MARC details
000 -LEADER |
fixed length control field |
04552nam a2200229Ia 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
NULRC |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20250520102819.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
250520s9999 xx 000 0 und d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9783319271637 |
040 ## - CATALOGING SOURCE |
Transcribing agency |
NULRC |
050 ## - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA 76.9 .E34 2015 |
245 #0 - TITLE STATEMENT |
Title |
E-democracy-citizen rights in the world of the new computing paradigms / |
Statement of responsibility, etc. |
International ICST Conference on E-Democracy (6th : 2015 : Athens, Greece, Sokratis K Katsikas(Editor), Alexander B Sideridis (Editor) |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
Cham, Switzerland : |
Name of publisher, distributor, etc. |
Springer, |
Date of publication, distribution, etc. |
c2015 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xiii, 234 pages : |
Other physical details |
illustrations ; |
Dimensions |
24 cm. |
365 ## - TRADE PRICE |
Price amount |
USD56.11 |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Includes bibliographical references and index. |
505 ## - FORMATTED CONTENTS NOTE |
Formatted contents note |
Intro; Preface; Organization; Contents; Privacy in E-Voting, E-Polls and E-Surveys; On the Necessity of Auditing for Election Privacy in e-Voting Systems; 1 Introduction; 2 Preliminaries; 2.1 Notation; 2.2 Threshold Public Key Encryption Schemes; 2.3 Zero-Knowledge Proofs; 3 A General TPKE-based e-Voting System; 3.1 Entities of an e-Voting System; 3.2 Description; 4 A Man-in-the-middle Attack Against Voter Privacy; 4.1 The System Vulnerability and Our MitM Attacks; 4.2 Instantiation of Our MitM Attack Against Helios; 4.3 Countermeasures; 5 Implementation and Deployment Guidelines 5.1 Supporting Trustee Auditing5.2 Providing Proper Instructions for the Audit-or-cast Step; 5.3 Maintaining the Uniqueness of Ballot Trackers; 5.4 Implementing ZK Proofs Properly; References; A Comparison of the Effects of Face-to-Face and Online Deliberation on Young Students' Attitudes About Public Opinion Polls; Abstract; 1 Introduction; 2 Effects of Face-to-Face and Online Deliberation; 3 Research Objectives; 4 Method; 4.1 Procedures; 4.2 Deliberation Topic and Experts; 4.3 Questionnaire and Measurement of Opinions; 4.4 Results; 5 Conclusion; Acknowledgment; Appendix A; References A Privacy-Friendly Method to Reward Participants of Online-Surveys1 Necessity for Privacy-Friendly Prizes; 2 Legal Requirements; 3 Objectives and Functional Requirements; 4 Closed User Groups; 4.1 High-Level Description; 4.2 Technical Description; 5 Open User Groups; 5.1 Introducing an Identity Provider; 5.2 Introducing a Trustee; 6 Further Variants; 6.1 Solution for the Case of Low Participation; 6.2 Solution with Winner's Anonymity; 7 Experience with a Paper-Based Variant; 8 Related Work; 9 Conclusion; References; Security and Privacy in New Computing Paradigms Cloud Computing Security Requirements and a Methodology for Their AuditingAbstract; 1 Introduction; 2 Cloud Specific Security Threats; 3 General Recommendations for the Security Policies in Saas Environments; 4 Proposed Model-Methodology; 5 Conclusions; References; A Method for Privacy-Preserving Context-Aware Mobile Recommendations; Abstract; 1 Introduction; 2 Factors Affecting Mobile Recommender Systems; 2.1 Recommendation Method; 2.2 Context; 2.3 Privacy; 3 Proposed Method; 3.1 Proposed Privacy Method; 4 Experimental Evaluation; 4.1 Real Dataset; 4.2 Performance Evaluation; 5 Related Work 6 Conclusions and Future WorkReferences; Privacy in Online Social Networks; Privacy and Facebook Universities Students' Communities for Confessions and Secrets: The Greek Case; Abstract; 1 Introduction; 2 Related Work and Question Raised; 3 The New Student Communities on Facebook; 4 Methodology; 5 Results; 5.1 Administrators' Posts Entity Data Model; 5.2 Users' Posts Entity Data Model; 5.3 Other Findings and Future Research; 6 Discussion-Conclusions; References; Tagged Data Breaches in Online Social Networks; Abstract; 1 Introduction; 2 Tagged Content Types; 3 Privacy in Tagged Content |
520 ## - SUMMARY, ETC. |
Summary, etc. |
This book constitutes the refereed proceedings of the 6th International Conference on E-Democracy, E-Democracy 2015, held in Athens, Greece, in December 2015. The 13 revised full papers presented together with 8 extended abstracts were carefully selected from 33 submissions. The papers are organized in topical sections on privacy in e-voting, e-polls and e-surveys; security and privacy in new computing paradigms; privacy in online social networks; e-government and e-participation; legal issues. The book also contains the extended abstracts describing progress within European research and development projects on security and privacy in the cloud; secure architectures and applications; enabling citizen-to-government communication. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
INTERNET IN PUBLIC ADMINISTRATION -- CONGRESSES |
700 ## - ADDED ENTRY--PERSONAL NAME |
Personal name |
Katsikas, Sokratis K.;Sideridis, Alexander B. |
Relator term |
editor;co-editor |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Library of Congress Classification |
Koha item type |
Books |