|
|
|
|
LEADER |
03449nam a22006255i 4500 |
001 |
978-3-319-22270-7 |
003 |
DE-He213 |
005 |
20210624202759.0 |
007 |
cr nn 008mamaa |
008 |
150812s2015 gw | s |||| 0|eng d |
020 |
|
|
|a 9783319222707
|9 978-3-319-22270-7
|
024 |
7 |
|
|a 10.1007/978-3-319-22270-7
|2 doi
|
050 |
|
4 |
|a QA76.9.D335
|
072 |
|
7 |
|a GPJ
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a GPJ
|2 thema
|
072 |
|
7 |
|a URY
|2 thema
|
082 |
0 |
4 |
|a 005.82
|2 23
|
245 |
1 |
0 |
|a E-Voting and Identity
|h [electronic resource] :
|b 5th International Conference, VoteID 2015, Bern, Switzerland, September 2-4, 2015, Proceedings /
|c edited by Rolf Haenni, Reto E. Koenig, Douglas Wikström.
|
250 |
|
|
|a 1st ed. 2015.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2015.
|
300 |
|
|
|a IX, 173 p. 33 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Security and Cryptology ;
|v 9269
|
505 |
0 |
|
|a Real-world electronic systems -- Advanced voting protocols;.-Document analysis -- Machine-checked reasoning -- E-voting system in court.
|
520 |
|
|
|a This book constitutes the thoroughly refereed conference proceedings of the 5th International Conference on E-Voting and Identity, VoteID 2015, held in Bern, Switzerland, in September 2015. The 10 revised full papers presented, including one keynote and three invited talks, were carefully selected from 26 submissions. The papers deal with real-world electronic systems; advanced voting protocols; document analysis, machine-checked reasoning, e-voting system in court.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computer communication systems.
|
650 |
|
0 |
|a Special purpose computers.
|
650 |
|
0 |
|a Application software.
|
650 |
|
0 |
|a Computers and civilization.
|
650 |
1 |
4 |
|a Cryptology.
|0 https://scigraph.springernature.com/ontologies/product-market-codes/I28020
|
650 |
2 |
4 |
|a Systems and Data Security.
|0 https://scigraph.springernature.com/ontologies/product-market-codes/I28060
|
650 |
2 |
4 |
|a Computer Communication Networks.
|0 https://scigraph.springernature.com/ontologies/product-market-codes/I13022
|
650 |
2 |
4 |
|a Special Purpose and Application-Based Systems.
|0 https://scigraph.springernature.com/ontologies/product-market-codes/I13030
|
650 |
2 |
4 |
|a Computer Appl. in Administrative Data Processing.
|0 https://scigraph.springernature.com/ontologies/product-market-codes/I2301X
|
650 |
2 |
4 |
|a Computers and Society.
|0 https://scigraph.springernature.com/ontologies/product-market-codes/I24040
|
700 |
1 |
|
|a Haenni, Rolf.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Koenig, Reto E.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Wikström, Douglas.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319222714
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319222691
|
830 |
|
0 |
|a Security and Cryptology ;
|v 9269
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-319-22270-7
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|