{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T20:07:09Z","timestamp":1775246829978,"version":"3.50.1"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030024499","type":"print"},{"value":"9783030024505","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-02450-5_3","type":"book-chapter","created":{"date-parts":[[2018,10,10]],"date-time":"2018-10-10T08:54:57Z","timestamp":1539161697000},"page":"37-53","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["The Foul Adversary: Formal Models"],"prefix":"10.1007","author":[{"given":"Naipeng","family":"Dong","sequence":"first","affiliation":[]},{"given":"Tim","family":"Muller","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,10,11]]},"reference":[{"issue":"1\u20132","key":"3_CR1","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1016\/j.tcs.2006.08.032","volume":"367","author":"M Abadi","year":"2006","unstructured":"Abadi, M., Cortier, V.: Deciding knowledge in security protocols under equational theories. Theor. Comput. Sci. 367(1\u20132), 2\u201332 (2006)","journal-title":"Theor. Comput. Sci."},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Abadi, M., Fournet, C.: Mobile values, new names, and secure communication. In: Proceedings of 28th Symposium on Principles of Programming Languages, pp. 104\u2013115. ACM (2001)","DOI":"10.1145\/373243.360213"},{"key":"3_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/3-540-45811-5_14","volume-title":"Information Security","author":"M Abe","year":"2002","unstructured":"Abe, M., Suzuki, K.: Receipt-free sealed-bid auction. In: Chan, A.H., Gligor, V. (eds.) ISC 2002. LNCS, vol. 2433, pp. 191\u2013199. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-45811-5_14"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Backes, M., Hritcu, C., Maffei, M.: Automated verification of remote electronic voting protocols in the applied pi-calculus. In: Proceedings of 21st IEEE Computer Security Foundations Symposium, pp. 195\u2013209. IEEE CS (2008)","DOI":"10.1109\/CSF.2008.26"},{"key":"3_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1007\/978-3-642-15497-3_21","volume-title":"Computer Security \u2013 ESORICS 2010","author":"D Basin","year":"2010","unstructured":"Basin, D., Cremers, C.: Modeling and analyzing security in the presence of compromising adversaries. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol. 6345, pp. 340\u2013356. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-15497-3_21"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Benaloh, J., Tuinstra, D.: Receipt-free secret-ballot elections (extended abstract). In: Proceedings of 26th Symposium on Theory of Computing, pp. 544\u2013553. ACM (1994)","DOI":"10.1145\/195058.195407"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Blanchet, B.: An efficient cryptographic protocol verifier based on prolog rules. In: Proceedings of 14th IEEE Computer Security Foundations Workshop, pp. 82\u201396. IEEE CS (2001)","DOI":"10.1109\/CSFW.2001.930138"},{"key":"3_CR8","first-page":"8","volume":"8","author":"J Clark","year":"2008","unstructured":"Clark, J., Hengartner, U.: Panic passwords: authenticating under duress. HotSec 8, 8 (2008)","journal-title":"HotSec"},{"issue":"3","key":"3_CR9","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1561\/2500000001","volume":"1","author":"V Cortier","year":"2014","unstructured":"Cortier, V., Kremer, S.: Formal models and techniques for analyzing security protocols: a tutorial. Found. Trends Program. Lang. 1(3), 151\u2013267 (2014)","journal-title":"Found. Trends Program. Lang."},{"key":"3_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1007\/978-3-540-69485-4_9","volume-title":"Public Key Infrastructure","author":"B Decker De","year":"2008","unstructured":"De Decker, B., Layouni, M., Vangheluwe, H., Verslype, K.: A privacy-preserving ehealth protocol compliant with the belgian healthcare system. In: Mj\u00f8lsnes, S.F., Mauw, S., Katsikas, S.K. (eds.) EuroPKI 2008. LNCS, vol. 5057, pp. 118\u2013133. