LEADER 04313nam 22006735 450 001 9910484404903321 005 20230810172653.0 010 $a9783030709068 010 $a303070906X 024 7 $a10.1007/978-3-030-70906-8 035 $a(CKB)5470000000556791 035 $a(MiAaPQ)EBC6614568 035 $a(Au-PeEL)EBL6614568 035 $a(OCoLC)1255225913 035 $a(DE-He213)978-3-030-70906-8 035 $a(EXLCZ)995470000000556791 100 $a20210512d2021 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCrime and Compensation in North Africa $eA Social Anthropology Essay /$fby Yazid Ben Hounet 205 $a1st ed. 2021. 210 1$aCham :$cSpringer International Publishing :$cImprint: Palgrave Macmillan,$d2021. 215 $a1 online resource (149 pages) 311 08$a9783030709051 311 08$a3030709051 327 $a1. Introduction -- 2. What reconciling means -- 3. On compensation -- 4. Compensation in North Africa -- 5. Punishing crime -- 6. Repairing crime -- 7. States and mediators: towards a new reparation paradigm -- 8. Conclusion. . 330 $aAs the 21st century began, Algeria, Morocco, and North Sudan launched some much-publicised "reconciliation" policies, or, in the case of North Sudan, "pacification" policies. Algeria, following its Clemency policy (1995) and Civil Concord Law (1999), held a referendum in 2005 and subsequently implemented the measures of its Charter for Peace and National Reconciliation. This charter is Algeria's latest policy aimed at settling the accounts of a murderous decade (1990s) marked by opposition between the state and armed Islamic groups. In Morocco, an arbitration committee was set up in 1999, followed by the Equity and Reconciliation Commission in 2004, to turn the page on the "Years of Lead"-a period during the rule of King Hassan II when state crimes such as torture, imprisonment, and murder were committed. Finally, in Sudan (North Sudan since 2011), peace negotiations were held in 1989 and a peace process has been ongoing since 2005, with an aim to resolve violent conflicts and war crimes that are shaking Darfur and North Kordofan. At the centre of all these reconciliation and pacification mechanisms lies a practice that has been scarcely studied: (monetary) compensation for the crimes committed. Shedding light on this under-studied topic from the North African field, this volume investigates: What meanings can compensation have when it is aimed at repairing crimes? Is it necessary, sufficient, or admissible? How can it be implemented and accepted by the victims themselves and by society? These questions about compensation lead the reader through discussions on the nature of crime, punishment, reparation, reconciliation, and the way these concepts were and are now understood in these three North African countries. Yazid Ben Hounet is a social anthropologist and research fellow at the Centre National de Recherche Scientifique and member of the Laboratoire d'Anthropologie Sociale (CNRS, Collège de France, EHESS). His research concerns the intersection of legal and political anthropology, particularly in Muslim contexts. 606 $aPolitical anthropology 606 $aEconomic anthropology 606 $aEthnology 606 $aAfrica$xPolitics and government 606 $aAfrica, North$xHistory 606 $aPolitical and Economic Anthropology 606 $aSociocultural Anthropology 606 $aAfrican Politics 606 $aHistory of North Africa 615 0$aPolitical anthropology. 615 0$aEconomic anthropology. 615 0$aEthnology. 615 0$aAfrica$xPolitics and government. 615 0$aAfrica, North$xHistory. 615 14$aPolitical and Economic Anthropology. 615 24$aSociocultural Anthropology. 615 24$aAfrican Politics. 615 24$aHistory of North Africa. 676 $a364.2 676 $a364.680961 700 $aBen Hounet$b Yazid$0988276 702 $aComaroff$b John 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484404903321 996 $aCrime and compensation in North Africa$92581581 997 $aUNINA LEADER 03948nam 22011893a 450 001 9910346673703321 005 20250203235431.0 010 $a9783039210015 010 $a3039210017 024 8 $a10.3390/books978-3-03921-001-5 035 $a(CKB)4920000000094930 035 $a(oapen)https://directory.doabooks.org/handle/20.500.12854/59342 035 $a(ScCtBLL)812dddf7-ea06-422c-98bc-de779c9b3b06 035 $a(OCoLC)1117898373 035 $a(oapen)doab59342 035 $a(EXLCZ)994920000000094930 100 $a20250203i20192019 uu 101 0 $aeng 135 $aurmn|---annan 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aSide Channel Attacks$fSeokhie Hong 210 $cMDPI - Multidisciplinary Digital Publishing Institute$d2019 210 1$aBasel, Switzerland :$cMDPI,$d2019. 215 $a1 electronic resource (258 p.) 311 08$a9783039210008 311 08$a3039210009 330 $aThis Special Issue provides an opportunity for researchers in the area of side-channel attacks (SCAs) to highlight the most recent exciting technologies. The research papers published in this Special Issue represent recent progress in the field, including research on power analysis attacks, cache-based timing attacks, system-level countermeasures, and so on. 606 $aHistory of engineering and technology$2bicssc 610 $abinary Huff curve 610 $aFPGA 610 $apost quantum cryptography 610 $adata loss 610 $aside-channel cache attacks 610 $arsa cryptosystem 610 $afirst-order analysis 610 $achaotic circuit 610 $aintegrity 610 $aad libraries 610 $apower-analysis attack 610 $asingle trace analysis 610 $aside-channel authentication 610 $aprovable security 610 $aad lib 610 $acache misses 610 $acache side-channel attack 610 $aleakage model 610 $aNTRU 610 $agraph 610 $aAES 610 $ahardware security 610 $arecovery of secret exponent by triangular trace analysis 610 $aside-channel attacks 610 $ainformation leakage 610 $adata outsourcing 610 $aCPLD 610 $ascatter-gather implementation 610 $amodular exponentiation 610 $alattice-based cryptography 610 $aelliptic curve cryptography 610 $aGaussian sampling 610 $apost-quantum cryptography 610 $areliability 610 $aunified point addition 610 $aad networks 610 $agraph similarity 610 $amobile ads 610 $aphysically unclonable function 610 $atweakable block cipher 610 $aMerkle (hash) tree 610 $amachine-learning classification 610 $aside channel attack 610 $aonline authentication 610 $aside channel analysis 610 $afinancial IC card 610 $aside-channel attack 610 $are-keying 610 $acloud computing 610 $acryptographic keys 610 $achaos theory 610 $ahorizontal collision correlation analysis 610 $acountermeasure 610 $aembedded system security 610 $acache attack 610 $asingle-trace attack 610 $asoftware development kit (SDK) 610 $aCDT sampling 610 $akey bit-dependent attack 610 $aside-channel analysis 610 $asecond-order analysis 610 $aconstant-time cryptographic algorithm 610 $aandroid package (APK) 610 $achallenge-response authentication 615 7$aHistory of engineering and technology 700 $aHong$b Seokhie$01329303 801 0$bScCtBLL 801 1$bScCtBLL 906 $aBOOK 912 $a9910346673703321 996 $aSide Channel Attacks$93039404 997 $aUNINA