Identity-Based Conflict: Rethinking Security in a Post–Cold War World
نویسندگان
چکیده
منابع مشابه
HIV/AIDS, conflict and security in Africa: rethinking relationships
The effect of conflict on HIV transmission and regional and global security has been the subject of much recent discussion and debate. Many long held assumptions regarding these relationships are being reconsidered. Conflict has long been assumed to contribute significantly to the spread of HIV infection. However, new research is casting doubt on this assumption. Studies from Africa suggest tha...
متن کاملRethinking surgical care in conflict.
The provision of surgical assistance in confl ict is often associated with care for victims of violence. Images of the war wounded from bullets, bomb-blasts, and other violent assaults often feature prominently in the mass media. The discipline has been guided by military surgeons from the developed world who aim to develop approaches that use the latest surgical technologies in war zones. Howe...
متن کاملRethinking the war on cancer.
Some 40 years ago a metaphor was posed that cancer was such an insidious adversary that a declaration of war on the disease was justified. Although this statement was a useful inspiration for enlistment of resources, despite extraordinary progress in our understanding of disease pathogenesis, in most cases and for most forms of cancer this war has not been won. A second metaphor was about magic...
متن کاملEconomics, conflict and war
With the end of the Cold War the international security environment changed fundamentally. The removal of the superpower conflict saw an initial wave of hope and cuts in military spending, but it quickly became clear that the world was still a dangerous place, and war and conflict remained endemic in many parts of the world. Conflicts had changed; in general they were intra rather than intersta...
متن کاملStrong Forward Security in Identity-Based Signcryption
Due to the possibility of key exposure, forward security in encryption and signing has been well studied, especially in the identitybased setting where an entity’s public key is that entity’s name. From an efficiency point of view, one would like to use the signcryption primitive and have the best of both worlds. However, strong forward security, where the adversary cannot signcrypt in sender’s...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Global Governance: A Review of Multilateralism and International Organizations
سال: 1997
ISSN: 1075-2846,1942-6720
DOI: 10.1163/19426720-00303008