976 resultados para QUANTUM-STATE
Resumo:
There is limited understanding about business strategies related to parliamentary government's departments. This study focuses on the strategies of departments of two state governments in Australia. The strategies are derived from department strategic plans available in public domain and collected from respective websites. The results of this research indicate that strategies fall into seven categories: internal, development, political, partnership, environment, reorientation and status quo. The strategies of the departments are mainly internal or development where development strategy is mainly the focus of departments such as transport, and infrastructure. Political strategy is prevalent for departments related to communities, and education and training. Further three layers of strategies are identified as kernel, cluster and individual, which are mapped to the developed taxonomy.
Resumo:
Key establishment is a crucial primitive for building secure channels in a multi-party setting. Without quantum mechanics, key establishment can only be done under the assumption that some computational problem is hard. Since digital communication can be easily eavesdropped and recorded, it is important to consider the secrecy of information anticipating future algorithmic and computational discoveries which could break the secrecy of past keys, violating the secrecy of the confidential channel. Quantum key distribution (QKD) can be used generate secret keys that are secure against any future algorithmic or computational improvements. QKD protocols still require authentication of classical communication, although existing security proofs of QKD typically assume idealized authentication. It is generally considered folklore that QKD when used with computationally secure authentication is still secure against an unbounded adversary, provided the adversary did not break the authentication during the run of the protocol. We describe a security model for quantum key distribution extending classical authenticated key exchange (AKE) security models. Using our model, we characterize the long-term security of the BB84 QKD protocol with computationally secure authentication against an eventually unbounded adversary. By basing our model on traditional AKE models, we can more readily compare the relative merits of various forms of QKD and existing classical AKE protocols. This comparison illustrates in which types of adversarial environments different quantum and classical key agreement protocols can be secure.
Resumo:
Many contend that the logical solution to woman abuse in marriage/cohabitation is for women to exit through legal separation, divorce, or other means. However, a growing body of empirical work shows that separation or divorce does not necessarily solve the problem of woman abuse. For example, in addition to experiencing lethal or nonlethal forms of physical violence and psychological abuse, many women who try to leave, or who have left their male partners, are sexually assaulted. The main objective of this paper is to critically review the extant empirical and theoretical work on separation/divorcesexual assault. Suggestions for future research and theorizing are also provided.
Resumo:
This article represents a preliminary comparative exploration of anti-Muslim racism and violence in Australia and Canada, especially since September 11. We contextualise the anti-Muslim vilification and victimisation within parallel – yet still distinct – political climates that bestow permission to hate. That is, negative media portrayals, together with discriminatory rhetoric, policy and practices at the level of the state create an enabling environment that signals the legitimacy of public hostility toward the Muslim communities. We conclude by pointing toward the need for more extensive empirical exploration of the phenomenon in both countries.
Resumo:
This volume aims to 'bring the state back into terrorism studies' and fill the notable gap that currently exists in our understanding of the ways in which states employ terrorism as a political strategy of internal governance or foreign policy. Within this broader context, the volume has a number of specific aims. First, it aims to make the argument that state terrorism is a valid and analytically useful concept which can do much to illuminate our understanding of state repression and governance, and illustrate the varieties of actors, modalities, aims, forms, and outcomes of this form of contemporary political violence. Secondly, by discussing a rich and diverse set of empirical case studies of contemporary state terrorism this volume explores and tests theoretical notions, generates new questions and provides a resource for further research. Thirdly, it contributes to a critical-normative approach to the study of terrorism more broadly and challenges dominant approaches and perspectives which assume that states, particularly Western states, are primarily victims and not perpetrators of terrorism. Given the scarceness of current and past research on state terrorism, this volume will make a genuine contribution to the wider field, particularly in terms of ongoing efforts to generate more critical approaches to the study of political terrorism. This book will be of much interest to students of critical terrorism studies, critical security studies, terrorism and political violence and political theory in general.