• Thumbnail for Protocol I
    Protocol I (also Additional Protocol I and AP I) is a 1977 amendment protocol to the Geneva Conventions concerning the protection of civilian victims...
    31 KB (1,935 words) - 20:47, 30 June 2024
  • Thumbnail for List of parties to the Geneva Conventions
    Geneva Convention Fourth Geneva Convention Additional Protocols Protocol I Protocol II Protocol III The four 1949 Conventions have been ratified by 196...
    39 KB (1,828 words) - 08:02, 20 March 2024
  • Mission: Impossible – Ghost Protocol is a 2011 American action spy film directed by Brad Bird (in his live-action directorial debut) from a screenplay...
    70 KB (5,700 words) - 05:58, 14 July 2024
  • This is a list of the IP protocol numbers found in the field Protocol of the IPv4 header and the Next Header field of the IPv6 header. It is an identifier...
    20 KB (120 words) - 12:34, 6 June 2024
  • Thumbnail for Convention on Certain Conventional Weapons
    some of the five protocols, with two being the minimum required to be considered a party. The convention has five protocols: Protocol I restricts weapons...
    22 KB (1,723 words) - 11:43, 29 October 2023
  • Indiscriminate attacks are prohibited both by the Geneva Conventions Additional Protocol I (1977) and by customary international humanitarian law. They constitute...
    44 KB (5,057 words) - 12:36, 13 July 2024
  • coherency protocols for cache memory are listed here. For simplicity, all "miss" Read and Write status transactions which obviously come from state "I" (or...
    61 KB (7,279 words) - 06:17, 1 July 2024
  • Thumbnail for HTTP
    HTTP (redirect from Http protocol)
    HTTP (Hypertext Transfer Protocol) is an application layer protocol in the Internet protocol suite model for distributed, collaborative, hypermedia information...
    61 KB (7,807 words) - 13:20, 15 July 2024
  • Thumbnail for Geneva Conventions
    international humanitarian laws consisting of four treaties and three additional protocols that establish international legal standards for humanitarian treatment...
    59 KB (6,724 words) - 02:36, 1 July 2024
  • Thumbnail for Law of war
    Injurious or to Have Indiscriminate Effects (CCW) 1980 Protocol I on Non-Detectable Fragments 1980 Protocol II on Prohibitions or Restrictions on the Use of...
    46 KB (5,808 words) - 17:15, 19 June 2024
  • Thumbnail for Protocol II
    Protocol II is a 1977 amendment protocol to the Geneva Conventions relating to the protection of victims of non-international armed conflicts. It defines...
    20 KB (645 words) - 18:19, 27 April 2024
  • 1977 Protocol I Additional to the Geneva Conventions of 12 August 1949, which states: Wikisource has original text related to this article: Protocol I of...
    10 KB (1,394 words) - 03:23, 3 July 2024
  • Thumbnail for Kyoto Protocol
    The Kyoto Protocol (Japanese: 京都議定書, Hepburn: Kyōto Giteisho) was an international treaty which extended the 1992 United Nations Framework Convention on...
    154 KB (13,694 words) - 02:58, 16 July 2024
  • Thumbnail for Protected persons
    rights and fundamental guarantees are granted by the 1977 Additional Protocols I and II to the persons not covered by the 1949 Geneva Conventions, independently...
    26 KB (3,422 words) - 04:48, 19 May 2024
  • Thumbnail for War crime
    Two Additional Protocols were adopted in 1977 with the third one added in 2005, completing and updating the Geneva Conventions: Protocol I (1977) relating...
    56 KB (5,787 words) - 02:00, 13 July 2024
  • The Secure Shell Protocol (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network. Its most notable...
    38 KB (4,271 words) - 22:54, 10 July 2024
  • Thumbnail for Combatant
    the definition of "combatant" is found in Article 43 (2) of Additional Protocol I to the 1949 Geneva Conventions: "Members of the armed forces of a Party...
    13 KB (1,642 words) - 09:45, 16 December 2023
  • Thumbnail for Protocol III
    Protocol III is a 2005 amendment protocol to the Geneva Conventions relating to the Adoption of an Additional Distinctive Emblem. Under the protocol, the...
    17 KB (1,049 words) - 18:19, 27 April 2024
  • Thumbnail for Surrender (military)
    surrender is a type of perfidy in the context of war. It is a war crime under Protocol I of the Geneva Convention. False surrenders are usually used to draw the...
    10 KB (1,088 words) - 22:36, 14 June 2024
  • legitimate military target. The use of human shields is forbidden by Protocol I of the Geneva Conventions. It is also a specific intent war crime as codified...
    23 KB (2,612 words) - 00:20, 16 July 2024
  • Thumbnail for Non-combatant
    protected because of their specific duties (as currently described in Protocol I of the Geneva Conventions, adopted in June 1977); combatants who are placed...
    19 KB (2,126 words) - 21:50, 15 May 2024
  • In computer networks, a tunneling protocol is a communication protocol which allows for the movement of data from one network to another. It can, for example...
    15 KB (1,910 words) - 15:07, 15 June 2024
  • A communication protocol is a system of rules that allows two or more entities of a communications system to transmit information via any variation of...
    65 KB (8,217 words) - 02:23, 22 June 2024
  • protocol for computer networks. It evolved from the earlier RADIUS protocol. It belongs to the application layer protocols in the Internet protocol suite...
    30 KB (1,777 words) - 01:03, 29 May 2024
  • Area. Protocol I has been ratified only by the United States; it entered into force for the U.S. on 28 February 1992. Ratification of Protocol II allows...
    5 KB (488 words) - 04:19, 26 November 2023
  • conflict under Additional Protocol I to the 1949 Geneva Conventions. However, firing on airborne forces who are descending by parachute (i.e. paratroopers) is...
    49 KB (7,091 words) - 18:21, 18 January 2024
  • states enshrined the right to protection of property in Article 1 of Protocol I to the ECHR as the "right to peaceful enjoyment of possessions", where...
    29 KB (3,864 words) - 14:51, 14 May 2024
  • Thumbnail for Hannibal Directive
    romanized: Nóhal Khanibaál), also translated as Hannibal Procedure or Hannibal Protocol, is the name of a controversial procedure used by Israeli Defense Forces...
    59 KB (6,980 words) - 19:02, 16 July 2024
  • The Session Initiation Protocol (SIP) is a signaling protocol used for initiating, maintaining, and terminating communication sessions that include voice...
    29 KB (3,365 words) - 16:00, 24 June 2024
  • Thumbnail for Carpet bombing
    civilians has been considered a war crime since 1977, through Article 51 of Protocol I of the Geneva Conventions. The term obliteration bombing is sometimes...
    28 KB (3,339 words) - 14:10, 7 July 2024