293 research outputs found
Lesbian and bisexual women's experiences of sexuality-based discrimination and their appearance concerns
Lesbian and bisexual women frequently experience sexuality-based discrimination, which is often based on others' judgements about their appearance. This short article aims to explore whether there is a relationship between lesbian and bisexual women's experiences of sexuality-based discrimination and their satisfaction with the way that they look. Findings from an online survey suggest that discrimination is negatively related to appearance satisfaction for lesbian women, but not for bisexual women. It is argued that this difference exists because lesbian appearance norms are more recognisable and distinctive than bisexual women's appearance norms
Asexuality: Classification and characterization
This is a post-print version of the article. The official published version can be obtaineed at the link below.The term “asexual” has been defined in many different ways and asexuality has received very little research attention. In a small qualitative study (N = 4), individuals who self-identified as asexual were interviewed to help formulate hypotheses for a larger study. The second larger study was an online survey drawn from a convenience sample designed to better characterize asexuality and to test predictors of asexual identity. A convenience sample of 1,146 individuals (N = 41 self-identified asexual) completed online questionnaires assessing sexual history, sexual inhibition and excitation, sexual desire, and an open-response questionnaire concerning asexual identity. Asexuals reported significantly less desire for sex with a partner, lower sexual arousability, and lower sexual excitation but did not differ consistently from non-asexuals in their sexual inhibition scores or their desire to masturbate. Content analyses supported the idea that low sexual desire is the primary feature predicting asexual identity
Fatally Flawed? : Discursive Evidence from the Movement to Establish Lesbian Studies Programs
While related areas such as Queer Studies and Sexuality Studies have become established as disciplinary formations in North American and British universities, Lesbian Studies has not. This article reports on an analysis of key publications by critics and advocates of Lesbian Studies to explore the possibility that Lesbian Studies was flawed in ways that account for its non-emergence. Charges against Lesbian Studies include naïve essentialism, white middle-classness, separatism, and paranoia. Discourse analysis of books by Lesbian Studies advocates examines evidence of each of these qualities and concludes that Lesbian Studies was above all too lesbian to be successfully integrated into the enduringly heteropatriarchal institution of universities.University of Winnipeghttp://journals.sagepub.com/doi/10.1177/095935351037018
Graded structure in sexual definitions: categorizations of having “had sex” and virginity loss among homosexual and heterosexual men and women
Definitions of sexual behavior display a robust hierarchy of agreement regarding whether or not acts should be classed as, for example, sex or virginity loss. The current research offers a theoretical explanation for this hierarchy, proposing that sexual definitions display graded categorical structure, arising from goodness of membership judgments. Moderation of this graded structure is also predicted, with the focus here on how sexual orientation identity affects sexual definitions. A total of 300 18- to 30-year-old participants completed an online survey, rating 18 behaviors for how far each constitutes having “had sex” and virginity loss. Participants fell into one of four groups: heterosexual male or female, gay male or lesbian. The predicted ratings hierarchy emerged, in which bidirectional genital acts were rated significantly higher than unidirectional or nonpenetrative contact, which was in turn rated significantly higher than acts involving no genital contact. Moderation of graded structure was also in line with predictions. Compared to the other groups, the lesbian group significantly upgraded ratings of genital contact that was either unidirectional or nonpenetrative. There was also evidence of upgrading by the gay male sample of anal intercourse ratings. These effects are theorized to reflect group-level variation in experience, contextual perspective, and identity-management. The implications of the findings in relation to previous research are discussed. It is suggested that a graded structure approach can greatly benefit future research into sexual definitions, by permitting variable definitions to be predicted and explained, rather than merely identified
Quantum homomorphic encryption for circuits of low -gate complexity
Fully homomorphic encryption is an encryption method with the property that
any computation on the plaintext can be performed by a party having access to
the ciphertext only. Here, we formally define and give schemes for quantum
homomorphic encryption, which is the encryption of quantum information such
that quantum computations can be performed given the ciphertext only. Our
schemes allows for arbitrary Clifford group gates, but become inefficient for
circuits with large complexity, measured in terms of the non-Clifford portion
of the circuit (we use the "" non-Clifford group gate, which is also
known as the -gate).
More specifically, two schemes are proposed: the first scheme has a
decryption procedure whose complexity scales with the square of the number of
-gates (compared with a trivial scheme in which the complexity scales with
the total number of gates); the second scheme uses a quantum evaluation key of
length given by a polynomial of degree exponential in the circuit's -gate
depth, yielding a homomorphic scheme for quantum circuits with constant
-depth. Both schemes build on a classical fully homomorphic encryption
scheme.
A further contribution of ours is to formally define the security of
encryption schemes for quantum messages: we define quantum indistinguishability
under chosen plaintext attacks in both the public and private-key settings. In
this context, we show the equivalence of several definitions.
