LEADER 03155oam 2200745I 450 001 9910787122903321 005 20231121101953.0 010 $a1-138-37999-9 010 $a1-317-17692-8 010 $a1-317-17691-X 010 $a1-315-56847-0 010 $a1-4724-3578-8 024 7 $a10.4324/9781315568478 035 $a(CKB)3710000000280600 035 $a(EBL)1843667 035 $a(OCoLC)896796462 035 $a(SSID)ssj0001382329 035 $a(PQKBManifestationID)11994343 035 $a(PQKBTitleCode)TC0001382329 035 $a(PQKBWorkID)11439034 035 $a(PQKB)11684003 035 $a(MiAaPQ)EBC1843667 035 $a(MiAaPQ)EBC5294094 035 $a(Au-PeEL)EBL1843667 035 $a(CaPaEBR)ebr11011399 035 $a(CaONFJC)MIL913149 035 $a(OCoLC)950005873 035 $a(Au-PeEL)EBL5294094 035 $a(CaONFJC)MIL718524 035 $a(OCoLC)895258095 035 $a(EXLCZ)993710000000280600 100 $a20180706e20162015 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aAutobiographical writing by early modern Hispanic women /$fElizabeth Teresa Howe 210 1$aLondon ;$aNew York :$cRoutledge,$d2016. 215 $a1 online resource (321 p.) 225 1 $aWomen and gender in the early modern world 300 $aFirst published 2015 by Ashgate Publishing. 311 $a1-322-87242-2 311 $a1-4724-3577-X 320 $aIncludes bibliographical references and index. 327 $aTelling li(v)es: women and autobiography -- Court and convent: Leonor Lo?pez de Co?rdoba and Sor Teresa de Cartagena -- Carmelite and Cloister: Santa Teresa de Jesu?s -- In the footsteps of Santa Teresa: Carmelite nuns and the reform(er) -- Soldier in New Spain: Catalina de Erauso -- Defending her life: Sor Juana Ine?s de la Cruz. 330 $aWomen's life writing in general has too often been ignored, dismissed, or relegated to a separate category in those few studies of the genre that include it. The present work addresses these issues and offers a countervailing argument that focuses on the contributions of women writers to the study of autobiography in Spanish during the early modern period, both in Spain and in Mexico. 410 0$aWomen and gender in the early modern world. 606 $aSpanish literature$yClassical period, 1500-1700$xHistory and criticism 606 $aSpanish literature$xWomen authors$xHistory and criticism 606 $aAutobiography$xAuthorship 606 $aSpanish literature$zMexico$xHistory and criticism 615 0$aSpanish literature$xHistory and criticism. 615 0$aSpanish literature$xWomen authors$xHistory and criticism. 615 0$aAutobiography$xAuthorship. 615 0$aSpanish literature$xHistory and criticism. 676 $a860.9/92870903 700 $aHowe$b Elizabeth Teresa$f1945-,$0862167 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910787122903321 996 $aAutobiographical writing by early modern Hispanic women$93790856 997 $aUNINA LEADER 05020nam 22007095 450 001 9910483965003321 005 20251226203644.0 010 $a3-319-15943-7 024 7 $a10.1007/978-3-319-15943-0 035 $a(CKB)3710000000379618 035 $a(SSID)ssj0001465554 035 $a(PQKBManifestationID)11821048 035 $a(PQKBTitleCode)TC0001465554 035 $a(PQKBWorkID)11472154 035 $a(PQKB)10398534 035 $a(DE-He213)978-3-319-15943-0 035 $a(MiAaPQ)EBC6285322 035 $a(MiAaPQ)EBC5578257 035 $a(Au-PeEL)EBL5578257 035 $a(OCoLC)905851446 035 $a(PPN)184894794 035 $a(EXLCZ)993710000000379618 100 $a20150316d2015 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aInformation Security and Cryptology - ICISC 2014 $e17th International Conference, Seoul, South Korea, December 3-5, 2014, Revised Selected Papers /$fedited by Jooyoung Lee, Jongsung Kim 205 $a1st ed. 2015. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2015. 215 $a1 online resource (XIII, 448 p. 83 illus.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v8949 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-319-15942-9 327 $aGeneral Bounds for Small Inverse Problems and Its Applications to Multi-Prime RSA -- On the Security of Distributed Multiprime RSA -- Formal Modeling of Random Oracle Programmability and Verification of Signature Unforgeability Using Task-PIOAs -- Algebraic Cryptanalysis of Yasuda, Takagi and Sakurai?s Signature Scheme -- Discrete Logarithms for Torsion Points on Elliptic Curve of Embedding Degree 1 -- Efficient Key Dependent Message Security Amplification Against Chosen Ciphertext Attacks -- A Fast Phase-Based Enumeration Algorithm for SVP Challenge Through y-Sparse Representations of Short Lattice Vectors -- How Much Can Complexity of Linear Cryptanalysis Be Reduced? -- Format-Preserving Encryption Algorithms Using Families of Tweakable Blockciphers -- Bicliques with Minimal Data and Time Complexity for AES -- Fault Analysis on SIMON Family of Lightweight Block Ciphers -- A Clustering Approach for Privacy-Preserving in Social Networks -- Securely Solving Classical Network Flow Problems -- Remote IP Protection Using Timing Channels -- Detecting Camouflaged Applications on Mobile Application Markets -- WrapDroid: Flexible and Fine-Grained Scheme Towards Regulating Behaviors of Android Apps -- A Collision Attack on a Double-Block-Length Compression Function Instantiated with Round-Reduced AES-256 -- LSH: A New Fast Secure Hash Function Family -- Lossless Data Hiding for Binary Document Images Using n-Pairs Pattern -- Montgomery Modular Multiplication on ARM-NEON Revisited -- A Fair and Efficient Mutual Private Set Intersection Protocol from a Two-Way Oblivious Pseudorandom Function -- Security Analysis of Polynomial Interpolation-Based Distributed Oblivious Transfer Protocols -- Compact and Efficient UC Commitments Under Atomic-Exchanges -- Issuer-Free Adaptive Oblivious Transfer with Access Policy -- Memory Address Side-Channel Analysis on Exponentiation -- Mutant Differential Fault Analysis of Trivium MDFA. 330 $aThis book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Information Security and Cryptology, ICISC 2014, held in Seoul, South Korea in December 2014. The 27 revised full papers presented were carefully selected from 91 submissions during two rounds of reviewing. The papers provide the latest results in research, development and applications in the field of information security and cryptology. They are organized in topical sections on RSA security, digital signature, public key cryptography, block ciphers, network security, mobile security, hash functions, information hiding and efficiency, cryptographic protocol, and side-channel attacks. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v8949 606 $aData protection 606 $aCryptography 606 $aData encryption (Computer science) 606 $aElectronic data processing$xManagement 606 $aData and Information Security 606 $aCryptology 606 $aIT Operations 615 0$aData protection. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aElectronic data processing$xManagement. 615 14$aData and Information Security. 615 24$aCryptology. 615 24$aIT Operations. 676 $a005.8 702 $aLee$b Jooyoung$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aKim$b Jongsung$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483965003321 996 $aInformation Security and Cryptology - ICISC 2014$92596527 997 $aUNINA