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-69485-4_9"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Delaune, S., Kremer, S., Ryan, M.: Coercion-resistance and receipt-freeness in electronic voting. In: Proceedings of 19th IEEE Computer Security Foundations Workshop, pp. 28\u201342. IEEE CS (2006)","DOI":"10.1109\/CSFW.2006.8"},{"issue":"4","key":"3_CR12","doi-asserted-by":"publisher","first-page":"435","DOI":"10.3233\/JCS-2009-0340","volume":"17","author":"S Delaune","year":"2009","unstructured":"Delaune, S., Kremer, S., Ryan, M.D.: Verifying privacy-type properties of electronic voting protocols. J. Comput. Secur. 17(4), 435\u2013487 (2009)","journal-title":"J. Comput. Secur."},{"issue":"2","key":"3_CR13","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev, D., Yao, A.C.-C.: On the security of public key protocols. IEEE Trans. Inf. Theory 29(2), 198\u2013207 (1983)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"3_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1007\/978-3-642-32355-3_12","volume-title":"Foundations of Health Informatics Engineering and Systems","author":"N Dong","year":"2012","unstructured":"Dong, N., Jonker, H., Pang, J.: Challenges in eHealth: from enabling to enforcing privacy. In: Liu, Z., Wassyng, A. (eds.) FHIES 2011. LNCS, vol. 7151, pp. 195\u2013206. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-32355-3_12"},{"key":"3_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1007\/978-3-642-33167-1_19","volume-title":"Computer Security \u2013 ESORICS 2012","author":"N Dong","year":"2012","unstructured":"Dong, N., Jonker, H., Pang, J.: Formal analysis of privacy in an ehealth protocol. In: Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. LNCS, vol. 7459, pp. 325\u2013342. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-33167-1_19"},{"key":"3_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"499","DOI":"10.1007\/978-3-642-40203-6_28","volume-title":"Computer Security \u2013 ESORICS 2013","author":"N Dong","year":"2013","unstructured":"Dong, N., Jonker, H., Pang, J.: Enforcing privacy in the presence of others: notions, formalisations and relations. In: Crampton, J., Jajodia, S., Mayes, K. (eds.) ESORICS 2013. LNCS, vol. 8134, pp. 499\u2013516. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-40203-6_28"},{"key":"3_CR17","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1016\/j.cose.2016.09.002","volume":"65","author":"N Dong","year":"2017","unstructured":"Dong, N., Jonker, H.L., Pang, J.: Formal modelling and analysis of receipt-free auction protocols in the applied pi. Comput. Secur. 65, 405\u2013432 (2017)","journal-title":"Comput. Secur."},{"key":"3_CR18","unstructured":"Dong, N., Muller, T.: The foul adversary: formal models. https:\/\/sites.google.com\/view\/foul-adversary\/home"},{"key":"3_CR19","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/5803.001.0001","volume-title":"Reasoning About Knowledge","author":"R Fagin","year":"1995","unstructured":"Fagin, R.: Reasoning About Knowledge. MIT Press, Cambridge (1995)"},{"key":"3_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1007\/3-540-57220-1_66","volume-title":"Advances in Cryptology \u2014 AUSCRYPT \u201992","author":"A Fujioka","year":"1993","unstructured":"Fujioka, A., Okamoto, T., Ohta, K.: A practical secret voting scheme for large scale elections. In: Seberry, J., Zheng, Y. (eds.) AUSCRYPT 1992. LNCS, vol. 718, pp. 244\u2013251. Springer, Heidelberg (1993). https:\/\/doi.org\/10.1007\/3-540-57220-1_66"},{"key":"3_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1007\/978-3-642-32759-9_19","volume-title":"FM 2012: Formal Methods","author":"J Heather","year":"2012","unstructured":"Heather, J., Schneider, S.: A formal framework for modelling coercion resistance and receipt freeness. In: Giannakopoulou, D., M\u00e9ry, D. (eds.) FM 2012. LNCS, vol. 7436, pp. 217\u2013231. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-32759-9_19"},{"issue":"2\u20133","key":"3_CR22","first-page":"89","volume":"64","author":"HL Jonker","year":"2009","unstructured":"Jonker, H.L., Pang, J., Mauw, S.: A formal framework for quantifying voter-controlled privacy. J. Algorithms Cogn. Inform. Log. 64(2\u20133), 89\u2013105 (2009)","journal-title":"J. Algorithms Cogn. Inform. Log."