Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

CeDEM11
  • Language: en
  • Pages: 385

CeDEM11

None

CeDEM14
  • Language: en
  • Pages: 620

CeDEM14

  • Type: Book
  • -
  • Published: 2014
  • -
  • Publisher: MV-Verlag

None

E-Voting and Identity
  • Language: en
  • Pages: 217

E-Voting and Identity

  • Type: Book
  • -
  • Published: 2013-07-08
  • -
  • Publisher: Springer

This book constitutes the thoroughly refereed conference proceedings of the 4th International Conference on E-Voting and Identity, Vote ID 2013, held in Guildford, UK, during July 17-19, 2013. The 12 revised full papers presented were carefully selected from 26 submissions. The papers include a range of works on end-to-end verifiable election systems, verifiably correct complex tallying algorithms, human perceptions of verifiability, formal models of verifiability and, of course, attacks on systems formerly advertised as verifiable.

Human Aspects of Information Security, Privacy, and Trust
  • Language: en
  • Pages: 460

Human Aspects of Information Security, Privacy, and Trust

  • Type: Book
  • -
  • Published: 2014-06-07
  • -
  • Publisher: Springer

This book constitutes the proceedings of the Second International Conference on Human Aspects of Information Security, Privacy, and Trust, HAS 2014, held as part of HCI International 2014 which took place in Heraklion, Crete, Greece, in June 2014 and incorporated 14 conferences which similar thematic areas. HCII 2014 received a total of 4766 submissions, of which 1476 papers and 220 posters were accepted for publication after a careful reviewing process. These papers address the latest research and development efforts and highlight the human aspects of design and use of computing systems. The papers thoroughly cover the entire field of Human-Computer Interaction, addressing major advances in knowledge and effective use of computers in a variety of application areas. The 38 papers presented in the HAS 2014 proceedings are organized in topical sections named: usable security; authentication and passwords; security policy and awareness; human behaviour in cyber security and privacy issues.

Evaluation of Electronic Voting
  • Language: en
  • Pages: 245

Evaluation of Electronic Voting

  • Categories: Law

Electronic voting has a young and attractive history, both in the design of basic cryptographic methods and protocols and in the application by communities who are in the vanguard of technologies. The crucial aspect of security for electronic voting systems is subject to research by computer scientists as well as by legal, social and political scientists. The essential question is how to provide a trustworthy base for secure electronic voting, and hence how to prevent accidental or malicious abuse of electronic voting in elections. To address this problem, Volkamer structured her work into four parts: "Fundamentals" provides an introduction to the relevant issues of electronic voting. "Requi...

Chaos, Complexity and Leadership 2020
  • Language: en
  • Pages: 317

Chaos, Complexity and Leadership 2020

This book analyzes a range of new developments in various fields concerning the concepts of chaos and complexity theory. The proceedings of the 7th International Symposium on Chaos, Complexity and Leadership feature newly developed concepts involving various research methodologies for identifying chaos and complexity in different fields of the sciences and leadership. In addition, it explores chaotic and complex systems from all fields of knowledge in order to stake a claim of prevalence of compatibility between knowledge fields. Particular emphasis is placed on exploring non-linearity in order to open a discussion on new approaches to and perspectives on chaos, complexity and leadership. Re...

ICT Systems Security and Privacy Protection
  • Language: en
  • Pages: 413

ICT Systems Security and Privacy Protection

  • Type: Book
  • -
  • Published: 2016-05-13
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the 31st IFIP TC 11 International Conference on ICT Systems Security and Privacy Protection, SEC 2016, held in Ghent, Belgium, in May/June 2016. The 27 revised full papers presented were carefully reviewed and selected from 139 submissions. The papers are organized in topical sections on cryptographic protocols, human aspects of security, cyber infrastructure, social networks, software vulnerabilities, TPM and internet of things, sidechannel analysis, software security, and privacy.

E-Voting and Identity
  • Language: en
  • Pages: 267

E-Voting and Identity

  • Type: Book
  • -
  • Published: 2012-09-12
  • -
  • Publisher: Springer

This volume constitutes the thoroughly refereed post-conference proceedings of the Third Conference on E-Voting and Identity, VOTE-ID 2011, held in Tallinn, Estonia, in September 2011. The 15 revised full papers presented were carefully reviewed and selected from 33 submissions. They are organized in topical sections on Norwegian internet voting, voting systems I and II, prêt à voter and trivitas, and experiences.

Design, Development, and Use of Secure Electronic Voting Systems
  • Language: en
  • Pages: 290

Design, Development, and Use of Secure Electronic Voting Systems

  • Type: Book
  • -
  • Published: 2014-03-31
  • -
  • Publisher: IGI Global

In modern electoral processes, Information and Communication Technologies play a crucial role, whether used in voter registration, ballot casting, or processing of results. Securing these systems is a necessary step in ensuring the fairness of the democratic process. Design, Development, and Use of Secure Electronic Voting Systems analyzes current research on the integration of modern technologies with traditional democratic systems, providing a framework for designing and deploying electronic voting systems in any context or society. Stakeholders, researchers, architects, designers, and scholars interested in the use of electronic systems in government processes will use this book to gain a broader understanding of some of the latest advances in this emerging field.

Security in Pervasive Computing
  • Language: en
  • Pages: 252

Security in Pervasive Computing

This book constitutes the refereed proceedings of the Third International Conference on Security in Pervasive Computing, SPC 2006, held in York, UK, in April 2006. The 16 revised papers presented together with the extended abstract of 1 invited talk were carefully reviewed and selected from 56 submissions. The papers are organized in topical sections on protocols, mechanisms, integrity, privacy and security, information flow and access control, and authentication.