Our schemes are the first of their kind that are secure under modern
cryptographic definitions, and can be seen as a quantum analogue of classical
results establishing homomorphic encryption for circuits with a limited number
of multiplication gates. Historically, such results appeared as precursors to
the breakthrough result establishing classical fully homomorphic encryption
Demographic, Psychological, and Social Characteristics of Self-Identified Lesbian, Gay, and Bisexual Adults in a US Probability Sample
Using data from a US national probability sample of self-identified lesbian, gay, and bisexual adults (N = 662), this article reports population parameter estimates for a variety of demographic, psychological, and social variables. Special emphasis is given to information with relevance to public policy and law. Compared with the US adult population, respondents were younger, more highly educated, and less likely to be non-Hispanic White, but differences were observed between gender and sexual orientation groups on all of these variables. Overall, respondents tended to be politically liberal, not highly religious, and supportive of marriage equality for same-sex couples. Women were more likely than men to be in a committed relationship. Virtually all coupled gay men and lesbians had a same-sex partner, whereas the vast majority of coupled bisexuals were in a heterosexual relationship. Compared with bisexuals, gay men and lesbians reported stronger commitment to a sexual-minority identity, greater community identification and involvement, and more extensive disclosure of their sexual orientation to others. Most respondents reported experiencing little or no choice about their sexual orientation. The importance of distinguishing among lesbians, gay men, bisexual women, and bisexual men in behavioral and social research is discussed
Coordination in multiagent systems and Laplacian spectra of digraphs
Constructing and studying distributed control systems requires the analysis
of the Laplacian spectra and the forest structure of directed graphs. In this
paper, we present some basic results of this analysis partially obtained by the
present authors. We also discuss the application of these results to
decentralized control and touch upon some problems of spectral graph theory.Comment: 15 pages, 2 figures, 40 references. To appear in Automation and
Remote Control, Vol.70, No.3, 200
Single parenting: Interventions in the transitional stage
Following divorce or separation, many mother-headed families need to mourn losses, including reduced economic resources. They need to reestablish family rituals, confront such issues as time management and structural changes that can result in scapegoating or over-reliance on a parental child. Normalizing difficulties associated with parenting is important because single parents tend to internalize societal attribution of family difficulties to inadequate family structure rather than developmental stages, limited economic resources, and negative expectations about the capacity of women to head families.Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/44289/1/10591_2004_Article_BF00891869.pd
‘Can I be a kinky ace?’: How asexual people negotiate their experiences of kinks and fetishes
Prior research has found that asexual people may fantasise or participate in activities typically conceptualised as ‘sexual’. These behaviours may be considered paradoxical when an asexual person is conceptualised as someone who does not experience sexual attraction or desire. This research aimed to explore how kinks and fetishes are conceptualised, experienced, and negotiated by asexual individuals. Forty-eight participants were recruited to take part in an online qualitative survey. Thematic analysis resulted in three themes. In “Am I asexual?”: (How) can you be a kinky ace?, we discuss the sense of dissonance which some participants reported in negotiating what was seemingly the paradox between their self-identity as asexual and their exploration of kinks and fetishes. In the second theme, Between me and me’ and make believe: Kinks and fetishes as solo and imaginary, we report on how kinks, fetishes, and fantasies were often understood in a solitary context and as either undesirable – or impossible – to live out. In the final theme, Kink as a sensual enhancement in relationships, we highlight how participants positioned kinks and fetishes as an agent for intimacy. These findings expand our knowledge of how asexual people negotiate kinks and fetishes and capture the complexities of asexual identities
Unifying Leakage Models: From Probing Attacks to Noisy Leakage
A recent trend in cryptography is to formally show the leakage resilience of cryptographic implementations in a given leakage model. One of the most prominent leakage models -- the so-called bounded leakage model -- assumes that the amount of leakage is a-priori bounded. Unfortunately, it has been pointed out that the assumption of bounded leakages is hard to verify in practice. A more realistic assumption is to assume that leakages are sufficiently noisy, following the engineering observation that real-world physical leakages are inherently noisy. While the noisy leakage assumption has first been studied in the seminal work of Chari et al. (CRYPTO 99), the recent work of Prouff and Rivain (Eurocrypt 2013) provides the first analysis of a full masking scheme under a physically motivated noise model. In particular, the authors show that a block-cipher implementation that uses an additive masking scheme is secure against noisy leakages. Unfortunately, the security analysis of Prouff and Rivain has three important shortcomings: (1) it requires leak-free gates, (2) it considers a restricted adversarial model (random message attacks), and (3) the security proof has limited application for cryptographic settings. In this work, we provide an alternative security proof in the same noisy model that overcomes these three challenges. We achieve this goal by a new reduction from noisy leakage to the important theoretical model of probing adversaries (Ishai et al~ -- CRYPTO 2003). Our work can be viewed as a next step of closing the gap between theory and practice in leakage resilient cryptography: while our security proofs heavily rely on concepts of theoretical cryptography, we solve problems in practically motivated leakage models
- …
