標題: Titlebook: E-Democracy: Citizen Rights in the World of the New Computing Paradigms; 6th International Co Sokratis K. Katsikas,Alexander B. Sideridis C [打印本頁] 作者: 婉言 時間: 2025-3-21 18:46
書目名稱E-Democracy: Citizen Rights in the World of the New Computing Paradigms影響因子(影響力)
書目名稱E-Democracy: Citizen Rights in the World of the New Computing Paradigms影響因子(影響力)學(xué)科排名
書目名稱E-Democracy: Citizen Rights in the World of the New Computing Paradigms網(wǎng)絡(luò)公開度
書目名稱E-Democracy: Citizen Rights in the World of the New Computing Paradigms網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱E-Democracy: Citizen Rights in the World of the New Computing Paradigms被引頻次
書目名稱E-Democracy: Citizen Rights in the World of the New Computing Paradigms被引頻次學(xué)科排名
書目名稱E-Democracy: Citizen Rights in the World of the New Computing Paradigms年度引用
書目名稱E-Democracy: Citizen Rights in the World of the New Computing Paradigms年度引用學(xué)科排名
書目名稱E-Democracy: Citizen Rights in the World of the New Computing Paradigms讀者反饋
書目名稱E-Democracy: Citizen Rights in the World of the New Computing Paradigms讀者反饋學(xué)科排名
作者: Console 時間: 2025-3-21 21:37
voted. We suggest compulsory trustee auditing as countermeasure for this type of man-in-the-middle attacks. Furthermore, we propose a list of guidelines to avoid some common, subtle, yet important problems that may appear during the implementation of any TPKE-based e-voting system.作者: 值得贊賞 時間: 2025-3-22 00:34 作者: Cerebrovascular 時間: 2025-3-22 07:48 作者: HAWK 時間: 2025-3-22 10:24
On the Necessity of Auditing for Election Privacy in e-Voting Systems voted. We suggest compulsory trustee auditing as countermeasure for this type of man-in-the-middle attacks. Furthermore, we propose a list of guidelines to avoid some common, subtle, yet important problems that may appear during the implementation of any TPKE-based e-voting system.作者: 啪心兒跳動 時間: 2025-3-22 16:37 作者: 啪心兒跳動 時間: 2025-3-22 17:50 作者: Gentry 時間: 2025-3-22 23:47
1865-0929 acy 2015, held in Athens,Greece, in December 2015..The 13 revised full paperspresented together with 8 extended abstracts were carefully selected from 33submissions. The papers are organized in topical sections on?privacy ine-voting, e-polls and e-surveys;?security and privacy in new computingparadi作者: infringe 時間: 2025-3-23 02:22 作者: 出生 時間: 2025-3-23 06:02
Citizen e-Empowerment in Greek and Czech Municipalitiesowerment Index has been used for the two case studies to estimate the level of citizen electronic empowerment. Next, the paper presents the analysis results of the measurements, showing that both countries are at low to moderate level of e-empowerment.作者: 象形文字 時間: 2025-3-23 13:41 作者: scrutiny 時間: 2025-3-23 15:37 作者: conceal 時間: 2025-3-23 19:56 作者: 暖昧關(guān)系 時間: 2025-3-24 00:55 作者: 忘恩負義的人 時間: 2025-3-24 03:31 作者: 通知 時間: 2025-3-24 07:00
https://doi.org/10.1007/978-3-662-55612-2r database jurisprudence, highlighting contract as a means to enclose data into absolute proprietary models in a way completely unforeseeable until then. We are left behind to watch the enclosing of open data acquire a legitimization never before possible.作者: 去才蔑視 時間: 2025-3-24 12:49 作者: freight 時間: 2025-3-24 18:09 作者: ALIAS 時間: 2025-3-24 21:20
A Method for Privacy-Preserving Context-Aware Mobile Recommendationsns. However due to privacy concerns users are not willing to provide the required personal information to make these systems usable. In response to the privacy concerns of users we present a method of privacy preserving context-aware mobile recommendations and show that it is both practical and effective.作者: Nucleate 時間: 2025-3-25 02:06
How Open Data Become Proprietary in the Court of Justice of the European Unionr database jurisprudence, highlighting contract as a means to enclose data into absolute proprietary models in a way completely unforeseeable until then. We are left behind to watch the enclosing of open data acquire a legitimization never before possible.作者: Malfunction 時間: 2025-3-25 07:15 作者: Assignment 時間: 2025-3-25 09:50 作者: 積習難改 時間: 2025-3-25 15:42
,Comparison of Pt–Fe and Pt–Ni Catalysts,nal policy as codified in article 200A CPC, adumbrates its general outline, offers a critical overview of its problematic parameters, highlights the ensuing rule of law deficiencies and forwards . ameliorative suggestions.作者: 使堅硬 時間: 2025-3-25 18:27 作者: 一再煩擾 時間: 2025-3-25 23:45 作者: LAY 時間: 2025-3-26 03:27
https://doi.org/10.1007/978-3-319-27164-4cloud computing; computing in government; data protection; digital forensics; e-democracy; e-government; e作者: 空氣 時間: 2025-3-26 07:36
