|
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910822428903321 |
|
|
Autore |
D'Emilio John |
|
|
Titolo |
In a new century : essays on queer history, politics, and community life / / John D'Emilio |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Madison, Wisconsin : , : The University of Wisconsin Press, , 2014 |
|
©2014 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (282 p.) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Gay liberation movement - United States - History |
Gay rights - United States - History |
Gay activists - United States - History |
Gay people - United States - Social conditions |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references. |
|
|
|
|
|
|
Nota di contenuto |
|
""Contents""; ""Introduction: Writing History, Making Change""; ""Part I: Strategizing Change""; ""1. The State of Our Movements: Some Reflections""; ""2. Beyond Queer Nationalism: Changing Strategies for Changing Times""; ""3. The Gay Movement and the Left""; ""4. Listening to Rustin: Lessons from an Agitator for Justice""; ""Part II: Doing History""; ""5. Why I Write""; ""6. Putting Sex into History and History into Sex""; ""7. History,Social Movements, and Community Organizing""; ""8. If I Knew Then: Doing Oral History""; ""9. Finding History, Creating Community"" |
""10. The Power of Community History""""Part III: Local Stories""; ""11. Who Wears the Pants?""; ""12. The Lavender Scare in Chicago""; ""13. Pulp Madness""; ""14. Valerie Taylor: A Woman for All Generations""; ""15. In the News""; ""16. Gay Power!""; ""17. Risky Business""; ""18. Let's Dance!""; ""19. Writing for Freedom""; ""20. Dade County, USA""; ""21. Every Kick Is a Boost""; ""Part IV: History's Lessons""; ""22. Remembering Bayard Rustin""; ""23. The 1979 March on Washington: Its Place in History""; ""24. Some Lessons from Lawrence"" |
""25. Rethinking Queer History: Or, "Richard Nixon, Gay Liberationist"?""""26. The Campaign for Marriage Equality: A Dissenting |
|
|
|
|
|
|
|
|
|
|
|
|
|
View""; ""Acknowledgments""; ""Notes"" |
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910483696003321 |
|
|
Titolo |
Security Protocols : 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers / / edited by Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005 |
|
|
|
|
|
|
|
|
|
Edizione |
[1st ed. 2005.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (X, 354 p.) |
|
|
|
|
|
|
Collana |
|
Security and Cryptology ; ; 3364 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Data encryption (Computer science) |
Computer communication systems |
Algorithms |
Management information systems |
Computer science |
Computers and civilization |
Operating systems (Computers) |
Cryptology |
Computer Communication Networks |
Algorithm Analysis and Problem Complexity |
Management of Computing and Information Systems |
Computers and Society |
Operating Systems |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
"11th in our series of International Workshops on Security Protocols"--Pref. |
|
|
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Where Have All the Protocols Gone? -- A Protocol’s Life After Attacks... -- A Protocol’s Life After Attacks... -- Towards Flexible Credential Negotiation Protocols -- Towards Flexible Credential Negotiation Protocols -- Man-in-the-Middle in Tunnelled Authentication Protocols -- Man-in-the-Middle in Tunnelled Authentication Protocols -- |
|
|
|
|
|
|
|
|
|
|
|
Towards a Framework for Autonomic Security Protocols -- Towards a Framework for Autonomic Security Protocols -- Client v. Server Side Protocols, Interfaces and Storage -- Client v. Server Side Protocols, Interfaces and Storage -- Guaranteeing Access in Spite of Distributed Service-Flooding Attacks -- Guaranteeing Access in Spite of Distributed Service-Flooding Attacks -- Protocol Codesign -- Protocol Codesign -- Enforcing Security Policies for Distributed Objects Applications -- Enforcing Security Policies for Distributed Objects Applications -- Regular SPKI -- Regular SPKI -- Federated Identity-Management Protocols -- Federated Identity-Management Protocols -- Enforcing the Unenforceable -- Is the Verification Problem for Cryptographic Protocols Solved? -- Secure Sessions from Weak Secrets -- Secure Sessions from Weak Secrets -- Panel Session: Is Protocol Modelling Finished? -- WAR: Wireless Anonymous Routing -- WAR: Wireless Anonymous Routing -- Limitations of IPsec Policy Mechanisms -- Limitations of IPsec Policy Mechanisms -- Deniable Authenticated Key Establishment for Internet Protocols -- Deniable Authenticated Key Establishment for Internet Protocols -- Protocols for Supporting a Public Key Infrastructure in Ad Hoc Networks -- Protocols for Supporting a Public Key Infrastructure in Ad Hoc Networks -- What We Can Learn from API Security -- Addressing New Challenges by Building Security Protocols Around Graphs -- From Security Protocols to Systems Security -- From Security Protocols to Systems Security -- Biometrics to Enhance Smartcard Security -- Biometrics to Enhance Smartcard Security -- Blind Publication: A Copyright Library without Publication or Trust -- Blind Publication: A Copyright Library Without Publication or Trust. |
|
|
|
|
|
|
Sommario/riassunto |
|
Greetings. These are the proceedings of the 11th in our series of International Workshops on Security Protocols. Our theme this time was “Where have all the Protocols gone?” Once upon a time security protocols lived mainly in the network and transport layers. Now they increasingly hide in applications, or in specialised hardware. Does this trend lead to better security architectures, or is it an indication that we are addressing the wrong problems? The intention of the workshops is to provide a forum where incompletely workedoutideascanstimulatediscussion,openupnewlinesofinvestigation,and suggestmoreproblems. The positionpaperspublished herehavebeen revisedby the authors in the light of their participation in the workshop. In addition, we publish edited transcripts of some of the discussions, to give our readers access to some of the roads ahead not (yet) taken. We hope that these revised position papers and edited transcripts will give you at least one interesting idea of your own to explore. Please do write and tell us what it was. Our purpose in publishing these proceedings is to produce a conceptual map which will be of enduring interest, rather than to be merely topical. This is perhaps just as well, given the delay in production. This year we moved to new computer-based recording technology, and of course it failed completely. |
|
|
|
|
|
|
|
| |