Detalles de la Emisión
Detalles de la Emisión

< Ant.
Sig. >
 
Título Vol. 6, n. 3 (May.-Jun. , 2008): E - Voting.Emisión de Seriada
Parte de IEEE. Security & Privacy
Publicación New York : The Institute of Electrical and Electronics Engineers, Inc., 2008
Idioma Inglés;
Materia(s) Voto electrónico; VOTO - ELECTRÓNICO - SEGURIDAD; CONTEO DE VOTOS; VOTACIÓN - EXPLORACIÓN ÓPTICA; SEGURIDAD DEL PROCESO ELECTORAL; Informática; ANÁLISIS FORENCE DIGITAL; Sistema de seguridad; Criptografía; Virus informáticos; PROTECCIÓN DIGITAL;
Nota(s) Bibliografía: al final de cada artículo Notas al pie de texto
Resumen Con: 1. Features 1.1 Guest Editors'Introduction: New Research Results for Electronic Voting. / David R. Jefferson and Aviel D. Rubin.p.12. 1.2 A Three - Ballot - Based Secure Electronic Voting System. / Regivaldo G. Costa, Altair O. Santin, and Carlos A. Maziero.p.14. 1.3 The Dynamics of Counting and Recounting Votes. / Alec Yasinsac and Matt Bishop.p.22. 1.4 Evaluating Electronic Voting systems Equipped with Voter - Verified Paper Records. / Nirwan Ansari, Pitipatana Sakarindr, Ehsan Haghani, Chao Zhang, Aridaman K. Jain, and Yun Q. Shi.p.30. 1.5 Scantegrity: End-to-End Voter-Verifiable Optical-Scan Voting. / David Chaum, Aleks Essex, Richard Carback, Alan Sherman, Jeremy Clark, Stefan Popoveniuc, and Poorvi Vora.p.40. 1.6 An Optical Scan E-Voting System based on N-Version Programming. / Iñaki Goirizelaia, Maider Huarte, and Juanjo Unzilla, Ted Selker.p.47. 2. Departments 2.1 From the Editors 2.1.1 Up Scope. / Carl E. Landwehr.p.3. 2.2 New Briefs 2..2.1 News Briefs. / Brandi Ortega.p.6. 2.3 Interview 2.3.1 Silver Bullet Talks with Jon Swartz. / Gary McGraw.p.9. 2.4 Education 2.4.1 Teaching Digital Forensics to Undergraduate Students. / Lynn Batten and Lei Pan.p.54. 2.5 Privacy Interests 2.5.1 Considering New Privacy Laws in Australia. / Gordon Hughes, Sophie Dawson, and Tim Brookes.p.57. 2.6 Crypto Corner 2.6.1 A New Hash Competition. / William E. Burr.p.60. 2.7 Basic Training 2.7.1 Common Permissions in Microsoft Wndows Server 2008 and Windows Vista. / John R. Michener.p.63. 2.8 Attack Trends 2.8.1 When Malware Attacks (Anything but Windows). / Adam J. O'Donnell.p.68. 2.9 Secure Systems 2.9.1 Why do street-Smart people do stupid things online?. / Sergey, Bratus, Chris Masone, and Sean W. Smith.p.71. 2.10 Digital Protection 2.10.1 Digital rights management and individualized pricing. / Michael Lesk.p.76. 2.11 Building Securuty In 2.11.1 Security Lessons Learned from Société Générale. / Jeremy Epstein.p.80. 2.12. Emerging Standards 2.12.1 Internet Protocol Version 6. / Sheila Frankel and David Green.p.83. 2.12.2 Advertiser Index.p.56. 3. Columns 3.1 Learn by analogy or die trying. / Daniel E. Gerr JR.
Disponibilidad
CodBarras Localización Ubicación Habitual Signatura Estado Categoría Solicitar
0034003718Universidad de San Buenaventura - Sede BogotáColección Depósito IEEE. Se.Pr. / 3 (2008) Ej.1DisponibleHemerotecaSolicitar