LEADER 04116nam 2200745 a 450 001 9910462339303321 005 20200520144314.0 010 $a0-674-06110-1 024 7 $a10.4159/harvard.9780674061101 035 $a(CKB)2670000000233591 035 $a(EBL)3301116 035 $a(SSID)ssj0000721599 035 $a(PQKBManifestationID)11384242 035 $a(PQKBTitleCode)TC0000721599 035 $a(PQKBWorkID)10693905 035 $a(PQKB)11558423 035 $a(MiAaPQ)EBC3301116 035 $a(DE-B1597)178240 035 $a(OCoLC)804851762 035 $a(OCoLC)840446555 035 $a(DE-B1597)9780674061101 035 $a(Au-PeEL)EBL3301116 035 $a(CaPaEBR)ebr10583974 035 $a(OCoLC)923119506 035 $a(EXLCZ)992670000000233591 100 $a20101123d2011 uy 0 101 0 $aeng 135 $aurcn||||||||| 181 $ctxt 182 $cc 183 $acr 200 10$aReasoning from race$b[electronic resource] $efeminism, law, and the civil rights revolution /$fSerena Mayeri 210 $aCambridge, Mass. $cHarvard University Press$d2011 215 $a1 online resource (382 p.) 300 $aDescription based upon print version of record. 311 $a0-674-04759-1 320 $aIncludes bibliographical references and index. 327 $aThe rebirth of race-sex analogies -- "Women and minorities" -- Recession, reaction, retrenchment -- Reasoning from sex -- Lost intersections -- The late civil rights era. 330 $aInformed in 1944 that she was "not of the sex" entitled to be admitted to Harvard Law School, African American activist Pauli Murray confronted the injustice she called "Jane Crow." In the 1960's and 1970's, the analogies between sex and race discrimination pioneered by Murray became potent weapons in the battle for women's rights, as feminists borrowed rhetoric and legal arguments from the civil rights movement. Serena Mayeri's Reasoning from Race is the first book to explore the development and consequences of this key feminist strategy. Mayeri uncovers the history of an often misunderstood connection at the heart of American antidiscrimination law. Her study details how a tumultuous political and legal climate transformed the links between race and sex equality, civil rights and feminism. Battles over employment discrimination, school segregation, reproductive freedom, affirmative action, and constitutional change reveal the promise and peril of reasoning from race-and offer a vivid picture of Pauli Murray, Ruth Bader Ginsburg, and others who defined feminists' agenda. Looking beneath the surface of Supreme Court opinions to the deliberations of feminist advocates, their opponents, and the legal decision makers who heard-or chose not to hear-their claims, Reasoning from Race showcases previously hidden struggles that continue to shape the scope and meaning of equality under the law. 606 $aSex discrimination against women$xLaw and legislation$zUnited States$xHistory$y20th century 606 $aWomen's rights$zUnited States$xPhilosophy 606 $aFeminist jurisprudence$zUnited States 606 $aWomen's rights$zUnited States$xHistory$y20th century 606 $aCivil rights movements$zUnited States 606 $aWomen$xLegal status, laws, etc$zUnited States$xHistory$y20th century 606 $aConstitutional law$zUnited States$xMethodology 606 $aFeminist theory$zUnited States 608 $aElectronic books. 615 0$aSex discrimination against women$xLaw and legislation$xHistory 615 0$aWomen's rights$xPhilosophy. 615 0$aFeminist jurisprudence 615 0$aWomen's rights$xHistory 615 0$aCivil rights movements 615 0$aWomen$xLegal status, laws, etc.$xHistory 615 0$aConstitutional law$xMethodology. 615 0$aFeminist theory 676 $a342.7308/78 700 $aMayeri$b Serena$01012975 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910462339303321 996 $aReasoning from race$92353899 997 $aUNINA LEADER 06825nam 22008535 450 001 996466365603316 005 20200704015644.0 010 $a3-642-10433-9 024 7 $a10.1007/978-3-642-10433-6 035 $a(CKB)1000000000804421 035 $a(SSID)ssj0000355476 035 $a(PQKBManifestationID)11261332 035 $a(PQKBTitleCode)TC0000355476 035 $a(PQKBWorkID)10340745 035 $a(PQKB)11504500 035 $a(DE-He213)978-3-642-10433-6 035 $a(MiAaPQ)EBC3064855 035 $a(PPN)13996276X 035 $a(EXLCZ)991000000000804421 100 $a20100301d2009 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aCryptology and Network Security$b[electronic resource] $e8th International Conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009, Proceedings /$fedited by Juan A. Garay, Akira Otsuka 205 $a1st ed. 2009. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2009. 