…eyer The Swiss Post/Scytl transparency exercise and its possible impact on internet voting regulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122 Ardita Driza Maurer Models and schemes Security models for everlasting privacy . . . . . .…
… 978 90 04 22358 5 (e-book) Copyright 2011 by Koninklijke Brill NV, Leiden, The Netherlands. Koninklijke Brill NV incorporates the imprints Brill, Global Oriental, Hotei Publishing, IDC Publishers, Martinus Nijhofff Publishers and VSP. All rights reserved. No part of this publica…
…formation resources, and adoption by libraries of knowledge management low Internet access rates. The author identifies three using Web 2.0. The results show that, while most major needs in the region: expanded LIS education; respondents were comfortable with Web 2.0 and per- inc…