This book presents fresh ethnographic work from the regions of Africa and Melanesia—where the popularity of charismatic Christianity can be linked to a revival and transformation of witchcraft. The volume demonstrates how the Holy Spirit has become an adversary to the reconfirmed presence of witches, demons, and sorcerers as manifestations of evi...
How to Read a Folktale offers the first English translation of Ibonia, a spellbinding tale of old Madagascar. Ibonia is a folktale on epic scale. Much of its plot sounds familiar: a powerful royal hero attempts to rescue his betrothed from an evil adversary and, after a series of tests and duels, he and his lover are joyfully united with a marriage...
This open access book describes the technologies needed to construct a secure big data infrastructure that connects data owners, analytical institutions, and user institutions in a circle of trust. It begins by discussing the most relevant technical issues involved in creating safe and privacy-preserving big data distribution platforms, and especia...
Cryptography is an indispensable tool used to protect information in computing systems. It is used everywhere and by billions of people worldwide on a daily basis. It is used to protect data at rest and data in motion. Cryptographic systems are an integral part of standard protocols, most notably the Transport Layer Security (TLS) protocol, making ...
This open volume surveys the state of the field to examine whether a fifth wave of deterrence theory is emerging. Bringing together insights from world-leading experts from three continents, the volume identifies the most pressing strategic challenges, frames theoretical concepts, and describes new strategies.
The use and utility of deterrence in...
Defend Dissent is an introduction to cryptography paired with the social impacts of surveillance and the protective potential of encryption, with a focus on US social movements. Each chapter ends with a story that brings social context to the material - from surveillance used against contemporary US protests to the African National Congress's ...
This book is a comprehensive, formal treatment of anonymous point collection. The proposed definition does not only provide a strong notion of security and privacy, but also covers features which are important for practical use. An efficient realization is presented and proven to fulfill the proposed definition. The resulting building block is the ...