نتایج جستجو برای: coercion
تعداد نتایج: 2984 فیلتر نتایج به سال:
This paper, useful to anyone who has to address the public and representatives of the world of politics, focuses on the specific topic of resistance to vote-coercion. By using a model, we want to illustrate the implicit – and possibly realistic assumption that vote-buying is not profitable or doable in current conditions. But these assumptions do not necessarily hold good in all environments. F...
In this paper, we develop methods for constructing votebuying/coercion attacks on end-to-end voting systems, and describe votebuying/coercion attacks on three proposed end-to-end voting systems: Punchscan, Prêt-à-voter , and ThreeBallot. We also demonstrate a different attack on Punchscan, which could permit corrupt election officials to change votes without detection in some cases. Additionall...
We aim to model the results from a selfpaced reading experiment, which tested the effect of semantic type clash and typicality on the processing of German complement coercion. We present two distributional semantic models to test if they can model the effect of both type and typicality in the psycholinguistic study. We show that one of the models, without explicitly representing type informatio...
Sexual coercion is a manifestation of sexual conflict that is not in itself pathological according to Wakefield's (1992) criteria because sexual coercion can increase a man's Darwinian fitness. There are, however, differences among men in their propensity to commit rape and this propensity is linked to antisocial personality characteristics and relatively more sexual interest in brutal rape dep...
Soundness and coercion resistance are the important and intricate security requirements for remote voting protocols. Several formal models of soundness and coercion-resistance have been proposed in the literatures, but these formal models are not supported by automatic tools. Recently Backes et al. propose a new formal automated model of security properties including soundness and coercionresis...
We phrase parsing with context-free expressions as a type inhabitation problem where values are parse trees and types are contextfree expressions. We first show how containment among context-free and regular expressions can be reduced to a reachability problem by using a canonical representation of states. The proofs-as-programs principle yields a computational interpretation of the reachabilit...
The bombing of Serbia that began on 24 March 1999 typifies the logic that underlies the use of force by the United States and its NATO allies. Their air strikes and cruise-missile attacks were designed not to defeat the Serbian government, but to coerce Yugoslav President Slobodan Milosevic to accept a political settlement. Instead of having to destroy his forces completely or to remove his gov...
Unlike its English equivalent after, which often takes NP complement, Chinese temporal connective hou tends to take VP complement. In terms of type coercion, while after seems to generally license event coercion, Chinese hou does not (with a few exceptions), as in most cases the presence of a verb is required for the houconstruction (and the sentence) to be correct. Rather than attributing this...
It is well known that adding side eeects to functional languages changes the operational equivalences of the language. We develop a new language construct, encap, that forces imperative pieces of code to behave purely functionally, i.e., without any visible side eeects. The coercion operator encap provides a means of extending the simple reasoning principles for equivalences of code in a functi...
Many techniques have been proposed to generate keys including text passwords, graphical passwords, biometric data and etc. Most of these techniques are not resistant to coercion attacks in which the user is forcefully asked by an attacker to generate the key to gain access to the system or to decrypt the encrypted file. We present a novel approach in generating cryptographic keys to fight again...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید