Piaci szereplők proxy háborúja
نویسندگان
چکیده
A proxy háborúk vizsgálata során a legtöbb kutató megállapította, hogy azok jelentős múlttal rendelkeznek. Napjainkban elengedhetetlen felülvizsgálni hadtudományban alkalmazott egyes alapfogalmakat, mert hibrid hadviselésnek hatása lehet rájuk. Ezek lehetséges hatások meghatározások szélesedéséhez vezethetnek, kutatások is szélesebb területet érintenek napjainkban. civil gazdasági vállalatoknak nincsen lehetősége fegyveres küzdelemre piacon folyó harcokban. történelem azonban szolgáltat nekünk bizonyítékot rá, van rá elérhető módszer, mégis megtegyék. Egy háború előfordulhat, egy-egy ilyen vállalat kerül pártfogó szerepbe és saját céljait egy ország valódi erejével próbálja elérni. Ez történt Dél-Amerikában Gran Chaco 1932-ben.
منابع مشابه
Proxy Signatures Secure Against Proxy Key Exposure
We provide an enhanced security model for proxy signatures that captures a more realistic set of attacks than previous models of Boldyreva et al. and of Malkin et al.. Our model is motivated by concrete attacks on existing schemes in scenarios in which proxy signatures are likely to be used. We provide a generic construction for proxy signatures secure in our enhanced model using sequential agg...
متن کاملProxy PNNI Augmented Routing (Proxy PAR)
ATM networks often carry other popular communication protocols such as TCP/IP. LAN emulation techniques, with LANE and MPOA being the most prominent ones, make it possible to support existing applications, but do not take advantage of many ATM capabilities. Furthermore, such server-based solutions often suffer from single point of failure problems. PNNI Augmented Routing (PAR), based on Private...
متن کاملindirect proxy
if the agent, who has the right to appoint a proxy, exercises his right and appoints another person for pursuing the subject of agency, the appointed person is not the agent of the appointer; rather, he is regarded as the indirect agent of the client. therefore, if the object of agency is conclusion of a transaction contract and the indirect proxy concludes it, that [contract] belongs to the cl...
متن کاملNew Proxy Signature, Proxy Blind Signature and Proxy Ring Signature Schemes from Bilinear Pairing
Proxy signatures are very useful tools when one needs to delegate his/her signing capability to other party. After Mambo et al.’s first scheme was announced, many proxy signature schemes and various types of proxy signature schemes have been proposed. Due to the various applications of the bilinear pairings in cryptography, there are many IDbased signature schemes have been proposed. In this pa...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Hadtudomány
سال: 2021
ISSN: ['1215-4121', '1588-0605']
DOI: https://doi.org/10.17047/hadtud.2021.31.e.1