978-3-319-27163-7Springer International Publishing Switzerland 2015作者: Congeal 時間: 2025-3-26 12:29 作者: optic-nerve 時間: 2025-3-26 16:27 作者: 神圣將軍 時間: 2025-3-26 17:45
necessity of auditing to protect voter privacy in an e-voting system has been mostly overlooked. In this work, we investigate election privacy issues that appear in the state-of-the-art implementations of e-voting systems that apply . (TPKE) in the client like Helios and use a bulletin board (BB). 作者: Promotion 時間: 2025-3-26 21:00 作者: liaison 時間: 2025-3-27 05:00 作者: 一再煩擾 時間: 2025-3-27 06:44
Mary-Ann Stanley,Owen Lee Griffithsn cloud environments is much harder when compared to other traditional IT systems due to specific cloud characteristics like: architecture, openness, multi-tenancy etc. Conventional security mechanisms are no longer suitable for applications and data in the cloud, since new security requirements hav作者: 大都市 時間: 2025-3-27 11:12
Big Data and Its Implication in China,tables at any given point in time and in any possible location. Mobile recommender systems are designed for the specific goal of mobile recommendations, such as mobile commerce or tourism and are ported to a mobile device for this purpose. They utilize a specific recommendation method, like collabor作者: abnegate 時間: 2025-3-27 14:33 作者: lipids 時間: 2025-3-27 20:57
r characteristics, and not only their URLs. The semantic interoperability creates difficulties in enforcing privacy control mechanisms that will solve authorization conflicts when accessing the tagged sharing content. In this paper we investigate whether the visibility levels in tagged content are a作者: TRACE 時間: 2025-3-28 01:23 作者: 老人病學(xué) 時間: 2025-3-28 06:02 作者: photopsia 時間: 2025-3-28 07:27
Advances in 21st Century Human Settlements context of Greek municipalities. The proposed model consists of four categories, 14 factors/indices and 83 criteria. The framework incorporates the different aspects of e-government as well as e-democracy. To develop and validate the model two research undertakings were conducted: one survey that c作者: 有斑點 時間: 2025-3-28 14:10
Youth and the Threats to Socialismovernment Systems and applications” for citizens and business. These smart systems are aiming to further improve everyday lives, expand business frontiers, and facilitate the movement of citizens by reducing the constraints imposed by existing borders between Member States of a federation like in ca作者: geometrician 時間: 2025-3-28 16:45 作者: dominant 時間: 2025-3-28 19:36 作者: 羽飾 時間: 2025-3-29 00:03 作者: Vertebra 時間: 2025-3-29 03:54
Tagged Data Breaches in Online Social Networkse Information (PII) exposed to unintended audiences. The results indicate that the protection of OSN users’ tagged PII lacks privacy controls that can fully protect the tagged sharing content and that the current mechanisms support access control for selected pieces of resources with selected groups作者: 文件夾 時間: 2025-3-29 07:36
Smart Cross-Border e-Gov Systems and Applicationsically important areas of Life Sciences. Smart Cross-Border e-Government Systems will be characterized by their ability to be used by governmental organizations, citizens, business and any combination thereof independently of their location and nationality, in a cross border environment based on sha作者: 牌帶來 時間: 2025-3-29 11:36 作者: hypotension 時間: 2025-3-29 19:06
e Information (PII) exposed to unintended audiences. The results indicate that the protection of OSN users’ tagged PII lacks privacy controls that can fully protect the tagged sharing content and that the current mechanisms support access control for selected pieces of resources with selected groups作者: 北極人 時間: 2025-3-29 22:28 作者: 懸崖 時間: 2025-3-30 00:15
E-Democracy: Citizen Rights in the World of the New Computing Paradigms6th International Co作者: Thyroxine 時間: 2025-3-30 06:55
On the Necessity of Auditing for Election Privacy in e-Voting Systems necessity of auditing to protect voter privacy in an e-voting system has been mostly overlooked. In this work, we investigate election privacy issues that appear in the state-of-the-art implementations of e-voting systems that apply . (TPKE) in the client like Helios and use a bulletin board (BB). 作者: Dappled 時間: 2025-3-30 11:09 作者: chemical-peel 時間: 2025-3-30 12:37
A Privacy-Friendly Method to Reward Participants of Online-Surveysotential participants is offering a prize that is awarded to one of them. For that purpose the pollster usually collects the E-mail addresses or other personal data of the participants, enabling him to notify the winner. Collecting the participant’s personal data may, however, conflict with the pote