نتایج جستجو برای: coercion

تعداد نتایج: 2984  

2004
Bernard van Acker

This paper, useful to anyone who has to address the public and representatives of the world of politics, focuses on the specific topic of resistance to vote-coercion. By using a model, we want to illustrate the implicit – and possibly realistic assumption that vote-buying is not profitable or doable in current conditions. But these assumptions do not necessarily hold good in all environments. F...

2010
John Kelsey Andrew Regenscheid Tal Moran David Chaum

In this paper, we develop methods for constructing votebuying/coercion attacks on end-to-end voting systems, and describe votebuying/coercion attacks on three proposed end-to-end voting systems: Punchscan, Prêt-à-voter , and ThreeBallot. We also demonstrate a different attack on Punchscan, which could permit corrupt election officials to change votes without detection in some cases. Additionall...

2015
Alessandra Zarcone Sebastian Padó Alessandro Lenci

We aim to model the results from a selfpaced reading experiment, which tested the effect of semantic type clash and typicality on the processing of German complement coercion. We present two distributional semantic models to test if they can model the effect of both type and typicality in the psycholinguistic study. We show that one of the models, without explicitly representing type informatio...

Journal: :Archives of sexual behavior 2010
Vernon L Quinsey

Sexual coercion is a manifestation of sexual conflict that is not in itself pathological according to Wakefield's (1992) criteria because sexual coercion can increase a man's Darwinian fitness. There are, however, differences among men in their propensity to commit rape and this propensity is linked to antisocial personality characteristics and relatively more sexual interest in brutal rape dep...

Journal: :JDCTA 2010
Bo Meng Wei Huang Zimao Li Dejun Wang

Soundness and coercion resistance are the important and intricate security requirements for remote voting protocols. Several formal models of soundness and coercion-resistance have been proposed in the literatures, but these formal models are not supported by automatic tools. Recently Backes et al. propose a new formal automated model of security properties including soundness and coercionresis...

2017
Martin Sulzmann Peter Thiemann

We phrase parsing with context-free expressions as a type inhabitation problem where values are parse trees and types are contextfree expressions. We first show how containment among context-free and regular expressions can be reduced to a reachability problem by using a canonical representation of states. The proofs-as-programs principle yields a computational interpretation of the reachabilit...

2000
Slobodan Milosevic

The bombing of Serbia that began on 24 March 1999 typifies the logic that underlies the use of force by the United States and its NATO allies. Their air strikes and cruise-missile attacks were designed not to defeat the Serbian government, but to coerce Yugoslav President Slobodan Milosevic to accept a political settlement. Instead of having to destroy his forces completely or to remove his gov...

2012
Zuoyan Song

Unlike its English equivalent after, which often takes NP complement, Chinese temporal connective hou tends to take VP complement. In terms of type coercion, while after seems to generally license event coercion, Chinese hou does not (with a few exceptions), as in most cases the presence of a verb is required for the houconstruction (and the sentence) to be correct. Rather than attributing this...

1995
Jon G. Riecke Ramesh Viswanathan

It is well known that adding side eeects to functional languages changes the operational equivalences of the language. We develop a new language construct, encap, that forces imperative pieces of code to behave purely functionally, i.e., without any visible side eeects. The coercion operator encap provides a means of extending the simple reasoning principles for equivalences of code in a functi...

2010
Payas Gupta Debin Gao

Many techniques have been proposed to generate keys including text passwords, graphical passwords, biometric data and etc. Most of these techniques are not resistant to coercion attacks in which the user is forcefully asked by an attacker to generate the key to gain access to the system or to decrypt the encrypted file. We present a novel approach in generating cryptographic keys to fight again...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید