This book constitutes the refereed proceedings of the 14th International Conference on the Theory and Application of Cryptology ...
اقرأ المزيد
The book proposes a compelling way to elect some 500,000 officials in public elections. After a generation of discussion ...
اقرأ المزيد
This book constitutes the refereed proceedings of the5th IFIP Conference e-Commerce, e-Business, and e-Government (I3E’2005), ...
اقرأ المزيد
These proceedings contain the papers selected for presentation at the 10th - ropean Symposium on Research in Computer Security ...
اقرأ المزيد
This book address issues such as data protection; security protocols; systems; web and network security; privacy; threat ...
اقرأ المزيد
This book address issues such as data protection; security protocols; systems; web and network security; privacy; threat ...
اقرأ المزيد
It begins with a historical overview of the discovery of Condorcet's Paradox in the 18th Century, reviews numerous studies ...
اقرأ المزيد
This book raises crucial questions about the citizenship of the European Union. Is it a new citizenship beyond the nation-state ...
اقرأ المزيد
This book describes the voting procedures by which majority rule may be replaced by a more consensual system of governance. The ...
اقرأ المزيد
Voting and identity have a very delicate relationship. Only a few processes - pendso much on an identity management respecting ...
اقرأ المزيد
Voting and identity have a very delicate relationship. Only a few processes - pendso much on an identity management respecting ...
اقرأ المزيد
The volume includes information and technology to support and improve public policies and government operations, engage citizens, ...
اقرأ المزيد
The volume includes information and technology to support and improve public policies and government operations, engage citizens, ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 4th International Conference on Electronic Government, EGOV 2005, held ...
اقرأ المزيد
This book explores how digital tools and social media technologies can contribute to better participation and involvement ...
اقرأ المزيد
Constitutes the post-proceedings of the 5th International Conference on Financial Cryptography held in the British West Indies ...
اقرأ المزيد
This book cover all aspects of securing transactions and systems, which this year included a range of technical areas such ...
اقرأ المزيد
This book cover all aspects of securing transactions and systems, which this year included a range of technical areas such ...
اقرأ المزيد
The 9th International Conference on Financial Cryptography and Data Security (FC 2005) was held in the Commonwealth of Dominica ...
اقرأ المزيد
This book constitutes the thoroughly refereed post-proceedings of the 10th International Conference on Financial Cryptography ...
اقرأ المزيد