期刊文献+

China's Expanding Participation in the UN Peacekeeping Operations

China's Expanding Participation in the UN Peacekeeping Operations
下载PDF
导出
摘要 The UN-led peacekeeping operation is a lodestar within the field of current international security.As an important example of her peaceful diplomacy,China has consistently and continuously supported the UN-led peacekeeping operations since 1998 when China joined the UN peacekeeping Operation Special Committee.The Chinese peacekeepers accomplished their UN-authorized missions successfully.With their impressive professionalism,high spirits,combat capabilities,and outstanding achievements,the Chinese peacekeepers have been highly acknowledged by the UN organizations,the host nations and the international media. The UN-led peacekeeping operation is a lodestar within the field of current international security. As an important example of her peaceful diplomacy, China has consistently and continuously supported the UN-led peacekeeping operations since 1998 when China joined the UN peacekeeping Operation Special Committee. The Chinese peacekeepers accomplished their UN-authorized missions successfully. With their impressive professionalism, high spirits, combat capabilities, and outstanding achievements, the Chinese peacekeepers have been highly acknowledged by the UN organizations, the host nations and the international media.
作者 Hu Yumin
出处 《Contemporary International Relations》 2009年第6期46-56,共11页 现代国际关系(英文版)
  • 相关文献

参考文献2

二级参考文献12

  • 1黄宣民.明代泰州学派的平民儒学特征——《王艮与泰州学派》序[J].中国社会科学院研究生院学报,1999(1):64-66. 被引量:5
  • 2A.Khalili,J.Katz,W.Arbaugh."Toward Secure Key Distribution in Truly Ad-Hoc Networks,". 2003 Symposium on Applications and the Internet Workshops (SAINT 2003) . 2003
  • 3K.Hoeper,G.Gong."Models of Authentications in Ad Hoc Networks and their Related Network Properties,". http://www.iacr.org/ . 2004
  • 4Jean-Pierre Hubaux,Levente Buttyan,Srdjan Capkun.The quest for security in mobile ad hoc networks. Proceedings of Proceedings of A CM Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc) . 2001
  • 5Zhou L,Haas ZJ.Securing Ad Hoc Networks. IEEE Network . 1999
  • 6Luo H,,Lu S.Ubiquitous and Robust Authentication Services for Ad Hoc Wireless networks. Dept.of Computer Science,UCLA,Technical Report:TR-200030 . 2000
  • 7Bluetooth.SIG Specification of the Bluetooth System Vo.1-Core Version 1.1. Http://www.bluetooth.com . 2001
  • 8Deng Hong-mei,Anindo Mukherjee,Dharma P Agrawal.Thresh-old and identity-based key management and authentication for wire-less Ad Hoc networks. ITCC . 2004
  • 9X.H.Nan,Zh.Chen.Conspectus of Network Security Technology. . 2003
  • 10刘俊田等.四书全译[M]贵州人民出版社,1988.

共引文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部