03907nam 22007575 450 99646563180331620200703102447.03-642-04135-310.1007/978-3-642-04135-8(CKB)1000000000784718(SSID)ssj0000317593(PQKBManifestationID)11251846(PQKBTitleCode)TC0000317593(PQKBWorkID)10293504(PQKB)11270548(DE-He213)978-3-642-04135-8(MiAaPQ)EBC3064513(PPN)139955372(EXLCZ)99100000000078471820100301d2009 u| 0engurnn|008mamaatxtccrE-Voting and Identity[electronic resource] Second International Conference, VOTE-ID 2009, Luxembourg, September 7-8, 2009, Proceedings /edited by Peter Y. A. Ryan, Berry Schoenmakers1st ed. 2009.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2009.1 online resource (IX, 191 p.) Security and Cryptology ;5767Bibliographic Level Mode of Issuance: Monograph3-642-04134-5 Includes bibliographical references and index.Not-So Hidden Information: -- Masked Ballot Voting for Receipt-Free Online Elections -- Improving and Simplifying a Variant of Prêt à Voter -- Implications of Graphics on Usability and Accessibility for the Voter -- Assessing Voters’ Attitudes towards Electronic Voting in Latin America: Evidence from Colombia’s 2007 E-Voting Pilot -- Developing a Legal Framework for Remote Electronic Voting -- VeryVote: A Voter Verifiable Code Voting System -- Minimum Disclosure Counting for the Alternative Vote -- A Design of Secure Preferential E-Voting -- RIES - Rijnland Internet Election System: A Cursory Study of Published Source Code -- Combatting Electoral Traces: The Dutch Tempest Discussion and Beyond.Security and Cryptology ;5767Data encryption (Computer science)Computer securityComputers and civilizationComputer communication systemsSpecial purpose computersApplication softwareCryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Systems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Computers and Societyhttps://scigraph.springernature.com/ontologies/product-market-codes/I24040Computer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Special Purpose and Application-Based Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I13030Computer Appl. in Administrative Data Processinghttps://scigraph.springernature.com/ontologies/product-market-codes/I2301XData encryption (Computer science).Computer security.Computers and civilization.Computer communication systems.Special purpose computers.Application software.Cryptology.Systems and Data Security.Computers and Society.Computer Communication Networks.Special Purpose and Application-Based Systems.Computer Appl. in Administrative Data Processing.324.6/3Ryan Peter Y. Aedthttp://id.loc.gov/vocabulary/relators/edtSchoenmakers Berryedthttp://id.loc.gov/vocabulary/relators/edtBOOK996465631803316E-Voting and Identity773715UNISA00723nam 2200169z- 450 9962805387033161-5044-2248-1(CKB)410000000712578720181118c2016uuuu -u- -engIEEE Std 1667-2015 (Revision of IEEE Std 1667-2009) - Redline: IEEE Standard for Discovery, Authentication, and Authorization in Host Attachments of Storage Devices - RedlineIEEEIEEE Std 1667-2015 DOCUMENT996280538703316IEEE Std 1667-2015 (Revision of IEEE Std 1667-2009) - Redline: IEEE Standard for Discovery, Authentication, and Authorization in Host Attachments of Storage Devices - Redline2579744UNISA