{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:13:05Z","timestamp":1725484385566},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540656630"},{"type":"electronic","value":"9783540491354"}],"license":[{"start":{"date-parts":[[1998,1,1]],"date-time":"1998-01-01T00:00:00Z","timestamp":883612800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/3-540-49135-x_27","type":"book-chapter","created":{"date-parts":[[2007,5,21]],"date-time":"2007-05-21T17:12:26Z","timestamp":1179767546000},"page":"193-202","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Optimistic Trust with Realistic eNvestigators"],"prefix":"10.1007","author":[{"given":"Raphael","family":"Yahalom","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[1999,10,29]]},"reference":[{"key":"27_CR1","doi-asserted-by":"crossref","unstructured":"J. Benaloh and M. Yung \u201cDistributing the Power of a Government to Enhance the Privacy of Voters\u201d, Proceedings of the 5th ACM Symposium on the Principles of Distributed Computing, 1986, pp. 52\u201362.","DOI":"10.1145\/10590.10595"},{"key":"27_CR2","unstructured":"M. Blaze, J. Feigenbaum, and J. Lacy \u201cDecentralized Trust Management\u201d Proceedings of the 17th Symposium on Security and Privacy, pp. 164\u2013173, IEEE, 1996."},{"key":"27_CR3","doi-asserted-by":"crossref","unstructured":"M. Burrows, M. Abadi, and R. Needham \u201cA Logic of Authentication\u201d, DEC System Research Center technical report 39, California, 1989. Also in ACM Transactions on Computer Systems, Vol 8, Num 1, pp. 18\u201336, 1990.","DOI":"10.1145\/77648.77649"},{"issue":"10","key":"27_CR4","doi-asserted-by":"publisher","first-page":"1030","DOI":"10.1145\/4372.4373","volume":"28","author":"D. Chaum","year":"1985","unstructured":"D. Chaum, \u201cSecurity without Identification: Transaction Systems to Make Big Brother Obsolete\u201d, Communication of the ACM, Vol 28, No 10, pp. 1030\u20131044 Oct 1985.","journal-title":"Communication of the ACM"},{"key":"27_CR5","volume-title":"WUCS-96-02","author":"L. Cranor","year":"1996","unstructured":"L. Cranor and R. Cytron, \u201cDesign and Implementation of a Practical Security-Conscious Electronic Polling System\u201d WUCS-96-02, Washington University, Department of Computer Science, St Louis, Jan 1996. \n                  http:\/\/www.ccrc.wustl.edu\/~lorracks\/sensus\/"},{"key":"27_CR6","unstructured":"B. Davenport, A. Newberger, and J. Woodward \u201cCreating A Secure Digital Voting Protocol for Campus Elections\u201d, \n                  http:\/\/www.princeton.edu\/~bpd\/voting\/paper.html"},{"key":"27_CR7","doi-asserted-by":"crossref","unstructured":"R. Demillo, N. Lynch, and M. Merritt, \u201cCryptographic Protocols\u201d, Proceedings of the 14th Annual Symposium on the Theory of Computing, 1982, pp. 383\u2013400.","DOI":"10.1145\/800070.802214"},{"key":"27_CR8","series-title":"Lect Notes Comput Sci","first-page":"244","volume-title":"Advances in Cryptology-AUSCRYPT\u2019 92","author":"A. Fujioka","year":"1992","unstructured":"A. Fujioka, T. Okamoto, and K. Ohta, \u201cA Practical Secret Voting Scheme for Large Scale Applications\u201d, Advances in Cryptology-AUSCRYPT\u2019 92, Lecture Notes in Computer Science, Vol 718, pp. 244\u2013251, Springer-Verlag, 1992."},{"key":"27_CR9","doi-asserted-by":"crossref","unstructured":"L. Gong, R. Needham, and R. Yahalom \u201cReasoning about Belief in Cryptographic Protocols\u201d, Proceedings of IEEE Symposium on Security and Privacy, May 1990, pp. 234\u2013248.","DOI":"10.1109\/RISP.1990.63854"},{"key":"27_CR10","unstructured":"W.S. Harbison, \u201cTrusting in Computer Systems\u201d, University of Cambridge, Technical Report 437, 1997."},{"key":"27_CR11","unstructured":"M. Herschberg, \u201cSecure Electronic Voting over the World Wide Web\u201d, Master thesis, MIT-Laboratory of Computer Science, May 1997."},{"key":"27_CR12","unstructured":"S. Micali, \u201cCertified E-Mail with Invisible Post Offices\u201d, Proceedings of RSA Conference, San Francisco, 1997."},{"key":"27_CR13","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1007\/0-387-34805-0_13","volume-title":"Advances in Cryptology-Crypto\u2019 89","author":"M. Naor","year":"1990","unstructured":"M. Naor, \u201cBit Commitment using Pseudo-Randomness\u201d, Advances in Cryptology-Crypto\u2019 89, Lecture Notes in Computer Science, Vol 435, pp. 128\u2013136, Springer-Verlag, 1990."},{"key":"27_CR14","unstructured":"K. Ohta, \u201cAn Electronic Voting Scheme Using a Single Administrator\u201d, IEICE, Spring National Convention, A-295, 1988 (In Japanese)."},{"key":"27_CR15","unstructured":"B. Schneier, \u201cApplied Cryptography\u201d, 2nd Edition, John Wiley & Sons, 1996."},{"key":"27_CR16","unstructured":"R. Yahalom, B. Klein, and T. Beth, \u201cTrust-based Navigation in Distributed Systems\u201d, Computing Systems Journal, Vol. 7, Num. 1, 1994."}],"container-title":["Lecture Notes in Computer Science","Security Protocols"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-49135-X_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,9]],"date-time":"2020-01-09T03:42:41Z","timestamp":1578541361000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-49135-X_27"}},"subtitle":["Position Paper"],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540656630","9783540491354"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/3-540-49135-x_27","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1998]]},"assertion":[{"value":"29 October 1999","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}