03882nam 2200817 a 450 991096520710332120200520144314.097812993129681299312969978143565637614356563779781554580675155458067610.51644/9781554580675(CKB)1000000000533898(EBL)685495(OCoLC)236160333(SSID)ssj0000117171(PQKBManifestationID)11141734(PQKBTitleCode)TC0000117171(PQKBWorkID)10042642(PQKB)10621377(CaBNvSL)thg00604401 (MdBmJHUP)muse14236(Au-PeEL)EBL685495(CaPaEBR)ebr10233879(CaONFJC)MIL462546(DE-B1597)667668(DE-B1597)9781554580675(MiAaPQ)EBC685495(Perlego)1706224(EXLCZ)99100000000053389820080903d2008 uy 0engur|n|---|||||txtccrCan the world be governed? possibilities for effective multilateralism /edited by Alan S. Alexandroff, editor1st ed.Waterloo, Ont. Wilfrid Laurier University Press Centre for International Governance Innovation20081 online resource (445 p.)Studies in international governance series"Co-published with the Centre for International Governance Innovation"--T.p. verso.9781554580415 1554580412 Includes bibliographical references and index.Contents; Introduction; Incentive Compatibility and Global Governance: Existential Multilateralism, a Weakly Confederal World, and Hegemony; A Grand Coalition and International Governance; America and the Reform of Global Institutions; Two Challenges to Institutionalism; International Institutions and Collective Authorization of the Use of Force; Multilateralism on Trial: From the 2005 UN Summit to Today's Reality; Facing the Global Problems of Development; Can the Trading System Be Governed? Institutional Implications of the WTO's Suspended AnimationSlipping into Obscurity: Crisis and Institutional Reform at the IMFA Comment on the Effective Possibilities of Multilateralism; Conclusion; Contributors; Index In this book, leading international relations experts and practitioners examine through theory and case study the prospect for successful multilateral management of the global economy and international security. In the theory section contributors tackle the big questions: Why is there an apparent rising tide of calls for reform of current multilateral organizations and institutions? Why are there growing questions over the effectiveness of global governance? Is the reform of current organizations and institutions likely or possible? Case studies include the examination of difficulties faciStudies in international governance.International organizationInternational cooperationInternational relationsInternational economic relationsSecurity, InternationalInternational organization.International cooperation.International relations.International economic relations.Security, International.341.2Alexandroff Alan S281791Centre for International Governance Innovation.MiAaPQMiAaPQMiAaPQBOOK9910965207103321Can the world be governed4364698UNINA06637nam 22008415 450 99669167600331620251020130421.0981-9535-43-310.1007/978-981-95-3543-9(MiAaPQ)EBC32364755(Au-PeEL)EBL32364755(CKB)41667344500041(DE-He213)978-981-95-3543-9(EXLCZ)994166734450004120251020d2026 u| 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierInformation and Communications Security 27th International Conference, ICICS 2025, Nanjing, China, October 29–31, 2025, Proceedings, Part II /edited by Jinguang Han, Yang Xiang, Guang Cheng, Willy Susilo, Liquan Chen1st ed. 2026.Singapore :Springer Nature Singapore :Imprint: Springer,2026.1 online resource (842 pages)Lecture Notes in Computer Science,1611-3349 ;16218981-9535-42-5 -- Blockchain and Cryptocurrencies. -- EquinoxBFT: BFT Consensus for Blockchain Emergency Governance. -- fFuzz: A State-aware Function-level Fuzzing Framework for Smart Contract Vulnerabilities Detection. -- TraceBFT: Backtracking-based Pipelined Asynchronous BFT Consensus for High-Throughput Distributed Systems. -- RADIAL: Robust Adversarial Discrepancy-aware Framework for Early Detection of Illicit Cryptocurrency Accounts. -- Enhancing Private Signing Key Protection in Digital Currency Transactions Using Obfuscation. -- AnsBridge: Towards Secure Cross-Chain Interoperability via Anonymous and Verifiable Validators. -- TrustBlink: A zkSNARK-Powered On-Demand Relay