Javascript must be enabled to continue!
Secret Histories
View through CrossRef
Every Gothic fiction contains a secret history: lost manuscripts, doubled lives, mysterious menaces, dreaded revelations. More narrowly, secret histories are fictional works that offer imaginatively coherent yet nonstandard explanations for events transpiring in consensus reality. John Clute coined the term “Fantasies of History” for “Tales which uncover a Secret History of the World […] with the aid of fantasy devices […] invocations of Elder Gods […] fictional books […] secret masters” (Clute 1997: 334). Secret histories are not confined to the Gothic genre: similar techniques and tropes may be found in autobiography, the secret history of a life, or in nonfiction that presents conspiracy theories as fact (see
secret societies
). Thrillers such as Dan Brown's
The Da Vinci Code
(2003) and its imitators reveal secret histories, as do more ambitious works not generally considered Gothic such as Umberto Eco's
Foucault's Pendulum
(1988), John Crowley's Aegypt sequence (1987–2007), and the novels of Thomas Pynchon and Don De Lillo.
Title: Secret Histories
Description:
Every Gothic fiction contains a secret history: lost manuscripts, doubled lives, mysterious menaces, dreaded revelations.
More narrowly, secret histories are fictional works that offer imaginatively coherent yet nonstandard explanations for events transpiring in consensus reality.
John Clute coined the term “Fantasies of History” for “Tales which uncover a Secret History of the World […] with the aid of fantasy devices […] invocations of Elder Gods […] fictional books […] secret masters” (Clute 1997: 334).
Secret histories are not confined to the Gothic genre: similar techniques and tropes may be found in autobiography, the secret history of a life, or in nonfiction that presents conspiracy theories as fact (see
secret societies
).
Thrillers such as Dan Brown's
The Da Vinci Code
(2003) and its imitators reveal secret histories, as do more ambitious works not generally considered Gothic such as Umberto Eco's
Foucault's Pendulum
(1988), John Crowley's Aegypt sequence (1987–2007), and the novels of Thomas Pynchon and Don De Lillo.
Related Results
Verifiable secret sharing based on the Chinese remainder theorem
Verifiable secret sharing based on the Chinese remainder theorem
ABSTRACTA (t,n) secret sharing scheme (SS) enables a dealer to divide a secret into n shares in such a way that (i) the secret can be recovered successfully with t or more than t s...
Le secret de la défense nationale : la raison d'État dans l'œil du droit
Le secret de la défense nationale : la raison d'État dans l'œil du droit
Résumé Le régime juridique du secret de la défense nationale a connu le 1er juillet 2021 sa réforme la plus importante depuis le décret du 17 juillet 1998 qui fixait jusque-là le r...
Shared Histories in Multiethnic Societies: Literature as a Critical Corrective of Cultural Memory Studies
Shared Histories in Multiethnic Societies: Literature as a Critical Corrective of Cultural Memory Studies
AbstractThe staging of history in literature is engaged in dynamic exchange with society’s memory discourses and in this context, literature is generally seen as playing a creative...
P-114. Efficacy of Vaginal-Spraying Bacillus Spore Probiotics in Supportive Treatment of Sexual Transmission Infections: A Randomized, Double-Blind, Placebo-Controlled Clinical Trial
P-114. Efficacy of Vaginal-Spraying Bacillus Spore Probiotics in Supportive Treatment of Sexual Transmission Infections: A Randomized, Double-Blind, Placebo-Controlled Clinical Trial
Abstract
Background
Sexually Transmitted Infections (STIs) are common gynecological infections worldwide. While antibiotics drug...
Memory-corrected quantum repeaters with adaptive syndrome identification
Memory-corrected quantum repeaters with adaptive syndrome identification
We address the challenge of incorporating encoded quantum memories into an exact secret key rate analysis for small and intermediate-scale quantum repeaters. To this end, we introd...
Secret Sharing and Shared Information
Secret Sharing and Shared Information
Secret sharing is a cryptographic discipline in which the goal is to distribute information about a secret over a set of participants in such a way that only specific authorized co...
Trade Secret Protection of Traditional Chinese Medicine Technology in the New Era: Internal Logic, Realistic Dilemma and Optimization Path
Trade Secret Protection of Traditional Chinese Medicine Technology in the New Era: Internal Logic, Realistic Dilemma and Optimization Path
Abstract: In the process of patenting traditional Chinese medicine (TCM) technology, the patent system has gradually deviated from its original purpose and philosophy of TCM. This ...
Hierarchical Threshold Secret Image Sharing Scheme Based on Birkhoff Interpolation
and Matrix Projection
Hierarchical Threshold Secret Image Sharing Scheme Based on Birkhoff Interpolation
and Matrix Projection
This paper focuses on how to protect confidential image based on hierarchical
threshold secret sharingscheme, against fake shadow attacks, collusion attacks and
...