215 $a1 online resource (XIV, 538 p.) 225 1 $aSecurity and Cryptology ;$v5888 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-10432-0 327 $aCryptographic Protocol and Schemes I -- Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima -- Multi Party Distributed Private Matching, Set Disjointness and Cardinality of Set Intersection with Information Theoretic Security -- On Cryptographic Schemes Based on Discrete Logarithms and Factoring -- Invited Talk 1 -- Asymptotically Optimal and Private Statistical Estimation -- Cryptanalysis I -- Linear (Hull) and Algebraic Cryptanalysis of the Block Cipher PRESENT -- Saturation Attack on the Block Cipher HIGHT -- Extensions of the Cube Attack Based on Low Degree Annihilators -- An Analysis of the Compact XSL Attack on BES and Embedded SMS4 -- Wireless and Sensor Network Security I -- RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks -- Anonymizer-Enabled Security and Privacy for RFID -- Blink ?Em All: Scalable, User-Friendly and Secure Initialization of Wireless Sensor Nodes -- Network Security -- DepenDNS: Dependable Mechanism against DNS Cache Poisoning -- Privacy and Anonymity -- Privacy-Preserving Relationship Path Discovery in Social Networks -- Verifying Anonymous Credential Systems in Applied Pi Calculus -- Transferable Constant-Size Fair E-Cash -- Functional and Searchable Encryption -- A Secure Channel Free Public Key Encryption with Keyword Search Scheme without Random Oracle -- Private-Key Hidden Vector Encryption with Key Confidentiality -- Invited Talk 2 -- Building Secure Networked Systems with Code Attestation -- Authentication -- HPAKE : Password Authentication Secure against Cross-Site User Impersonation -- An Efficient and Provably Secure Cross-Realm Client-to-Client Password-Authenticated Key Agreement Protocol with Smart Cards -- Ensuring Authentication of Digital Information Using Cryptographic Accumulators -- Block Cipher Design -- MIBS: A New Lightweight Block Cipher -- Cryptanalysis II -- Distinguishing and Second-Preimage Attacks on CBC-Like MACs -- Improving the Rainbow Attack by Reusing Colours -- Side Channel Cube Attack on PRESENT -- Algebraic Attack on the MQQ Public Key Cryptosystem -- Algebraic and Number-Theoretic Schemes -- Construction of Rotation Symmetric Boolean Functions with Maximum Algebraic Immunity -- Multi-core Implementation of the Tate Pairing over Supersingular Elliptic Curves -- On the Complexity of Computing Discrete Logarithms over Algebraic Tori -- Wireless and Sensor Network Security II -- On the Usability of Secure Association of Wireless Devices Based on Distance Bounding -- Short Hash-Based Signatures for Wireless Sensor Networks -- Invited Talk 3 -- Computing on Encrypted Data -- Cryptographic Protocol and Schemes II -- Fully Robust Tree-Diffie-Hellman Group Key Exchange -- Group Signatures with Verifier-Local Revocation and Backward Unlinkability in the Standard Model -- Relinkable Ring Signature. 330 $aThis book constitutes the refereed proceedings of the 8th International Conference on Cryptology and Network Security, CANS 2009, held in Kanazawa, Japan, in December 2009. The 32 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 109 submissions. The papers are organized in topical sections on cryptographic protocols and schemes; cryptanalysis; wireless and sensor security; network security; privacy and anonymity; functional and searchable encryption; authentication; block cipher design; and algebraic and number-theoretic schemes. 410 0$aSecurity and Cryptology ;$v5888 606 $aData encryption (Computer science) 606 $aComputer communication systems 606 $aNumber theory 606 $aCoding theory 606 $aInformation theory 606 $aMathematical logic 606 $aComputer science?Mathematics 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aNumber Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/M25001 606 $aCoding and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15041 606 $aMathematical Logic and Formal Languages$3https://scigraph.springernature.com/ontologies/product-market-codes/I16048 606 $aMathematics of Computing$3https://scigraph.springernature.com/ontologies/product-market-codes/I17001 608 $aKanazawa (2009)$2swd 608 $aKongress.$2swd 615 0$aData encryption (Computer science). 615 0$aComputer communication systems. 615 0$aNumber theory. 615 0$aCoding theory. 615 0$aInformation theory. 615 0$aMathematical logic. 615 0$aComputer science?Mathematics. 615 14$aCryptology. 615 24$aComputer Communication Networks. 615 24$aNumber Theory. 615 24$aCoding and Information Theory. 615 24$aMathematical Logic and Formal Languages. 615 24$aMathematics of Computing. 676 $a004n/a 686 $aDAT 461f$2stub 686 $aDAT 465f$2stub 686 $aSS 4800$2rvk 702 $aGaray$b Juan A$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aOtsuka$b Akira$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aInternational Conference on Cryptology and Network Security 906 $aBOOK 912 $a996466365603316 996 $aCryptology and Network Security$9772198 997 $aUNISA