for PoW Cross-Chain Verification With Low Cost. -- R1-MFSol: a Smart Contract Vulnerability Detection Model Based on LLM and Multi-modal Feature Fusion. -- No Place to Hide: An Efficient and Accurate Backdoor Detection Tool for Ethereum ERC-20 Smart Contracts. -- System and Network Security. -- Batch-oriented Element-wise Approximate Activation for Privacy-Preserving Neural Networks. -- Social-Aware and Quality-Driven Incentives for Mobile Crowd-Sensing with Two-Stage Game. -- A Distributed Privacy Protection Method for Crowd Sensing Based on Trust Evaluation. -- DBG-LB: A Trustworthy and Efficient Framework for Data Sharing in the Internet of Vehicles. -- Actions Speak Louder Than Words: Evidence-Based Trust Level Evaluation in Multi-Agent Systems. -- Bridging the Interoperability Gaps Among Trusted Architectures in MCUs. -- Security and Privacy of AI. -- A Dropout-Resilient and Privacy-Preserving Framework for Federated Learning via Lightweight Masking. -- AFedGAN: Adaptive Federated Learning with Generative Adversarial Networks for Non-IID Data. -- OTTER: Optimized Training with Trustworthy Enhanced Replication via Diffusion and Federated VMUNet for Privacy-Aware Medical Segmentatio. -- EAGLE: Ensemble Adaptive Graph Learning for Enhanced Ethereum Fraud Detection. -- BR-CPPFL: A Blockchain-based Robust Clustered Privacy-preserving Federated Learning System. -- Efficient Semi-asynchronous Federated Learning with Guided Selective Participation and Adaptive Aggregation. -- Improving Byzantine-resilience in Federated Learning via Diverse Aggregation and Adaptive Variance Reduction. -- Hierarchical Recovery of Convolutional Neural Networks via Self-Embedding Watermarking. -- Personalized Federated Learning Algorithm Based on User Grouping and Group Signatures. -- Machine Learning for Security. -- SPCD: A Shot-Based Partial Copy Detection Method. -- Bayesian-Adaptive Graph Neural Network for Anomaly Detection (BAGNN). -- UzPhishNet Model for Phishing Detection. -- CyberNER-LLM: Cyber Threat Intelligence Named Entity Recognition With Large Language Model. -- Provenance-Based Intrusion Detection via Multi-Scale Graph Representation Learning. -- SADGA: A Self Attention GAN-Based Adversarial DGA with High Anti-Detection Ability.This three-set volume LNCS 16217-16219 constitutes the refereed proceedings of 27th International Conference on Information and Communications Security, ICICS 2025, held in Nanjing, China, during October 29–31, 2025. The 91 full papers presented in this book were carefully selected and reviewed from 357 submissions. The papers are organized in the following topical sections: Part I: Cryptography; Post-quantum Cryptography; Anonymity and Privacy; Authentication and Authorization. Part II: Blockchain and Cryptocurrencies, System and Network Security, Security and Privacy of AI, Machine Learning for Security. Part III: Attack and Defense; Vulnerability Analysis; Anomaly Detection; Traffic Classification; Steganography and Watermarking.Lecture Notes in Computer Science,1611-3349 ;16218Data structures (Computer science)Information theoryDatabase managementData miningApplication softwareImage processingDigital techniquesComputer visionCryptographyData encryption (Computer science)Data Structures and Information TheoryDatabase ManagementData Mining and Knowledge DiscoveryComputer and Information Systems ApplicationsComputer Imaging, Vision, Pattern Recognition and GraphicsCryptologyData structures (Computer science)Information theory.Database management.Data mining.Application software.Image processingDigital techniques.Computer vision.Cryptography.Data encryption (Computer science)Data Structures and Information Theory.Database Management.Data Mining and Knowledge Discovery.Computer and Information Systems Applications.Computer Imaging, Vision, Pattern Recognition and Graphics.Cryptology.005.73003.54Han Jinguang1860657Xiang Yang1860658Cheng Guang1860659Susilo Willy1759814Chen Liquan1860660MiAaPQMiAaPQMiAaPQBOOK996691676003316Information and Communications Security4466408UNISA