{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T19:19:25Z","timestamp":1742930365863,"version":"3.40.3"},"publisher-location":"Cham","reference-count":7,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030242954"},{"type":"electronic","value":"9783030242961"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-24296-1_46","type":"book-chapter","created":{"date-parts":[[2019,6,28]],"date-time":"2019-06-28T21:06:36Z","timestamp":1561755996000},"page":"577-586","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Secret Voting: Knowledge vs Trust"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3215-0444","authenticated-orcid":false,"given":"Ildar M.","family":"Khamitov","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4518-2883","authenticated-orcid":false,"given":"Victor","family":"Dostov","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2276-7523","authenticated-orcid":false,"given":"Pavel","family":"Shoust","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,29]]},"reference":[{"issue":"6","key":"46_CR1","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1016\/S0167-4048(02)01014-3","volume":"21","author":"DA Gritzalis","year":"2002","unstructured":"Gritzalis, D.A.: Principles and requirements for a secure e-voting. Comput. Secur. 21(6), 539\u2013556 (2002)","journal-title":"Comput. Secur."},{"issue":"2","key":"46_CR2","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1016\/j.giq.2010.05.010","volume":"28","author":"D Zissis","year":"2011","unstructured":"Zissis, D., Lekkas, D.: Securing e-Government and e-Voting with an open cloud computing architecture. Gov. Inf. Querterly 28(2), 239\u2013251 (2011)","journal-title":"Gov. Inf. Querterly"},{"key":"46_CR3","first-page":"69","volume":"36","author":"KM Samra","year":"2017","unstructured":"Samra, K.M., Hafez, A.A., Assassa, G.M., Mursi, M.F.: A practical, secure, and auditable e-voting system. J. Inf. Secur. Appl. 36, 69\u201389 (2017)","journal-title":"J. Inf. Secur. Appl."},{"key":"46_CR4","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/MSP.2006.140","volume":"4","author":"B Randell","year":"2006","unstructured":"Randell, B., Ryan, P.Y.: Voting technologies and trust. IEEE Secur. Priv. 4, 50\u201356 (2006)","journal-title":"IEEE Secur. Priv."},{"key":"46_CR5","unstructured":"http:\/\/cikrf.ru\/eng\/activity\/relevant\/detail\/39450\/\n                      \n                    . Accessed 31 Mar 2019"},{"key":"46_CR6","unstructured":"https:\/\/www.valimised.ee\/en\/archive\/statistics-about-internet-voting-estonia\n                      \n                    . Accessed 31 Mar 2019"},{"key":"46_CR7","unstructured":"http:\/\/cloud.cnews.ru\/news\/top\/index.shtml?2010\/04\/12\/386342\n                      \n                    . Accessed 31 Mar 2019"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2019"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-24296-1_46","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,28]],"date-time":"2019-06-28T22:20:18Z","timestamp":1561760418000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-24296-1_46"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030242954","9783030242961"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-24296-1_46","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"29 June 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCSA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Science and Its Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Saint Petersburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Russia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccsa2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.iccsa.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}