-
1
-
-
0038713944
-
Electronic voting system usability issues
-
Bederson, B.B., Bongshin, L., Sherman, R.M., Herrnson, P.S., & Niemi, R.G. (2003). Electronic voting system usability issues. Proceedings of CHI Letters, 5 (1). 145-152.
-
(2003)
Proceedings of CHI Letters
, vol.5
, Issue.1
, pp. 145-152
-
-
Bederson, B.B.1
Bongshin, L.2
Sherman, R.M.3
Herrnson, P.S.4
Niemi, R.G.5
-
2
-
-
38149035676
-
Design for privacy in ubiquitous computing environments
-
New York: ACM Publications.
-
Bellotti, V., & Sellen, A. (1993). Design for privacy in ubiquitous computing environments. In Computer-Human Interaction (CHI) Conference, 2003 (pp. 145-152). New York: ACM Publications.
-
(1993)
Computer-Human Interaction (CHI) Conference, 2003
, pp. 145-152
-
-
Bellotti, V.1
Sellen, A.2
-
4
-
-
33646067074
-
-
Newcastle upon Tyne, UK: University of Newcastle upon Tyne.
-
Bryans, J., & Ryan, P. (2003). A dependability analysis of the Chaum digital voting scheme (Technical Report CS-TR-809, School of Computing Science, University of Newcastle upon Tyne). Newcastle upon Tyne, UK: University of Newcastle upon Tyne.
-
(2003)
A Dependability Analysis of the Chaum Digital Voting Scheme (Technical Report CS-TR-809, School of Computing Science, University of Newcastle Upon Tyne)
-
-
Bryans, J.1
Ryan, P.2
-
5
-
-
0019532104
-
-
ACM
-
Chaum, D. (1981). Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24 (2), 84-88.
-
(1981)
Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. Communications of the
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
6
-
-
2342617507
-
Secret-ballot receipts: True voter verifiable elections
-
Chaum, D. (2004). Secret-ballot receipts: True voter verifiable elections. IEEE Security and Privacy, 2 (1). 38-47.
-
(2004)
IEEE Security and Privacy
, vol.2
, Issue.1
, pp. 38-47
-
-
Chaum, D.1
-
7
-
-
33646793222
-
-
Newcastle upon Tyne, UK: University of Newcastle upon Tyne.
-
Chaum, D., Ryan, P., & Schneider, S.A. (2004). A practical, voter-verifiable election scheme (Technical Report CS-TR-880, School of Computing Science, University of Newcastle upon Tyne). Newcastle upon Tyne, UK: University of Newcastle upon Tyne.
-
(2004)
A Practical, Voter-verifiable Election Scheme (Technical Report CS-TR-880, School of Computing Science, University of Newcastle Upon Tyne)
-
-
Chaum, D.1
Ryan, P.2
Schneider, S.A.3
-
15
-
-
14044252081
-
Perspective of ubiquitous computing in the home environment
-
Friedewald, M., Costa, O., Punie, Y., Alahuhta, P., & Heinonen, S. (2005). Perspective of ubiquitous computing in the home environment. Telematics Information, 22 (3). 221-238.
-
(2005)
Telematics Information
, vol.22
, Issue.3
, pp. 221-238
-
-
Friedewald, M.1
Costa, O.2
Punie, Y.3
Alahuhta, P.4
Heinonen, S.5
-
16
-
-
0001292443
-
A practical secret voting scheme for large scale elections
-
J. Seberry & Y. Zheng (Eds.), Gold Coast, Queensland, Australia: Springer-Verlag.
-
Fujioka, A., Okamoto, T., & Ohta, K. (1992). A practical secret voting scheme for large scale elections. In J. Seberry & Y. Zheng (Eds.), Advances in cryptology-ASIACRYPT '92, workshop on the theory and application of cryptographic techniques (Vol. 718 of Lecture Notes in Computer Science, pp. 244-251). Gold Coast, Queensland, Australia: Springer-Verlag.
-
(1992)
Advances in Cryptology-ASIACRYPT '92, Workshop on the Theory and Application of Cryptographic Techniques (Vol. 718 of Lecture Notes in Computer Science
, pp. 244-251
-
-
Fujioka, A.1
Okamoto, T.2
Ohta, K.3
-
17
-
-
32144449529
-
-
New York: Nation Books.
-
Gumbel, A. (2005). Steal this vote. New York: Nation Books.
-
(2005)
Steal This Vote
-
-
Gumbel, A.1
-
18
-
-
10044248787
-
Privacy risk models for designing privacy-sensitive ubiquitous computing systems
-
Hong, J.I., Ng, J.D., Lederer, S., & Landay, J. (2004). Privacy risk models for designing privacy-sensitive ubiquitous computing systems. Proceedings of the 2004 Conference on Designing Interactive Systems: Processes, Practices, Methods, and Techniques, Cambridge, Massachusetts.
-
Proceedings of the 2004 Conference on Designing Interactive Systems: Processes, Practices, Methods, and Techniques
-
-
Hong, J.I.1
Ng, J.D.2
Lederer, S.3
Landay, J.4
-
22
-
-
44349142579
-
-
Washington, DC: National Research Council, Committee on Electronic Voting, National Academies Press.
-
Laskowski, S., & Quesenbery, W. (2004, November). Putting people first: The importance of user-centered design and universal usability to voting systems (NAS Framework for Understanding Electronic Voting, white paper). Washington, DC: National Research Council, Committee on Electronic Voting, National Academies Press.
