LEADER 03373nam 22008535 450 001 9910969790203321 005 20220118020035.0 010 $a9786611369972 010 $a9781281369970 010 $a1281369977 010 $a9781403983350 010 $a1403983356 024 7 $a10.1057/9781403983350 035 $a(CKB)1000000000342671 035 $a(SSID)ssj0000134646 035 $a(PQKBManifestationID)11142017 035 $a(PQKBTitleCode)TC0000134646 035 $a(PQKBWorkID)10054686 035 $a(PQKB)10884829 035 $a(DE-He213)978-1-4039-8335-0 035 $a(MiAaPQ)EBC307729 035 $a(Au-PeEL)EBL307729 035 $a(CaPaEBR)ebr10150421 035 $a(CaONFJC)MIL136997 035 $a(OCoLC)567962711 035 $a(Perlego)3496776 035 $a(EXLCZ)991000000000342671 100 $a20151204d2006 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aDancing for Dollars and Paying for Love $eThe Relationships between Exotic Dancers and their Regulars /$fby D. Egan 205 $a1st ed. 2006. 210 1$aNew York :$cPalgrave Macmillan US :$cImprint: Palgrave Macmillan,$d2006. 215 $a1 online resource (192 p.) 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a9781403970459 311 08$a1403970459 311 08$a9781403970442 311 08$a1403970440 320 $aIncludes bibliographical references and index. 327 $aCover -- Contents -- Acknowledgments -- Preface -- Introduction: Dancing for Dollars and Paying for Love -- Chapter One: Mapping the Architecture of Exotic Dance -- Chapter Two: Subjectivity Under the Black Light -- Chapter Three: "Bad Nights," "Good Nights," and Feminist Possibilities -- Chapter Four: Money Men and Fantasy Girls -- Chapter Five: Looking For Love in All the Wrong Places -- Conclusion: Lessons Learned Under the Black Light -- Notes -- References -- Index -- A -- B -- C -- D -- E -- F -- G -- H -- I -- J -- K -- L -- M -- N -- O -- P -- Q -- R -- S -- T -- U -- V -- W -- Z. 330 $aThis book takes an in-depth look at the relationships exotic dancers have with their regular customers, and explores the limits of using feminist theory to discuss sex work. This is an accessible, revealing, and new look at a perennially intriguing and divisive subject - ideal teaching material for undergraduate courses in a variety of fields. 606 $aSex 606 $aSociology 606 $aEconomics$xSociological aspects 606 $aSex (Psychology) 606 $aDance 606 $aGender Studies 606 $aSociology 606 $aEconomic Sociology 606 $aPsychology of Gender and Sexuality 606 $aDance 615 0$aSex. 615 0$aSociology. 615 0$aEconomics$xSociological aspects. 615 0$aSex (Psychology) 615 0$aDance. 615 14$aGender Studies. 615 24$aSociology. 615 24$aEconomic Sociology. 615 24$aPsychology of Gender and Sexuality. 615 24$aDance. 676 $a305.3 700 $aEgan$b R. Danielle$01792795 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910969790203321 996 $aDancing for Dollars and Paying for Love$94331826 997 $aUNINA LEADER 06862nam 22008415 450 001 996691678803316 005 20251020130420.0 010 $a981-9535-37-9 024 7 $a10.1007/978-981-95-3537-8 035 $a(MiAaPQ)EBC32364745 035 $a(Au-PeEL)EBL32364745 035 $a(CKB)41667343500041 035 $a(DE-He213)978-981-95-3537-8 035 $a(EXLCZ)9941667343500041 100 $a20251020d2026 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aInformation and Communications Security $e27th International Conference, ICICS 2025, Nanjing, China, October 29?31, 2025, Proceedings, Part III /$fedited by Jinguang Han, Yang Xiang, Guang Cheng, Willy Susilo, Liquan Chen 205 $a1st ed. 2026. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2026. 215 $a1 online resource (857 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v16219 311 08$a981-9535-36-0 327 $aAttack and Defense -- Domain Adaptation for Cross-Device Profiled ML Side-Channel Attacks. -- Find the Clasp of the Chain: Efficiently Locating Cryptographic Procedures in SoC Secure Boot by Semi-automated Side-Channel Analysis. -- Full-phase distributed quantum impossible differential cryptanalysis. -- ProverNG: Efficient Verification of Compositional Masking for Cryptosystem?s Side-Channel Security. -- POWERPOLY: Multilingual Program Analysis with the Aid of WebAssembly. -- Not only spatial, but also spectral: Unnoticeable backdoor attack on 3D point clouds. -- Permutation-Based Cryptanalysis of the SCARF Block Cipher and Its Randomness Evaluation. -- Secure and Scalable TLB Partitioning Against Timing Side-Channel Attacks. -- Security Vulnerabilities in AI-Generated Code: A Large-Scale Analysis of Public GitHub Repositories. -- Vulnerability Analysis. -- Towards Efficient C/C++ Vulnerability Impact Assessment in Package