Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 5 of 5 matches in All Departments
This book investigates judicial deference to the administration in judicial review, a concept and legal practice that can be found to a greater or lesser degree in every constitutional system. In each system, deference functions differently, because the positioning of the judiciary with regard to the separation of powers, the role of the courts as a mechanism of checks and balances, and the scope of judicial review differ. In addition, the way deference works within the constitutional system itself is complex, multi-faceted and often covert. Although judicial deference to the administration is a topical theme in comparative administrative law, a general examination of national systems is still lacking. As such, a theoretical and empirical review is called for. Accordingly, this book presents national reports from 15 jurisdictions, ranging from Argentina, Canada and the US, to the EU. Constituting the outcome of the 20th General Congress of the International Academy of Comparative Law, held in Fukuoka, Japan in July 2018, it offers a valuable and unique resource for the study of comparative administrative law.
This two volume set (CCIS 1628 and 1629) constitutes the refereed proceedings of the 8th International Conference of Pioneering Computer Scientists, Engineers and Educators, ICPCSEE 2022 held in Chengdu, China, in August, 2022. The 65 full papers and 26 short papers presented in these two volumes were carefully reviewed and selected from 261 submissions. The papers are organized in topical sections on: Big Data Management and Applications; Data Security and Privacy; Applications of Data Science; Infrastructure for Data Science; Education Track; Regulatory Technology in Finance.
This two volume set (CCIS 1628 and 1629) constitutes the refereed proceedings of the 8th International Conference of Pioneering Computer Scientists, Engineers and Educators, ICPCSEE 2022 held in Chengdu, China, in August, 2022. The 65 full papers and 26 short papers presented in these two volumes were carefully reviewed and selected from 261 submissions. The papers are organized in topical sections on: Big Data Mining and Knowledge Management; Machine Learning for Data Science; Multimedia Data Management and Analysis.
This book investigates judicial deference to the administration in judicial review, a concept and legal practice that can be found to a greater or lesser degree in every constitutional system. In each system, deference functions differently, because the positioning of the judiciary with regard to the separation of powers, the role of the courts as a mechanism of checks and balances, and the scope of judicial review differ. In addition, the way deference works within the constitutional system itself is complex, multi-faceted and often covert. Although judicial deference to the administration is a topical theme in comparative administrative law, a general examination of national systems is still lacking. As such, a theoretical and empirical review is called for. Accordingly, this book presents national reports from 15 jurisdictions, ranging from Argentina, Canada and the US, to the EU. Constituting the outcome of the 20th General Congress of the International Academy of Comparative Law, held in Fukuoka, Japan in July 2018, it offers a valuable and unique resource for the study of comparative administrative law.
As one of the most important group-oriented signatures, ring signatures were initially formalised by Rivet et al. and allows an entity to conscript a group of ring members at will and sign a message in the name of the group without revealing a real identity. Featured with spontaneity and unconditional anonymity, ring signatures have found widespread applications in fair exchange, electronic commerce, wireless sensor networks and vehicular ad-hoc networks. A survey of ring signatures is presented in this book to provide researchers and scholars with a better understanding of this primitive cryptography. To be specific, we survey state-of-the-art ring signature schemes insightfully according to the design philosophies of these schemes. The existing schemes have also been classified in view of various perspectives. Furthermore, the security model and efficiency of existing schemes have been compared. On the other hand, the extensions of ring signature schemes, such as proxy ring signature, threshold ring signature, ring signcryption, deniable ring signature, linkable ring signature and conditional anonymous ring signature, are also investigated. Finally, the challenges and future directions of ring signatures, such as the construction with constant-size, the efficiency and provably-secure construction in the standard model, and new application scenarios have also been given.
|
You may like...
|