|
|
|
|
LEADER |
04327nam a22006735i 4500 |
001 |
978-3-030-60347-2 |
003 |
DE-He213 |
005 |
20210630151138.0 |
007 |
cr nn 008mamaa |
008 |
200924s2020 gw | s |||| 0|eng d |
020 |
|
|
|a 9783030603472
|9 978-3-030-60347-2
|
024 |
7 |
|
|a 10.1007/978-3-030-60347-2
|2 doi
|
050 |
|
4 |
|a QA76.9.D335
|
072 |
|
7 |
|a GPJ
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a GPJ
|2 thema
|
072 |
|
7 |
|a URY
|2 thema
|
082 |
0 |
4 |
|a 005.82
|2 23
|
245 |
1 |
0 |
|a Electronic Voting
|h [electronic resource] :
|b 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6–9, 2020, Proceedings /
|c edited by Robert Krimmer, Melanie Volkamer, Bernhard Beckert, Ralf Küsters, Oksana Kulyk, David Duenas-Cid, Mihkel Solvak.
|
250 |
|
|
|a 1st ed. 2020.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2020.
|
300 |
|
|
|a X, 229 p. 52 illus., 36 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Security and Cryptology ;
|v 12455
|
505 |
0 |
|
|a Electronic Voting -- E-voting -- Internet Voting -- Electronic Voting Machines -- Security -- Verifiability -- Verification -- Election Management Boards -- Risk Audit -- Elections.
|
520 |
|
|
|a This book constitutes the proceedings of the 5th International Conference on Electronic Voting, E-Vote-ID 2020, held online -due to COVID -19- in Bregenz, Austria, in October 2020. The 14 full papers presented were carefully reviewed and selected from 55 submissions. The conference collected the most relevant debates on the development of Electronic Voting, from aspects relating to security and usability through to practical experiences and applications of voting systems, also including legal, social or political aspects, amongst others; turning out to be an important global referent in relation to this issue.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Application software.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Computer communication systems.
|
650 |
|
0 |
|a Architecture, Computer.
|
650 |
1 |
4 |
|a Cryptology.
|0 https://scigraph.springernature.com/ontologies/product-market-codes/I28020
|
650 |
2 |
4 |
|a Computer Applications.
|0 https://scigraph.springernature.com/ontologies/product-market-codes/I23001
|
650 |
2 |
4 |
|a Security Services.
|0 https://scigraph.springernature.com/ontologies/product-market-codes/I28030
|
650 |
2 |
4 |
|a Mobile and Network Security.
|0 https://scigraph.springernature.com/ontologies/product-market-codes/I28050
|
650 |
2 |
4 |
|a Computer Communication Networks.
|0 https://scigraph.springernature.com/ontologies/product-market-codes/I13022
|
650 |
2 |
4 |
|a Computer System Implementation.
|0 https://scigraph.springernature.com/ontologies/product-market-codes/I13057
|
700 |
1 |
|
|a Krimmer, Robert.
|e editor.
|0 (orcid)0000-0002-0873-539X
|1 https://orcid.org/0000-0002-0873-539X
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Volkamer, Melanie.
|e editor.
|0 (orcid)0000-0003-2674-4043
|1 https://orcid.org/0000-0003-2674-4043
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Beckert, Bernhard.
|e editor.
|0 (orcid)0000-0002-9672-3291
|1 https://orcid.org/0000-0002-9672-3291
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Küsters, Ralf.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Kulyk, Oksana.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Duenas-Cid, David.
|e editor.
|0 (orcid)0000-0002-0451-4514
|1 https://orcid.org/0000-0002-0451-4514
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Solvak, Mihkel.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783030603465
|
776 |
0 |
8 |
|i Printed edition:
|z 9783030603489
|
830 |
|
0 |
|a Security and Cryptology ;
|v 12455
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-030-60347-2
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|