LEADER 01124nam a22003011i 4500 001 991002147139707536 005 20040206142102.0 008 040407s1982 it a||||||||||||||||ita 035 $ab12877852-39ule_inst 035 $aARCHE-085747$9ExL 040 $aDip.to Scienze Storiche$bita$cA.t.i. Arché s.c.r.l. Pandora Sicilia s.r.l. 082 04$a712 100 1 $aJellicoe, Geoffrey Alan$011057 245 12$aL'architettura del paesaggio /$cG. A. Jellicoe 250 $a2. ed. 260 $aMilano :$bEdizioni di Comunità,$c1982 300 $a257 p., [144] p. di tav. :$bill. ;$c22 cm 440 0$aSaggi di cultura contemporanea ;$v80 500 $aTrad. dall'inglese di Enrica Laḅ 650 4$aArchitettura del paesaggio 700 1 $aLaḅ, Enrica 765 0 $tStudies in landscape design 907 $a.b12877852$b02-04-14$c16-04-04 912 $a991002147139707536 945 $aLE009 ARTE 707-1$g1$i2009000321960$lle009$o-$pE0.00$q-$rn$so $t0$u0$v0$w0$x0$y.i13439625$z16-04-04 996 $aArchitettura del paesaggio$9301352 997 $aUNISALENTO 998 $ale009$b16-04-04$cm$da $e-$fita$git $h2$i1 LEADER 04973nam 22008415 450 001 9910484922703321 005 20251226202542.0 010 $a3-642-04135-3 024 7 $a10.1007/978-3-642-04135-8 035 $a(CKB)1000000000784718 035 $a(SSID)ssj0000317593 035 $a(PQKBManifestationID)11251846 035 $a(PQKBTitleCode)TC0000317593 035 $a(PQKBWorkID)10293504 035 $a(PQKB)11270548 035 $a(DE-He213)978-3-642-04135-8 035 $a(MiAaPQ)EBC3064513 035 $a(PPN)139955372 035 $a(BIP)27506875 035 $a(EXLCZ)991000000000784718 100 $a20100301d2009 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aE-Voting and Identity $eSecond International Conference, VOTE-ID 2009, Luxembourg, September 7-8, 2009, Proceedings /$fedited by Peter Y. A. Ryan, Berry Schoenmakers 205 $a1st ed. 2009. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2009. 215 $a1 online resource (IX, 191 p.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v5767 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-642-04134-5 320 $aIncludes bibliographical references and index. 327 $aNot-So Hidden Information: -- Masked Ballot Voting for Receipt-Free Online Elections -- Improving and Simplifying a Variant of Prêt à Voter -- Implications of Graphics on Usability and Accessibility for the Voter -- Assessing Voters? Attitudes towards Electronic Voting in Latin America: Evidence from Colombia?s 2007 E-Voting Pilot -- Developing a Legal Framework for Remote Electronic Voting -- VeryVote: A Voter Verifiable Code Voting System -- Minimum Disclosure Counting for the Alternative Vote -- A Design of Secure Preferential E-Voting -- RIES - Rijnland Internet Election System: A Cursory Study of Published Source Code -- Combatting Electoral Traces: The Dutch Tempest Discussion and Beyond. 330 $aThese proceedings contain the papers presented at VoteID 2009, the Second - ternationalConferenceonE-votingandIdentity.TheconferencewasheldinL- embourgduring September 7-8,2009,hostedbythe Universityof Luxembourg. VoteID 2009 built on the success of the 2007 edition held in Bochum. Events have moved on dramatically in the intervening two years: at the time of writing, people are in the streets of Tehran protesting against the claimed outcome of the June12thpresidentialelectionin Iran.Banners bearingthe words"Whereis my vote?" bear testimony to the strength of feeling and the need for elections to be trusted. These events show that the search for high-assurance voting is not a purely academic pursuit but one of very real importance. We hope that VoteID 2009 will help contribute to our understanding of the foundations of democracy. TheProgramCommitteeselected11papersforpresentationattheconference out of a total of 24 submissions. Each submission was reviewed by at least four Program Committee members. The EasyChair conference management system proved instrumental in the reviewing process as well as in the preparation of these proceedings. The selected papers cover a wide range of aspects of voting: proposals for high-assurancevotingsystems,evaluationofexistingsystems,assessmentofp- lic response to electronic voting and legal aspects. The program also included a keynote by Mark Ryan. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v5767 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData protection 606 $aComputers and civilization 606 $aComputer networks 606 $aComputers, Special purpose 606 $aInformation technology$xManagement 606 $aCryptology 606 $aData and Information Security 606 $aComputers and Society 606 $aComputer Communication Networks 606 $aSpecial Purpose and Application-Based Systems 606 $aComputer Application in Administrative Data Processing 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aData protection. 615 0$aComputers and civilization. 615 0$aComputer networks. 615 0$aComputers, Special purpose. 615 0$aInformation technology$xManagement. 615 14$aCryptology. 615 24$aData and Information Security. 615 24$aComputers and Society. 615 24$aComputer Communication Networks. 615 24$aSpecial Purpose and Application-Based Systems. 615 24$aComputer Application in Administrative Data Processing. 676 $a324.6/3 701 $aRyan$b Peter$f1957-$01756192 701 $aSchoenmakers$b Berry$01756193 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484922703321 996 $aE-voting and identity$94193322 997 $aUNINA