نتایج جستجو برای: coercion

تعداد نتایج: 2984  

2010
Manuel Gámez-Guadix Murray A. Straus Scott Hershberger

This study examines the extent to which male and female university students use verbal sexual coercion and physically forced sex on a dating partner and tests a theoretical model which specifies that corporal punishment, minor forms of neglect by parents, and sexual abuse increase the probability of sexually coercing and sexually assaulting a partner, and that this relationship is partly mediat...

Journal: :CoRR 2017
Christian Meter Alexander Schneider Philipp Hagemeister Martin Mauve

Current electronic voting systems require an anonymous channel during the voting phase to prevent coercion. Typically, low-latency anonymization-networks like Tor are used for this purpose. In this paper we devise a monitoring attack that allows an attacker to monitor whether participants of an election voted, despite the use of a low-latency network during the voting phase, thereby breaking an...

2011
Michael Schläpfer Rolf Haenni Reto E. Koenig Oliver Spycher

Some years ago, Juels et al. introduced the first coercion-resistant Internet voting protocol. Its basic concept is still the most viable approach to address voter coercion and vote selling in Internet voting. However, one of the main open issues is its unrealistic computational requirements of the quadratic-time tallying procedure. In this paper, we examine the cause of this issue, namely the ...

2008
Avner Greif

What causes distinct trajectories of market development? Why did the modern market economy, characterized by impersonal exchange, first emerge in the West? This paper presents a theory of market development and evaluates it based on the histories of England, China, and Japan. The analysis focuses on how distinct coercion-constraining institutions that secure property rights differentially inter...

2016
Philipp Locher Rolf Haenni Reto E. Koenig

The cryptographic voting protocol presented in this paper offers public verifiability, everlasting privacy, and coercion-resistance simultaneously. Voters are authenticated anonymously based on perfectly hiding commitments and zero-knowledge proofs. Their vote and participation secrecy is therefore protected independently of computational intractability assumptions or trusted authorities. Coerc...

Journal: :BJPsych. International 2017

Journal: :Journal of Intellectual Property Law & Practice 2011

Journal: :Journal of Ethics and Social Philosophy 2017

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید