LEADER 04733nam 2200685 a 450 001 9910454012403321 005 20200520144314.0 010 $a0-8147-7738-4 010 $a1-4416-1567-9 024 7 $a10.18574/9780814777381 035 $a(CKB)1000000000786050 035 $a(EBL)865906 035 $a(OCoLC)779828293 035 $a(SSID)ssj0000218508 035 $a(PQKBManifestationID)11912342 035 $a(PQKBTitleCode)TC0000218508 035 $a(PQKBWorkID)10220665 035 $a(PQKB)11184031 035 $a(MiAaPQ)EBC865906 035 $a(OCoLC)429904298 035 $a(MdBmJHUP)muse10404 035 $a(DE-B1597)546951 035 $a(DE-B1597)9780814777381 035 $a(Au-PeEL)EBL865906 035 $a(CaPaEBR)ebr10313202 035 $a(EXLCZ)991000000000786050 100 $a20081212d2009 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 04$aThe passionate Torah$b[electronic resource] $esex and Judaism /$fedited by Danya Ruttenberg 210 $aNew York $cNew York University Press$dc2009 215 $a1 online resource (305 p.) 300 $aIncludes bibliographical references and indexes. 311 $a0-8147-7605-1 311 $a0-8147-7604-3 327 $tFrontmatter -- $tContents -- $tAcknowledgments -- $tIntroduction -- $t1 Sotah -- $t2 Prostitution -- $t3 Divorcing Ba?al -- $t4 The Sage and the Other Woman -- $t5 Intermarriage, Gender, and Nation in the Hebrew Bible -- $t6 Good Sex -- $t7 The Erotics of Sexual Segregation -- $t8 Reclaiming Nidah and Mikveh through Ideological and Practical Reinterpretation -- $t9 The Goy of Sex -- $t10 A Jewish Perspective on Birth Control and Procreation -- $t11 Not Like a Virgin -- $t12 Reconsidering Solitary Sex from a Jewish Perspective -- $t13 ?Created by the Hand of Heaven? -- $t14 Toward a New Tzniut -- $t15 On the Religious Signifi cance of Homosexuality; or, Queering God, Torah, and Israel -- $t16 Heruta?s Ruse -- $t17 Love the One You?re With -- $t18 Eden for Grown-Ups -- $tGlossary -- $tContributors -- $tIndex of Sources -- $tSubject Index 330 $aIn this unique collection of essays, some of today?s smartest Jewish thinkers explore a broad range of fundamental questions in an effort to balance ancient tradition and modern sexuality.In the last few decades a number of factors?post-modernism, feminism, queer liberation, and more?have brought discussion of sexuality to the fore, and with it a whole new set of questions that challenge time-honored traditions and ways of thinking. For Jews of all backgrounds, this has often led to an unhappy standoff between tradition and sexual empowerment.Yet as The Passionate Torah illustrates, it is of critical importance to see beyond this apparent conflict if Jews are to embrace both their religious beliefs and their sexuality. With incisive essays from contemporary rabbis, scholars, thinkers, and writers, this collection not only surveys the challenges that sexuality poses to Jewish belief, but also offers fresh new perspectives and insights on the changing place of sexuality within Jewish theology?and Jewish lives. Covering topics such as monogamy, inter-faith relationships, reproductive technology, homosexuality, and a host of other hot-button issues, these writings consider how contemporary Jews can engage themselves, their loved ones, and their tradition in a way that?s both sexy and sanctified.Seeking to deepen the Jewish conversation about sexuality, The Passionate Torah brings together brilliant thinkers in an attempt to bridge the gap between the sacred and the sexual.Contributors: Rebecca Alpert, Wendy Love Anderson, Judith R. Baskin, Aryeh Cohen, Elliot Dorff, Esther Fuchs, Bonna Haberman, Elliot Kukla, Gail Labovitz, Malka Landau, Sarra Lev, Laura Levitt, Sara Meirowitz, Jay Michaelson, Haviva Ner-David, Danya Ruttenberg, Naomi Seidman, and Arthur Waskow. 606 $aSex$xReligious aspects$xJudaism 606 $aSexual ethics 606 $aModesty$xReligious aspects$xJudaism 606 $aHomosexuality$xReligious aspects$xJudaism 606 $aFeminism$xReligious aspects$xJudaism 608 $aElectronic books. 615 0$aSex$xReligious aspects$xJudaism. 615 0$aSexual ethics. 615 0$aModesty$xReligious aspects$xJudaism. 615 0$aHomosexuality$xReligious aspects$xJudaism. 615 0$aFeminism$xReligious aspects$xJudaism. 676 $a296.3/66 701 $aRuttenberg$b Danya$0951870 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910454012403321 996 $aThe passionate Torah$92487433 997 $aUNINA LEADER 04867nam 22007935 450 001 996465754303316 005 20200704084155.0 010 $a3-642-41227-0 024 7 $a10.1007/978-3-642-41227-1 035 $a(CKB)3710000000024404 035 $a(SSID)ssj0001049596 035 $a(PQKBManifestationID)11661890 035 $a(PQKBTitleCode)TC0001049596 035 $a(PQKBWorkID)11018634 035 $a(PQKB)10917883 035 $a(DE-He213)978-3-642-41227-1 035 $a(MiAaPQ)EBC3093015 035 $a(PPN)176115870 035 $a(EXLCZ)993710000000024404 100 $a20131015d2013 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aProvable Security$b[electronic resource] $e7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013, Proceedings /$fedited by Willy Susilo, Reza Reyhanitabar 205 $a1st ed. 2013. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2013. 215 $a1 online resource (X, 347 p. 36 illus.) 225 1 $aSecurity and Cryptology ;$v8209 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-41226-2 327 $aOn Modeling Terrorist Frauds: Addressing Collusion in Distance Bounding Protocols -- Authenticated Key Exchange Protocols Based on Factoring Assumption -- Efficient, Pairing-Free, Authenticated Identity Based Key Agreement in a Single Round -- CIL Security Proof for a Password-Based Key Exchange -- Non Observability in the Random Oracle Model -- Indistinguishability against Chosen Ciphertext Verification Attack Revisited: The Complete Picture -- Input-Aware Equivocable Commitments and UC-secure Commitments with Atomic Exchanges -- Towards Anonymous Ciphertext Indistinguishability with Identity Leakage -- k-Time Proxy Signature: Formal Definition and Efficient Construction -- Anonymous Signcryption against Linear Related-Key Attacks -- Improved Authenticity Bound of EAX, and Refinements -- The Security of the OCB Mode of Operation without the SPRP Assumption -- A Short Universal Hash Function from Bit Rotation, and Applications to Blockcipher Modes -- How to Remove the Exponent GCD in HK09 -- Translation-Randomizable Distributions via Random Walks -- RKA Secure PKE Based on the DDH and HR Assumptions -- Computationally Efficient Dual-Policy Attribute Based Encryption with Short Ciphertext -- Factoring-Based Proxy Re-Encryption Schemes -- Towards a Secure Certificateless Proxy Re-Encryption Scheme. 330 $aThis book constitutes the refereed proceedings of the 7th International Conference on Provable Security, ProvSec 2013, held in Melaka, Malaysia, in October 2013. The 18 full papers presented together with 1 invited talk were carefully reviewed and selected from 44 submissions. The papers cover the following topics: key exchange protocols, security models, signature and signcryption schemes, authenticated encryption, theory, and public key encryption. 410 0$aSecurity and Cryptology ;$v8209 606 $aData encryption (Computer science) 606 $aComputer security 606 $aComputers and civilization 606 $aE-commerce 606 $aApplication software 606 $aComputer science 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 606 $ae-Commerce/e-business$3https://scigraph.springernature.com/ontologies/product-market-codes/I26000 606 $aComputer Appl. in Administrative Data Processing$3https://scigraph.springernature.com/ontologies/product-market-codes/I2301X 606 $aComputer Science, general$3https://scigraph.springernature.com/ontologies/product-market-codes/I00001 615 0$aData encryption (Computer science). 615 0$aComputer security. 615 0$aComputers and civilization. 615 0$aE-commerce. 615 0$aApplication software. 615 0$aComputer science. 615 14$aCryptology. 615 24$aSystems and Data Security. 615 24$aComputers and Society. 615 24$ae-Commerce/e-business. 615 24$aComputer Appl. in Administrative Data Processing. 615 24$aComputer Science, general. 676 $a005.8 702 $aSusilo$b Willy$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aReyhanitabar$b Reza$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996465754303316 996 $aProvable Security$9772128 997 $aUNISA