LEADER 03062nam 22007453u 450 001 9910462650003321 005 20210114024140.0 010 $a1-4384-0320-8 035 $a(CKB)2670000000233833 035 $a(EBL)3408140 035 $a(SSID)ssj0000219483 035 $a(PQKBManifestationID)11220315 035 $a(PQKBTitleCode)TC0000219483 035 $a(PQKBWorkID)10228918 035 $a(PQKB)11696875 035 $a(MiAaPQ)EBC3408140 035 $a(EXLCZ)992670000000233833 100 $a20151005d1993|||| u|| | 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aPeople Apart$b[electronic resource] $eChosenness and Ritual in Jewish Philosophical Thought 210 $aAlbany $cState University of New York Press$d1993 215 $a1 online resource (280 p.) 225 1 $aSUNY Series in Jewish Philosophy 300 $aDescription based upon print version of record. 311 $a0-7914-1631-3 327 $a""Front Matter""; ""Front Cover""; ""Half Title Page""; ""Title Page""; ""Copyright Page""; ""Table Of Contents""; ""Contents""; ""INTRODUCTION""; ""Chosenness""; ""The Election of Israel: Outline of a Philosophical Analysis""; ""Chosenness, Not Chauvinism: Maimonides on the Chosen People""; ""Response to Menachem Kell""; ""Reply to Norbert Samuelson""; ""Judaism and Chosenness: On Some Controversial Aspects from Spinoza to Contemporary Jewish Thought""; ""Ritual""; ""Rational Law/Ritual Law""; ""Mitzvah as Metaphor""; ""Jewish Ritual and the Experience of ""Rootedness"""" 327 $a""The Concept of Worship in Judaism""""Back Matter""; ""CONTRIBUTORS""; ""INDEX""; ""Back Cover"" 410 0$aSUNY Series in Jewish Philosophy 606 $aJewish law -- Philosophy 606 $aJewish philosophy 606 $aJews -- Election, Doctrine of -- History of doctrines 606 $aJudaism -- Customs and practices -- Philosophy 606 $aJews$xElection, Doctrine of$xHistory of doctrines 606 $aJewish law$xPhilosophy 606 $aJudaism$xCustoms and practices$xPhilosophy 606 $aJewish philosophy 606 $aJudaism$2HILCC 606 $aReligion$2HILCC 606 $aPhilosophy & Religion$2HILCC 608 $aElectronic books. 615 4$aJewish law -- Philosophy. 615 4$aJewish philosophy. 615 4$aJews -- Election, Doctrine of -- History of doctrines. 615 4$aJudaism -- Customs and practices -- Philosophy. 615 0$aJews$xElection, Doctrine of$xHistory of doctrines 615 0$aJewish law$xPhilosophy 615 0$aJudaism$xCustoms and practices$xPhilosophy 615 0$aJewish philosophy 615 7$aJudaism 615 7$aReligion 615 7$aPhilosophy & Religion 676 $a296.3/11 700 $aFrank$b Daniel H$01051413 702 $aFrank$b Daniel H 801 0$bAU-PeEL 801 1$bAU-PeEL 801 2$bAU-PeEL 906 $aBOOK 912 $a9910462650003321 996 $aPeople Apart$92487744 997 $aUNINA LEADER 05152nam 22008175 450 001 9910739463403321 005 20251226202447.0 010 $a3-642-36139-0 024 7 $a10.1007/978-3-642-36140-1 035 $a(CKB)3400000000125721 035 $a(SSID)ssj0000880060 035 $a(PQKBManifestationID)11546669 035 $a(PQKBTitleCode)TC0000880060 035 $a(PQKBWorkID)10894990 035 $a(PQKB)11538322 035 $a(DE-He213)978-3-642-36140-1 035 $a(MiAaPQ)EBC3093264 035 $a(PPN)168329824 035 $a(EXLCZ)993400000000125721 100 $a20130129d2013 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aRadio Frequency Identification: Security and Privacy Issues $e8th International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2-3, 2012, Revised Selected Papers /$fedited by Jaap-Henk Hoepman, Ingrid Verbauwhede 205 $a1st ed. 2013. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2013. 215 $a1 online resource (X, 181 p. 37 illus.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v7739 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-642-36140-4 327 $aOn the Security of Tan et al. Serverless RFID Authentication and Search Protocols -- Yet Another Ultralightweight Authentication Protocol That Is Broken.-  Improved Anonymity for Key-Trees- Hidden Bits Approach for Authentication in RFID Systems.- Designated Attribute-Based Proofs for RFID Applications.- T-Match: Privacy-Preserving Item Matching for Storage-Only RFID Tags.- Private Yoking Proofs: Attacks, Models and New Provable Constructions.- Privacy Preserving Payments on Computational RFID Devices with Application in Intelligent Transportation Systems.- Weakening Passports through Bad Implementations.- Never Trust a Bunny.- On Using Instruction-Set Extensions for Minimizing the Hardware-Implementation Costs of Symmetric-Key Algorithms on a Low-Resource Microcontroller.- DRV-Fingerprinting: Using Data Retention Voltage of SRAM Cells for Chip Identification. et al. Serverless RFID Authentication and Search Protocols -- Yet Another Ultralightweight Authentication Protocol That Is Broken.-  Improved Anonymity for Key-Trees- Hidden Bits Approach for Authentication in RFID Systems.- Designated Attribute-Based Proofs for RFID Applications.- T-Match: Privacy-Preserving Item Matching for Storage-Only RFID Tags.- Private Yoking Proofs: Attacks, Models and New Provable Constructions.- Privacy Preserving Payments on Computational RFID Devices with Application in Intelligent Transportation Systems.- Weakening Passports through Bad Implementations.- Never Trust a Bunny.- On Using Instruction-Set Extensions for Minimizing the Hardware-Implementation Costs of Symmetric-Key Algorithms on a Low-Resource Microcontroller.- DRV-Fingerprinting: Using Data Retention Voltage of SRAM Cells for Chip Identification. 330 $aThis book constitutes the thoroughly refereed post-worksop proceedings of the 8th International Workshop Radio Frequency Identification: Security and Privacy Issues, RFIDSec 2012, held in Nijmegen, The Netherlands, in July 2012. The 12 revised full papers presented were carefully reviewed and selected from 29 submissions for inclusion in the book. The papers focus on approaches to solve security and data protection issues in advanced contactless technologies. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v7739 606 $aData protection 606 $aCryptography 606 $aData encryption (Computer science) 606 $aInformation technology$xManagement 606 $aElectronic commerce 606 $aComputer networks 606 $aComputers, Special purpose 606 $aData and Information Security 606 $aCryptology 606 $aComputer Application in Administrative Data Processing 606 $ae-Commerce and e-Business 606 $aComputer Communication Networks 606 $aSpecial Purpose and Application-Based Systems 615 0$aData protection. 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 0$aInformation technology$xManagement. 615 0$aElectronic commerce. 615 0$aComputer networks. 615 0$aComputers, Special purpose. 615 14$aData and Information Security. 615 24$aCryptology. 615 24$aComputer Application in Administrative Data Processing. 615 24$ae-Commerce and e-Business. 615 24$aComputer Communication Networks. 615 24$aSpecial Purpose and Application-Based Systems. 676 $a621.384192 702 $aHoepman$b Jaap-Henk$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aVerbauwhede$b Ingrid$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910739463403321 996 $aRadio Frequency Identification: Security and Privacy Issues$92555846 997 $aUNINA