdeeds or mishaps that occur on military operations, whether concerning the mistreatment of enemy soldiers, offences against civilians, conflict of varying levels within one’s own forces, or accidents that lead to injury or death within a theatre of operations. Alleged breaches of IHL or the disciplinary regulations of particular militaries require at the very least an initial assessment to determine the facts and then, if warranted, a more substantial investigation. The need for robust investigations, however, is not always matched by the will and the ability to undertake them. There is at last a sufficient body of experience on which we can reflect, in this volume, on such investigations, their challenges, and their likely evolution.International humanitarian law series ;Volume 43.War crimes investigationWar crimes investigation.363.25/938Lovell David W.1956-Ayres Thomas E.MiAaPQMiAaPQMiAaPQBOOK9910788038803321Investigating operational incidents in a military context3814575UNINA03729nam 22007335 450 99663566920331620251225183636.09789819608942981960894510.1007/978-981-96-0894-2(MiAaPQ)EBC31836196(Au-PeEL)EBL31836196(CKB)37011155600041(DE-He213)978-981-96-0894-2(OCoLC)1478701009(EXLCZ)993701115560004120241213d2025 u| 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierAdvances in Cryptology – ASIACRYPT 2024 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9–13, 2024, Proceedings. Part IV /edited by Kai-Min Chung, Yu Sasaki1st ed. 2025.Singapore :Springer Nature Singapore :Imprint: Springer,2025.1 online resource (463 pages)Lecture Notes in Computer Science,1611-3349 ;154879789819608935 9819608937 post-quantum cryptography -- secure data structures -- lattice-based cryptography -- lattice assumptions.The 9 volume set LNCS 15484-15492 constitutes the refereed proceedings of the 30th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2024, which took place in Kolkata, India, during December 9–13, 2024. The 127 full papers included in the proceedings were carefully reviewed and selected from 433 submissions. They were organized in topical sections as follows: Advances Primitives; homomorphic encryption; digital signatures; public-key cryptography; pairing-based cryptography, threshold cryptography; isogeny-based cryptography; post-quantum cryptography; secure data structures; lattice-based cryptography; lattice assumptions; key exchange protocols; succinct arguments; verifiable computation, zero-knowledge protocols; secure multiparty computation; blockchain protocols; information theoretic cryptography; secret sharing; security against physical attacks; cryptanalysis on symmetric-key schemes; cryptanalysis on public-key schemes; fault attacks and side-channel analysis; cryptanalysis on various problems; quantum cryptanalysis; quantum cryptography; symmetric-key cryptography.Lecture Notes in Computer Science,1611-3349 ;15487CryptographyData encryption (Computer science)Computer networksApplication softwareData protectionComputer networksSecurity measuresCryptologyComputer Communication NetworksComputer and Information Systems ApplicationsSecurity ServicesMobile and Network SecurityCryptography.Data encryption (Computer science)Computer networks.Application software.Data protection.Computer networksSecurity measures.Cryptology.Computer Communication Networks.Computer and Information Systems Applications.Security Services.Mobile and Network Security.005.824Chung Kai-Min1782610Sasaki Yu1695891MiAaPQMiAaPQMiAaPQBOOK996635669203316Advances in Cryptology – ASIACRYPT 20244309018UNISA