|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-3-319-22270-7 |
003 |
DE-He213 |
005 |
20220112185451.0 |
007 |
cr nn 008mamaa |
008 |
150812s2015 sz | s |||| 0|eng d |
020 |
|
|
|a 9783319222707
|9 978-3-319-22270-7
|
024 |
7 |
|
|a 10.1007/978-3-319-22270-7
|2 doi
|
050 |
|
4 |
|a QA268
|
072 |
|
7 |
|a GPJ
|2 bicssc
|
072 |
|
7 |
|a URY
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a GPJ
|2 thema
|
072 |
|
7 |
|a URY
|2 thema
|
082 |
0 |
4 |
|a 005.824
|2 23
|
245 |
1 |
0 |
|a E-Voting and Identity
|h [electronic resource] :
|b 5th International Conference, VoteID 2015, Bern, Switzerland, September 2-4, 2015, Proceedings /
|c edited by Rolf Haenni, Reto E. Koenig, Douglas Wikström.
|
250 |
|
|
|a 1st ed. 2015.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2015.
|
300 |
|
|
|a IX, 173 p. 33 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Security and Cryptology ;
|v 9269
|
505 |
0 |
|
|a Real-world electronic systems -- Advanced voting protocols;.-Document analysis -- Machine-checked reasoning -- E-voting system in court.
|
520 |
|
|
|a This book constitutes the thoroughly refereed conference proceedings of the 5th International Conference on E-Voting and Identity, VoteID 2015, held in Bern, Switzerland, in September 2015. The 10 revised full papers presented, including one keynote and three invited talks, were carefully selected from 26 submissions. The papers deal with real-world electronic systems; advanced voting protocols; document analysis, machine-checked reasoning, e-voting system in court.
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Computer networks .
|
650 |
|
0 |
|a Computers, Special purpose.
|
650 |
|
0 |
|a Information technology-Management.
|
650 |
|
0 |
|a Computers and civilization.
|
650 |
1 |
4 |
|a Cryptology.
|
650 |
2 |
4 |
|a Data and Information Security.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Special Purpose and Application-Based Systems.
|
650 |
2 |
4 |
|a Computer Application in Administrative Data Processing.
|
650 |
2 |
4 |
|a Computers and Society.
|
700 |
1 |
|
|a Haenni, Rolf.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Koenig, Reto E.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Wikström, Douglas.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319222714
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319222691
|
830 |
|
0 |
|a Security and Cryptology ;
|v 9269
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-3-319-22270-7
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|