This book constitutes the refereed proceedings of the 14th International Conference on the Theory and Application of Cryptology ...
اقرأ المزيدThe book is organized in topical sections on Software and Multimedia security, Public-key cryptography, Network security, ...
اقرأ المزيدThe book is organized in topical sections on Software and Multimedia security, Public-key cryptography, Network security, ...
اقرأ المزيدThe two volumes of Altering Nature consider the complex ways that concepts of 'nature' and 'the natural' are understood ...
اقرأ المزيدThe book proposes a compelling way to elect some 500,000 officials in public elections. After a generation of discussion ...
اقرأ المزيدThis book constitutes the refereed proceedings of the5th IFIP Conference e-Commerce, e-Business, and e-Government (I3E’2005), ...
اقرأ المزيدThis open access book explores how children, parents, and survivors reshaped the politics of child protection in late twentieth-century ...
اقرأ المزيدThese proceedings contain the papers selected for presentation at the 10th - ropean Symposium on Research in Computer Security ...
اقرأ المزيدThis book address issues such as data protection; security protocols; systems; web and network security; privacy; threat ...
اقرأ المزيدThis book address issues such as data protection; security protocols; systems; web and network security; privacy; threat ...
اقرأ المزيدIt begins with a historical overview of the discovery of Condorcet's Paradox in the 18th Century, reviews numerous studies ...
اقرأ المزيدThis book raises crucial questions about the citizenship of the European Union. Is it a new citizenship beyond the nation-state ...
اقرأ المزيدThis book describes the voting procedures by which majority rule may be replaced by a more consensual system of governance. The ...
اقرأ المزيدTaming the Dynamics of Disributed Data - DISTRIBUTED COMPUTING -- Data in Your Space -- Enabling Technologies for Harnessing ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 8th International Conference on E-Democracy, E-Democracy 2019, held ...
اقرأ المزيدVoting and identity have a very delicate relationship. Only a few processes - pendso much on an identity management respecting ...
اقرأ المزيدVoting and identity have a very delicate relationship. Only a few processes - pendso much on an identity management respecting ...
اقرأ المزيدThe volume includes information and technology to support and improve public policies and government operations, engage citizens, ...
اقرأ المزيدThe volume includes information and technology to support and improve public policies and government operations, engage citizens, ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 4th International Conference on Electronic Government, EGOV 2005, held ...
اقرأ المزيد