E-democracy-citizen rights in the world of the new computing paradigms / International ICST Conference on E-Democracy (6th : 2015 : Athens, Greece, Sokratis K Katsikas(Editor), Alexander B Sideridis (Editor)
Material type:
- 9783319271637
- QA 76.9 .E34 2015

Item type | Current library | Home library | Collection | Call number | Copy number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|---|
![]() |
National University - Manila | LRC - Main General Circulation | Computer Science | GC QA 76.9 .E34 2015 (Browse shelf(Opens below)) | c.1 | Available | NULIB000013741 |
Browsing LRC - Main shelves, Shelving location: General Circulation, Collection: Computer Science Close shelf browser (Hides shelf browser)
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
GC QA 76.9 .C67 2011 Database Principles : fundamentals of design, implementation, and management / | GC QA 76.9 .C68 2012 Distributed systems : concepts and design / | GC QA 76.9 .D3 .G226 1990 Clipper dBASE III Plus Foxbase / | GC QA 76.9 .E34 2015 E-democracy-citizen rights in the world of the new computing paradigms / | GC QA 76.9 .F38 1998 Fault-tolerant parallel and distributed systems / | GC QA 76.9 .G87 2012 Design and analysis of algorithms / | GC QA 76.9 .H86 2015 Human-computer interaction : the fundamentals made easy / |
Includes bibliographical references and index.
Intro; Preface; Organization; Contents; Privacy in E-Voting, E-Polls and E-Surveys; On the Necessity of Auditing for Election Privacy in e-Voting Systems; 1 Introduction; 2 Preliminaries; 2.1 Notation; 2.2 Threshold Public Key Encryption Schemes; 2.3 Zero-Knowledge Proofs; 3 A General TPKE-based e-Voting System; 3.1 Entities of an e-Voting System; 3.2 Description; 4 A Man-in-the-middle Attack Against Voter Privacy; 4.1 The System Vulnerability and Our MitM Attacks; 4.2 Instantiation of Our MitM Attack Against Helios; 4.3 Countermeasures; 5 Implementation and Deployment Guidelines 5.1 Supporting Trustee Auditing5.2 Providing Proper Instructions for the Audit-or-cast Step; 5.3 Maintaining the Uniqueness of Ballot Trackers; 5.4 Implementing ZK Proofs Properly; References; A Comparison of the Effects of Face-to-Face and Online Deliberation on Young Students' Attitudes About Public Opinion Polls; Abstract; 1 Introduction; 2 Effects of Face-to-Face and Online Deliberation; 3 Research Objectives; 4 Method; 4.1 Procedures; 4.2 Deliberation Topic and Experts; 4.3 Questionnaire and Measurement of Opinions; 4.4 Results; 5 Conclusion; Acknowledgment; Appendix A; References A Privacy-Friendly Method to Reward Participants of Online-Surveys1 Necessity for Privacy-Friendly Prizes; 2 Legal Requirements; 3 Objectives and Functional Requirements; 4 Closed User Groups; 4.1 High-Level Description; 4.2 Technical Description; 5 Open User Groups; 5.1 Introducing an Identity Provider; 5.2 Introducing a Trustee; 6 Further Variants; 6.1 Solution for the Case of Low Participation; 6.2 Solution with Winner's Anonymity; 7 Experience with a Paper-Based Variant; 8 Related Work; 9 Conclusion; References; Security and Privacy in New Computing Paradigms Cloud Computing Security Requirements and a Methodology for Their AuditingAbstract; 1 Introduction; 2 Cloud Specific Security Threats; 3 General Recommendations for the Security Policies in Saas Environments; 4 Proposed Model-Methodology; 5 Conclusions; References; A Method for Privacy-Preserving Context-Aware Mobile Recommendations; Abstract; 1 Introduction; 2 Factors Affecting Mobile Recommender Systems; 2.1 Recommendation Method; 2.2 Context; 2.3 Privacy; 3 Proposed Method; 3.1 Proposed Privacy Method; 4 Experimental Evaluation; 4.1 Real Dataset; 4.2 Performance Evaluation; 5 Related Work 6 Conclusions and Future WorkReferences; Privacy in Online Social Networks; Privacy and Facebook Universities Students' Communities for Confessions and Secrets: The Greek Case; Abstract; 1 Introduction; 2 Related Work and Question Raised; 3 The New Student Communities on Facebook; 4 Methodology; 5 Results; 5.1 Administrators' Posts Entity Data Model; 5.2 Users' Posts Entity Data Model; 5.3 Other Findings and Future Research; 6 Discussion-Conclusions; References; Tagged Data Breaches in Online Social Networks; Abstract; 1 Introduction; 2 Tagged Content Types; 3 Privacy in Tagged Content
This book constitutes the refereed proceedings of the 6th International Conference on E-Democracy, E-Democracy 2015, held in Athens, Greece, in December 2015. The 13 revised full papers presented together with 8 extended abstracts were carefully selected from 33 submissions. The papers are organized in topical sections on privacy in e-voting, e-polls and e-surveys; security and privacy in new computing paradigms; privacy in online social networks; e-government and e-participation; legal issues. The book also contains the extended abstracts describing progress within European research and development projects on security and privacy in the cloud; secure architectures and applications; enabling citizen-to-government communication.
There are no comments on this title.