Management Systems. -- AugGP-VD: A smart contract vulnerability detection approach based on augmented graph convolutional networks and pooling. -- VULDA: Source Code Vulnerability Detection via Local Dependency Context Aggregation on Vulnerability-aware Code Mapping Graph. -- KVT-Payload: Knowledge Graph-Enhanced Hierarchical Vulnerability Traffic Payload Generation. -- Construction and Application of Vulnerability Intelligence Ontology under Vulnerability Management Perspective. -- Anomaly Detection. -- Speaker Inference Detection Using Only Text. -- DTGAN: Diverse-Task Generative Adversarial Networks for Intrusion Detection Systems Against Adversarial Examples. -- ConComFND: Leveraging Content and Comment Information for Enhanced Fake News Detection. .-Transferable Adversarial Attacks in Object Detection: Leveraging Ensemble Features and Gradient Variance Minimization. -- VAE-BiLSTM: A Hybrid Model for DeFi Anomaly Detection Combining VAE and BiLSTM. -- FluxSketch: A Sketch-based Solution for Long-Term Fluctuating Key Flow Detection. -- RustGuard: Detecting Rust Data Leak Issues with Context-Sensitive Static Taint Analysis. -- Secure Guard: A Semantic-Based Jailbreak Prompt Detection Framework for Protecting Large Language Models. -- Traffic Classification. -- FCAL: An Asynchronous Federated Contrastive Semi-Supervised Learning Approach for Network Traffic Classification. -- TetheGAN: A GAN-Based Synthetic Mobile Tethering Traffic Generating Framework. -- SPTC: Signature-based Cross-protocol Encrypted Proxy Traffic Classification Approach. -- Multi-modal Datagram Representation with Spatial-Temporal State Space Models and Inter-flow Contrastive Learning for Encrypted Traffic Classification. -- FlowGraphNet: Efficient Malicious Traffic Detection via Graph Construction. -- CascadeGen: A Hybrid GAN-Diffusion Framework for Controllable and Protocol-Compliant Synthetic Network Traffic Generation. -- Steganography and Watermarking. -- Towards High-Capacity Provably Secure Steganography via Cascade Sampling. -- When There Is No Decoder: Removing Watermarks from Stable Diffusion Models in a No-box Setting. -- Robust Reversible Watermarking for 3D Models Based on Auto Diffusion Function. 330 $aThis three-set volume LNCS 16217-16219 constitutes the refereed proceedings of 27th International Conference on Information and Communications Security, ICICS 2025, held in Nanjing, China, during October 29?31, 2025. The 91 full papers presented in this book were carefully selected and reviewed from 357 submissions. The papers are organized in the following topical sections: Part I: Cryptography; Post-quantum Cryptography; Anonymity and Privacy; Authentication and Authorization. Part II: Blockchain and Cryptocurrencies, System and Network Security, Security and Privacy of AI, Machine Learning for Security. Part III: Attack and Defense; Vulnerability Analysis; Anomaly Detection; Traffic Classification; Steganography and Watermarking. 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v16219 606 $aData structures (Computer science) 606 $aInformation theory 606 $aDatabase management 606 $aData mining 606 $aApplication software 606 $aImage processing$xDigital techniques 606 $aComputer vision 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData Structures and Information Theory 606 $aDatabase Management 606 $aData Mining and Knowledge Discovery 606 $aComputer and Information Systems Applications 606 $aComputer Imaging, Vision, Pattern Recognition and Graphics 606 $aCryptology 615 0$aData structures (Computer science) 615 0$aInformation theory. 615 0$aDatabase management. 615 0$aData mining. 615 0$aApplication software. 615 0$aImage processing$xDigital techniques. 615 0$aComputer vision. 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 14$aData Structures and Information Theory. 615 24$aDatabase Management. 615 24$aData Mining and Knowledge Discovery. 615 24$aComputer and Information Systems Applications. 615 24$aComputer Imaging, Vision, Pattern Recognition and Graphics. 615 24$aCryptology. 676 $a005.73 676 $a003.54 700 $aHan$b Jinguang$01860657 701 $aXiang$b Yang$01860658 701 $aCheng$b Guang$01860659 701 $aSusilo$b Willy$01759814 701 $aChen$b Liquan$01860660 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996691678803316 996 $aInformation and Communications Security$94466408 997 $aUNISA