派博傳思國際中心

標題: Titlebook: E-Democracy: Citizen Rights in the World of the New Computing Paradigms; 6th International Co Sokratis K. Katsikas,Alexander B. Sideridis C [打印本頁]

作者: 婉言    時間: 2025-3-21 18:46
書目名稱E-Democracy: Citizen Rights in the World of the New Computing Paradigms影響因子(影響力)




書目名稱E-Democracy: Citizen Rights in the World of the New Computing Paradigms影響因子(影響力)學(xué)科排名




書目名稱E-Democracy: Citizen Rights in the World of the New Computing Paradigms網(wǎng)絡(luò)公開度




書目名稱E-Democracy: Citizen Rights in the World of the New Computing Paradigms網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱E-Democracy: Citizen Rights in the World of the New Computing Paradigms被引頻次




書目名稱E-Democracy: Citizen Rights in the World of the New Computing Paradigms被引頻次學(xué)科排名




書目名稱E-Democracy: Citizen Rights in the World of the New Computing Paradigms年度引用




書目名稱E-Democracy: Citizen Rights in the World of the New Computing Paradigms年度引用學(xué)科排名




書目名稱E-Democracy: Citizen Rights in the World of the New Computing Paradigms讀者反饋




書目名稱E-Democracy: Citizen Rights in the World of the New Computing Paradigms讀者反饋學(xué)科排名





作者: Console    時間: 2025-3-21 21:37
voted. We suggest compulsory trustee auditing as countermeasure for this type of man-in-the-middle attacks. Furthermore, we propose a list of guidelines to avoid some common, subtle, yet important problems that may appear during the implementation of any TPKE-based e-voting system.
作者: 值得贊賞    時間: 2025-3-22 00:34

作者: Cerebrovascular    時間: 2025-3-22 07:48

作者: HAWK    時間: 2025-3-22 10:24
On the Necessity of Auditing for Election Privacy in e-Voting Systems voted. We suggest compulsory trustee auditing as countermeasure for this type of man-in-the-middle attacks. Furthermore, we propose a list of guidelines to avoid some common, subtle, yet important problems that may appear during the implementation of any TPKE-based e-voting system.
作者: 啪心兒跳動    時間: 2025-3-22 16:37

作者: 啪心兒跳動    時間: 2025-3-22 17:50

作者: Gentry    時間: 2025-3-22 23:47
1865-0929 acy 2015, held in Athens,Greece, in December 2015..The 13 revised full paperspresented together with 8 extended abstracts were carefully selected from 33submissions. The papers are organized in topical sections on?privacy ine-voting, e-polls and e-surveys;?security and privacy in new computingparadi
作者: infringe    時間: 2025-3-23 02:22

作者: 出生    時間: 2025-3-23 06:02
Citizen e-Empowerment in Greek and Czech Municipalitiesowerment Index has been used for the two case studies to estimate the level of citizen electronic empowerment. Next, the paper presents the analysis results of the measurements, showing that both countries are at low to moderate level of e-empowerment.
作者: 象形文字    時間: 2025-3-23 13:41

作者: scrutiny    時間: 2025-3-23 15:37

作者: conceal    時間: 2025-3-23 19:56

作者: 暖昧關(guān)系    時間: 2025-3-24 00:55

作者: 忘恩負義的人    時間: 2025-3-24 03:31

作者: 通知    時間: 2025-3-24 07:00
https://doi.org/10.1007/978-3-662-55612-2r database jurisprudence, highlighting contract as a means to enclose data into absolute proprietary models in a way completely unforeseeable until then. We are left behind to watch the enclosing of open data acquire a legitimization never before possible.
作者: 去才蔑視    時間: 2025-3-24 12:49

作者: freight    時間: 2025-3-24 18:09

作者: ALIAS    時間: 2025-3-24 21:20
A Method for Privacy-Preserving Context-Aware Mobile Recommendationsns. However due to privacy concerns users are not willing to provide the required personal information to make these systems usable. In response to the privacy concerns of users we present a method of privacy preserving context-aware mobile recommendations and show that it is both practical and effective.
作者: Nucleate    時間: 2025-3-25 02:06
How Open Data Become Proprietary in the Court of Justice of the European Unionr database jurisprudence, highlighting contract as a means to enclose data into absolute proprietary models in a way completely unforeseeable until then. We are left behind to watch the enclosing of open data acquire a legitimization never before possible.
作者: Malfunction    時間: 2025-3-25 07:15

作者: Assignment    時間: 2025-3-25 09:50

作者: 積習難改    時間: 2025-3-25 15:42
,Comparison of Pt–Fe and Pt–Ni Catalysts,nal policy as codified in article 200A CPC, adumbrates its general outline, offers a critical overview of its problematic parameters, highlights the ensuing rule of law deficiencies and forwards . ameliorative suggestions.
作者: 使堅硬    時間: 2025-3-25 18:27

作者: 一再煩擾    時間: 2025-3-25 23:45

作者: LAY    時間: 2025-3-26 03:27
https://doi.org/10.1007/978-3-319-27164-4cloud computing; computing in government; data protection; digital forensics; e-democracy; e-government; e
作者: 空氣    時間: 2025-3-26 07:36
978-3-319-27163-7Springer International Publishing Switzerland 2015
作者: Congeal    時間: 2025-3-26 12:29