-
(2004)
Putting People First: The Importance of User-centered Design and Universal Usability to Voting Systems (NAS Framework for Understanding Electronic Voting, White Paper)
-
-
Laskowski, S.1
Quesenbery, W.2
-
23
-
-
19944367736
-
Personal privacy through understanding and action: Five pitfalls for designers
-
Lederer, S., Hong, J.I., Dey, K., & Landay, A. (2004). Personal privacy through understanding and action: Five pitfalls for designers. Personal and Ubiquitous Computing, 8 (6). 440-454.
-
(2004)
Personal and Ubiquitous Computing
, vol.8
, Issue.6
, pp. 440-454
-
-
Lederer, S.1
Hong, J.I.2
Dey, K.3
Landay, A.4
-
24
-
-
38149139940
-
Videotaped activity scenarios and the elicitation of social rules for public interactions
-
Little, L., Briggs, P., & Coventry, L. (2004, September). Videotaped activity scenarios and the elicitation of social rules for public interactions. Paper presented at the British Human Computer Interaction Group Conference, Leeds, UK.
-
Paper Presented at the British Human Computer Interaction Group Conference
-
-
Little, L.1
Briggs, P.2
Coventry, L.3
-
25
-
-
0033097888
-
A review of user-interface guidelines for public information kiosk systems. International Journal of Human-Computer
-
Maguire, M.C. (1998). A review of user-interface guidelines for public information kiosk systems. International Journal of Human-Computer Studies, 50, 263-286.
-
(1998)
Studies
, vol.50
, pp. 263-286
-
-
Maguire, M.C.1
-
26
-
-
84956987948
-
E-voting without "cryptography
-
M. Blaze (Ed.), London: Springer-Verlag.
-
Malkhi, D., Margo, O., & Pavlov, E. (2003). E-voting without "cryptography." In M. Blaze (Ed.), Financial cryptography, 6th International Conference, FC 2002, revised papers (Vol. 2357 of Lecture Notes in Computer Science, pp. 1-15). London: Springer-Verlag.
-
(2003)
Financial Cryptography, 6th International Conference, FC 2002, Revised Papers (Vol. 2357 of Lecture Notes in Computer Science
, pp. 1-15
-
-
Malkhi, D.1
Margo, O.2
Pavlov, E.3
-
27
-
-
38149032175
-
EFF's top 12 ways to protect your online privacy
-
McCandlish, S. (2002). EFF's top 12 ways to protect your online privacy. Electronic Frontier Technology. Retrieved January 1, 2007, from http://www.eff.org/Privacy/eff_privacy_top_12.html
-
(2002)
Electronic Frontier Technology
-
-
McCandlish, S.1
-
30
-
-
0038037379
-
Unpacking "privacy" for a networked world
-
Palen, L., & Dourish, P. (2003). Unpacking "privacy" for a networked world. CHI Letters, 5 (1). 129-136.
-
(2003)
CHI Letters
, vol.5
, Issue.1
, pp. 129-136
-
-
Palen, L.1
Dourish, P.2
-
31
-
-
4644334923
-
Ambient Intelligence: Changing forms of human-computer interaction and their social implications
-
Raisinghani, M.S., Benoit, A., Ding, J., Gomez, M., Gupta, K., Gusila, V., et al. (2004). Ambient Intelligence: Changing forms of human-computer interaction and their social implications. Journal of Digital Information, 5 (4). No. 271.
-
(2004)
Journal of Digital Information
, vol.5
, Issue.4-271
-
-
Raisinghani, M.S.1
Benoit, A.2
Ding, J.3
Gomez, M.4
Gupta, K.5
Gusila, V.6
-
32
-
-
4544302361
-
Trust and mistrust of online health sites
-
Sillence, E., Briggs, P., Fishwick, L., & Harris, P. (2004). Trust and mistrust of online health sites. In Proceedings of CHI'2004, April 24-29 2004, Vienna, Austria (pp. 663-670). New York: ACM Press.
-
Proceedings of CHI'2004
-
-
Sillence, E.1
Briggs, P.2
Fishwick, L.3
Harris, P.4
-
33
-
-
25444467047
-
Pollsterless remote electronic voting
-
Storer, T., & Duncan, I. (2004). Pollsterless remote electronic voting. Journal of E-Government, 1 (1). 75-103.
-
(2004)
Journal of E-Government
, vol.1
, Issue.1
, pp. 75-103
-
-
Storer, T.1
Duncan, I.2
-
34
-
-
38149052727
-
Impacts of user privacy preferences on personalized systems-A comparative study
-
Teltzrow, M., & Kobsa, A. (2003). Impacts of user privacy preferences on personalized systems-A comparative study. Paper presented at "Designing Personalized User Experiences for eCommerce: Theory, Methods, and Research" workshop, Fort Lauderdale, Florida.
-
Paper Presented at "designing Personalized User Experiences for ECommerce: Theory, Methods, and Research" Workshop
-
-
Teltzrow, M.1
Kobsa, A.2
-
35
-
-
0001853125
-
The computer for the 21st century
-
Weiser, M. (1991). The computer for the 21st century. Scientific American, 265 (3). 66-75.
-
(1991)
Scientific American
, vol.265
, Issue.3
, pp. 66-75
-
-
Weiser, M.1
|