Electronic Books

Total Books: 1 - 20 /30
Advances in Cryptology - ASIACRYPT 2008 : 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings

This book constitutes the refereed proceedings of the 14th International Conference on the Theory and Application of Cryptology ...

Lee mas
Approval Voting

The book proposes a compelling way to elect some 500,000 officials in public elections. After a generation of discussion ...

Lee mas
Challenges of Expanding Internet: E-Commerce, E-Business, and E-Government

This book constitutes the refereed proceedings of the5th IFIP Conference e-Commerce, e-Business, and e-Government (I3E’2005), ...

Lee mas
Computer Security - ESORICS 2005

These proceedings contain the papers selected for presentation at the 10th - ropean Symposium on Research in Computer Security ...

Lee mas
Computer Security – ESORICS 2007

This book address issues such as data protection; security protocols; systems; web and network security; privacy; threat ...

Lee mas
Computer Security – ESORICS 2007

This book address issues such as data protection; security protocols; systems; web and network security; privacy; threat ...

Lee mas
Condorcets Paradox

It begins with a historical overview of the discovery of Condorcet's Paradox in the 18th Century, reviews numerous studies ...

Lee mas
Debating European Citizenship

This book raises crucial questions about the citizenship of the European Union. Is it a new citizenship beyond the nation-state ...

Lee mas
Designing an All-Inclusive Democracy : Consensual Voting Procedures For Use in Parliaments, Councils and Committees

This book describes the voting procedures by which majority rule may be replaced by a more consensual system of governance. The ...

Lee mas
E-Voting and Identity

Voting and identity have a very delicate relationship. Only a few processes - pendso much on an identity management respecting ...

Lee mas
E-Voting and Identity

Voting and identity have a very delicate relationship. Only a few processes - pendso much on an identity management respecting ...

Lee mas
Electronic Government

The volume includes information and technology to support and improve public policies and government operations, engage citizens, ...

Lee mas
Electronic Government

The volume includes information and technology to support and improve public policies and government operations, engage citizens, ...

Lee mas
Electronic Government (vol. # 3591)

This book constitutes the refereed proceedings of the 4th International Conference on Electronic Government, EGOV 2005, held ...

Lee mas
European E-Democracy in Practice

This book explores how digital tools and social media technologies can contribute to better participation and involvement ...

Lee mas
Financial Cryptography

Constitutes the post-proceedings of the 5th International Conference on Financial Cryptography held in the British West Indies ...

Lee mas
Financial Cryptography and Data Security

This book cover all aspects of securing transactions and systems, which this year included a range of technical areas such ...

Lee mas
Financial Cryptography and Data Security

This book cover all aspects of securing transactions and systems, which this year included a range of technical areas such ...

Lee mas
Financial Cryptography and Data Security (vol. # 3570)

The 9th International Conference on Financial Cryptography and Data Security (FC 2005) was held in the Commonwealth of Dominica ...

Lee mas
Financial Cryptography and Data Security (vol. # 4107)

This book constitutes the thoroughly refereed post-proceedings of the 10th International Conference on Financial Cryptography ...

Lee mas
Total Books: 1 - 20 /30