作者: optic-nerve    時間: 2025-3-26 16:27

作者: 神圣將軍    時間: 2025-3-26 17:45
necessity of auditing to protect voter privacy in an e-voting system has been mostly overlooked. In this work, we investigate election privacy issues that appear in the state-of-the-art implementations of e-voting systems that apply . (TPKE) in the client like Helios and use a bulletin board (BB).
作者: Promotion    時間: 2025-3-26 21:00

作者: liaison    時間: 2025-3-27 05:00

作者: 一再煩擾    時間: 2025-3-27 06:44
Mary-Ann Stanley,Owen Lee Griffithsn cloud environments is much harder when compared to other traditional IT systems due to specific cloud characteristics like: architecture, openness, multi-tenancy etc. Conventional security mechanisms are no longer suitable for applications and data in the cloud, since new security requirements hav
作者: 大都市    時間: 2025-3-27 11:12
Big Data and Its Implication in China,tables at any given point in time and in any possible location. Mobile recommender systems are designed for the specific goal of mobile recommendations, such as mobile commerce or tourism and are ported to a mobile device for this purpose. They utilize a specific recommendation method, like collabor
作者: abnegate    時間: 2025-3-27 14:33

作者: lipids    時間: 2025-3-27 20:57
r characteristics, and not only their URLs. The semantic interoperability creates difficulties in enforcing privacy control mechanisms that will solve authorization conflicts when accessing the tagged sharing content. In this paper we investigate whether the visibility levels in tagged content are a
作者: TRACE    時間: 2025-3-28 01:23

作者: 老人病學(xué)    時間: 2025-3-28 06:02

作者: photopsia    時間: 2025-3-28 07:27
Advances in 21st Century Human Settlements context of Greek municipalities. The proposed model consists of four categories, 14 factors/indices and 83 criteria. The framework incorporates the different aspects of e-government as well as e-democracy. To develop and validate the model two research undertakings were conducted: one survey that c
作者: 有斑點    時間: 2025-3-28 14:10
Youth and the Threats to Socialismovernment Systems and applications” for citizens and business. These smart systems are aiming to further improve everyday lives, expand business frontiers, and facilitate the movement of citizens by reducing the constraints imposed by existing borders between Member States of a federation like in ca
作者: geometrician    時間: 2025-3-28 16:45

作者: dominant    時間: 2025-3-28 19:36

作者: 羽飾    時間: 2025-3-29 00:03

作者: Vertebra    時間: 2025-3-29 03:54
Tagged Data Breaches in Online Social Networkse Information (PII) exposed to unintended audiences. The results indicate that the protection of OSN users’ tagged PII lacks privacy controls that can fully protect the tagged sharing content and that the current mechanisms support access control for selected pieces of resources with selected groups
作者: 文件夾    時間: 2025-3-29 07:36
Smart Cross-Border e-Gov Systems and Applicationsically important areas of Life Sciences. Smart Cross-Border e-Government Systems will be characterized by their ability to be used by governmental organizations, citizens, business and any combination thereof independently of their location and nationality, in a cross border environment based on sha
作者: 牌帶來    時間: 2025-3-29 11:36

作者: hypotension    時間: 2025-3-29 19:06
e Information (PII) exposed to unintended audiences. The results indicate that the protection of OSN users’ tagged PII lacks privacy controls that can fully protect the tagged sharing content and that the current mechanisms support access control for selected pieces of resources with selected groups
作者: 北極人    時間: 2025-3-29 22:28

作者: 懸崖    時間: 2025-3-30 00:15
E-Democracy: Citizen Rights in the World of the New Computing Paradigms6th International Co
作者: Thyroxine    時間: 2025-3-30 06:55
On the Necessity of Auditing for Election Privacy in e-Voting Systems necessity of auditing to protect voter privacy in an e-voting system has been mostly overlooked. In this work, we investigate election privacy issues that appear in the state-of-the-art implementations of e-voting systems that apply . (TPKE) in the client like Helios and use a bulletin board (BB).
作者: Dappled    時間: 2025-3-30 11:09

作者: chemical-peel    時間: 2025-3-30 12:37
A Privacy-Friendly Method to Reward Participants of Online-Surveysotential participants is offering a prize that is awarded to one of them. For that purpose the pollster usually collects the E-mail addresses or other personal data of the participants, enabling him to notify the winner. Collecting the participant’s personal data may, however, conflict with the pote




歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
融水| 卢龙县| 临沭县| 曲靖市| 阳春市| 栖霞市| 桐庐县| 齐河县| 达拉特旗| 兴城市| 视频| 大厂| 交口县| 鲜城| 南宁市| 丹阳市| 维西| 乌海市| 苍梧县| 兴和县| 彭阳县| 东阿县| 巴里| 泊头市| 正阳县| 和平区| 汾西县| 长宁县| 利辛县| 日喀则市| 梁山县| 河池市| 咸丰县| 游戏| 桃园市| 虹口区| 东阳市| 台安县| 通榆县| 中方县| 黑水县|