000 | 02994nam a22003975i 4500 | ||
---|---|---|---|
001 | 308156 | ||
003 | MX-SnUAN | ||
005 | 20160429160202.0 | ||
007 | cr nn 008mamaa | ||
008 | 150903s2013 gw | o |||| 0|eng d | ||
020 |
_a9783642391859 _99783642391859 |
||
024 | 7 |
_a10.1007/9783642391859 _2doi |
|
035 | _avtls000361692 | ||
039 | 9 |
_a201509030624 _bVLOAD _c201405070318 _dVLOAD _y201402210953 _zstaff |
|
040 |
_aMX-SnUAN _bspa _cMX-SnUAN _erda |
||
050 | 4 | _aQA76.9.A25 | |
100 | 1 |
_aHeather, James. _eeditor. _9347987 |
|
245 | 1 | 0 |
_aE-Voting and Identify : _b4th International Conference, Vote-ID 2013, Guildford, UK, July 17-19, 2013. Proceedings / _cedited by James Heather, Steve Schneider, Vanessa Teague. |
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2013. |
|
300 |
_ax, 211 páginas 29 ilustraciones _brecurso en línea. |
||
336 |
_atexto _btxt _2rdacontent |
||
337 |
_acomputadora _bc _2rdamedia |
||
338 |
_arecurso en línea _bcr _2rdacarrier |
||
347 |
_aarchivo de texto _bPDF _2rda |
||
490 | 0 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v7985 |
|
500 | _aSpringer eBooks | ||
505 | 0 | _aScaling Privacy Guarantees in Code-Verification Elections -- On the Specification and Verification of Voting Schemes -- Formal Model-based Validation for Tally Systems -- Vote Casting In Any Preferred Constituency: A New Voting Channel -- Attacking the Verification Code Mechanism in the Norwegian Internet Voting System.- A Formal Model for the Requirement of Verifiability in Electronic Voting by means of a Bulletin Board -- Analysis of an Electronic Boardroom Voting System -- Dispute Resolution in Accessible Voting Systems: The Design and Use of Audiotegrity -- Mental Models of Verifiability in Voting -- Towards a Practical Internet Voting Scheme Based on Malleable Proofs -- A Practical Coercion Resistant Voting Scheme Revisited. | |
520 | _aThis book constitutes the thoroughly refereed conference proceedings of the 4th International Conference on E-Voting and Identity, VoteID 2013, held in Guildford, UK, during July 17-19, 2013. The 12 revised full papers presented were carefully selected from 26 submissions. The papers include a range of works on end-to-end verifiable election systems, verifiably correct complex tallying algorithms, human perceptions of verifiability, formal models of verifiability and, of course, attacks on systems formerly advertised as verifiable | ||
590 | _aPara consulta fuera de la UANL se requiere clave de acceso remoto. | ||
700 | 1 |
_aSchneider, Steve. _eeditor. _9329175 |
|
700 | 1 |
_aTeague, Vanessa. _eeditor. _9347988 |
|
710 | 2 |
_aSpringerLink (Servicio en línea) _9299170 |
|
776 | 0 | 8 |
_iEdición impresa: _z9783642391842 |
856 | 4 | 0 |
_uhttp://remoto.dgb.uanl.mx/login?url=http://dx.doi.org/10.1007/978-3-642-39185-9 _zConectar a Springer E-Books (Para consulta externa se requiere previa autentificación en Biblioteca Digital UANL) |
942 | _c14 | ||
999 |
_c308156 _d308156 |