LEADER 00983nam a2200253 i 4500 001 991001670689707536 008 060608s2006 us b s001 0 eng d 020 $a0292709463 035 $ab13408719-39ule_inst 040 $aDip.to Filologia Class. e Scienze Filosofiche$bita 082 00$a882.010 100 1 $aDué, Casey$0450964 245 14$aThe captive woman's lament in Greek tragedy /$cCasey Due 260 $aAustin :$bUniversity of Texas Press,$cc2006 300 $aVIII, 189 p. ;$c24 cm 504 $aBibliografia: p. 169-183. Indici 650 4$aLetteratura drammatica greca 650 4$aDonne nella letteratura$zGrecia antica 907 $a.b13408719$b02-04-14$c08-06-06 912 $a991001670689707536 945 $aLE007 T 1498$g1$i2007000105238$lle007$nLE007 2006 Vox$op$pE66.64$q-$rl$s- $t0$u0$v0$w0$x0$y.i14248414$z08-06-06 996 $aCaptive woman's lament in Greek tragedy$91091160 997 $aUNISALENTO 998 $ale007$b08-06-06$cm$da $e-$feng$gus $h4$i0 LEADER 04973nam 22008415 450 001 9910484922703321 005 20251226202542.0 010 $a3-642-04135-3 024 7 $a10.1007/978-3-642-04135-8 035 $a(CKB)1000000000784718 035 $a(SSID)ssj0000317593 035 $a(PQKBManifestationID)11251846 035 $a(PQKBTitleCode)TC0000317593 035 $a(PQKBWorkID)10293504 035 $a(PQKB)11270548 035 $a(DE-He213)978-3-642-04135-8 035 $a(MiAaPQ)EBC3064513 035 $a(PPN)139955372 035 $a(BIP)27506875 035 $a(EXLCZ)991000000000784718 100 $a20100301d2009 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aE-Voting and Identity $eSecond International Conference, VOTE-ID 2009, Luxembourg, September 7-8, 2009, Proceedings /$fedited by Peter Y. A. Ryan, Berry Schoenmakers 205 $a1st ed. 2009. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2009. 215 $a1 online resource (IX, 191 p.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v5767 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-642-04134-5 320 $aIncludes bibliographical references and index. 327 $aNot-So Hidden Information: -- Masked Ballot Voting for Receipt-Free Online Elections -- Improving and Simplifying a Variant of Prêt à Voter -- Implications of Graphics on Usability and Accessibility for the Voter -- Assessing Voters? Attitudes towards Electronic Voting in Latin America: Evidence from Colombia?s 2007 E-Voting Pilot -- Developing a Legal Framework for Remote Electronic Voting -- VeryVote: A Voter Verifiable Code Voting System -- Minimum Disclosure Counting for the Alternative Vote -- A Design of Secure Preferential E-Voting -- RIES - Rijnland Internet Election System: A Cursory Study of Published Source Code -- Combatting Electoral Traces: The Dutch Tempest Discussion and Beyond. 330 $aThese proceedings contain the papers presented at VoteID 2009, the Second - ternationalConferenceonE-votingandIdentity.TheconferencewasheldinL- embourgduring September 7-8,2009,hostedbythe Universityof Luxembourg. VoteID 2009 built on the success of the 2007 edition held in Bochum. Events have moved on dramatically in the intervening two years: at the time of writing, people are in the streets of Tehran protesting against the claimed outcome of the June12thpresidentialelectionin Iran.Banners bearingthe words"Whereis my vote?" bear testimony to the strength of feeling and the need for elections to be trusted. These events show that the search for high-assurance voting is not a purely academic pursuit but one of very real importance. We hope that VoteID 2009 will help contribute to our understanding of the foundations of democracy. TheProgramCommitteeselected11papersforpresentationattheconference out of a total of 24 submissions. Each submission was reviewed by at least four Program Committee members. The EasyChair conference management system proved instrumental in the reviewing process as well as in the preparation of these proceedings. The selected papers cover a wide range of aspects of voting: proposals for high-assurancevotingsystems,evaluationofexistingsystems,assessmentofp- lic response to electronic voting and legal aspects. The program also included a keynote by Mark Ryan. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v5767 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData protection 606 $aComputers and civilization 606 $aComputer networks 606 $aComputers, Special purpose 606 $aInformation technology$xManagement 606 $aCryptology 606 $aData and Information Security 606 $aComputers and Society 606 $aComputer Communication Networks 606 $aSpecial Purpose and Application-Based Systems 606 $aComputer Application in Administrative Data Processing 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aData protection. 615 0$aComputers and civilization. 615 0$aComputer networks. 615 0$aComputers, Special purpose. 615 0$aInformation technology$xManagement. 615 14$aCryptology. 615 24$aData and Information Security. 615 24$aComputers and Society. 615 24$aComputer Communication Networks. 615 24$aSpecial Purpose and Application-Based Systems. 615 24$aComputer Application in Administrative Data Processing. 676 $a324.6/3 701 $aRyan$b Peter$f1957-$01756192 701 $aSchoenmakers$b Berry$01756193 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484922703321 996 $aE-voting and identity$94193322 997 $aUNINA