},{"key":"3_CR23","doi-asserted-by":"crossref","unstructured":"Juels, A., Catalano, D., Jakobsson, M.: Coercion-resistant electronic elections. In: Proceedings of 4th ACM Workshop on Privacy in the Electronic Society, pp. 61\u201370. ACM (2005)","DOI":"10.1145\/1102199.1102213"},{"key":"3_CR24","doi-asserted-by":"crossref","unstructured":"K\u00fcsters, R., Truderung, T.: An epistemic approach to coercion-resistance for electronic voting protocols. In: Proceedings of 30th IEEE Symposium on Security and Privacy, pp. 251\u2013266. IEEE CS (2009)","DOI":"10.1109\/SP.2009.13"},{"key":"3_CR25","doi-asserted-by":"crossref","unstructured":"K\u00fcsters, R., Truderung, T., Vogt, A.: A game-based definition of coercion-resistance and its applications. In: Proceedings of 23rd IEEE Computer Security Foundations Symposium, pp. 122\u2013136. IEEE CS (2010)","DOI":"10.1109\/CSF.2010.16"},{"key":"3_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/978-3-540-24691-6_19","volume-title":"Information Security and Cryptology - ICISC 2003","author":"B Lee","year":"2004","unstructured":"Lee, B., Boyd, C., Dawson, E., Kim, K., Yang, J., Yoo, S.: Providing receipt-freeness in mixnet-based voting protocols. In: Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003. LNCS, vol. 2971, pp. 245\u2013258. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-24691-6_19"},{"key":"3_CR27","series-title":"IFIP\u2014-The International Federation for Information Processing","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/978-0-387-34979-4_3","volume-title":"Advanced IT Tools","author":"T Okamoto","year":"1996","unstructured":"Okamoto, T.: An electronic voting scheme. In: Terashima, N., Altman, E. (eds.) Advanced IT Tools. IFIPAICT, pp. 21\u201330. Springer, Boston (1996). https:\/\/doi.org\/10.1007\/978-0-387-34979-4_3"},{"key":"3_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/BFb0028157","volume-title":"Security Protocols","author":"T Okamoto","year":"1998","unstructured":"Okamoto, T.: Receipt-free electronic voting schemes for large scale elections. In: Christianson, B., Crispo, B., Lomas, M., Roe, M. (eds.) Security Protocols 1997. LNCS, vol. 1361, pp. 25\u201335. Springer, Heidelberg (1998). https:\/\/doi.org\/10.1007\/BFb0028157"},{"key":"3_CR29","doi-asserted-by":"crossref","unstructured":"Schmidt, B., Meier, S., Cremers, C.J.F., Basin, D.A.: Automated analysis of Diffie-Hellman protocols and advanced security properties. In: Proceedings of 25th IEEE Computer Security Foundations Symposium, pp. 78\u201394. IEEE CS (2012)","DOI":"10.1109\/CSF.2012.25"},{"key":"3_CR30","doi-asserted-by":"crossref","unstructured":"Schneider, S.: Security properties and CSP. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 174\u2013187. IEEE CS (1996)","DOI":"10.1109\/SECPRI.1996.502680"}],"container-title":["Lecture Notes in Computer Science","Formal Methods and Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-02450-5_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T19:19:19Z","timestamp":1775243959000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-02450-5_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030024499","9783030024505"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-02450-5_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"ICFEM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Formal Engineering Methods","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Gold Coast, QLD","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 November 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 November 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icfem2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.formal-analysis.com\/icfem\/2018\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Open","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"66","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"22","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"14","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"33% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}