1-2 of 2 Search Results for


Follow your search
Access your saved searches in your account

Would you like to receive an alert when new items match your search?
×Close Modal
Sort by
Journal Article
boundary 2 (1 November 2017) 44 (4): 95–112.
Published: 01 November 2017
...David Golumbia The question of the militarization of language emerges from the politics surrounding cryptography, or the use of encryption in contemporary networked digital technology, and the intersection of encryption with the politics of language. Ultimately, cryptographic politics aims to...
Journal Article
boundary 2 (1 May 2000) 27 (2): 83–111.
Published: 01 May 2000
... motivates, for example, Poe’s ‘‘imp of the perverse which, in the public terms of his time, signifies a motiveless and thus, for him, radically private impulse.14 It also accounts for his interest in cryptography and his rhetori- cal...