{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T23:49:48Z","timestamp":1771026588261,"version":"3.50.1"},"publisher-location":"Cham","reference-count":55,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030937461","type":"print"},{"value":"9783030937478","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-93747-8_6","type":"book-chapter","created":{"date-parts":[[2022,1,13]],"date-time":"2022-01-13T06:08:47Z","timestamp":1642054127000},"page":"77-93","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Facial Recognition for Remote Electronic Voting \u2013 Missing Piece of the Puzzle or Yet Another Liability?"],"prefix":"10.1007","author":[{"given":"Sven","family":"Heiberg","sequence":"first","affiliation":[]},{"given":"Kristjan","family":"Krips","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6290-2099","authenticated-orcid":false,"given":"Jan","family":"Willemson","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0049-1287","authenticated-orcid":false,"given":"Priit","family":"Vinkel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,13]]},"reference":[{"key":"6_CR1","unstructured":"Adida, B.: Helios: web-based open-audit voting. In: van Oorschot, P.C. (ed.) Proceedings of the 17th USENIX Security Symposium, pp. 335\u2013348. USENIX Association (2008). http:\/\/www.usenix.org\/events\/sec08\/tech\/full_papers\/adida\/adida.pdf"},{"issue":"2","key":"6_CR2","doi-asserted-by":"publisher","first-page":"55","DOI":"10.4018\/IJDET.20210401.oa3","volume":"19","author":"S Arn\u00f2","year":"2021","unstructured":"Arn\u00f2, S., Galassi, A., Tommasi, M., Saggino, A., Vittorini, P.: State-of-the-art of commercial proctoring systems and their use in academic online exams. Int. J. Distance Educ. Technol. (IJDET) 19(2), 55\u201376 (2021). https:\/\/doi.org\/10.4018\/IJDET.20210401.oa3","journal-title":"Int. J. Distance Educ. Technol. (IJDET)"},{"issue":"4","key":"6_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1371\/journal.pone.0250041","volume":"16","author":"S Asgari","year":"2021","unstructured":"Asgari, S., Trajkovic, J., Rahmani, M., Zhang, W., Lo, R.C., Sciortino, A.: An observational study of engineering online education during the COVID-19 pandemic. PLoS ONE 16(4), 1\u201317 (2021). https:\/\/doi.org\/10.1371\/journal.pone.0250041","journal-title":"PLoS ONE"},{"key":"6_CR4","doi-asserted-by":"publisher","unstructured":"Backes, M., Chen, T., D\u00fcrmuth, M., Lensch, H.P.A., Welk, M.: Tempest in a teapot: compromising reflections revisited. In: 30th IEEE Symposium on Security and Privacy (S&P 2009), Oakland, California, USA, 17\u201320 May 2009, pp. 315\u2013327. IEEE Computer Society (2009). https:\/\/doi.org\/10.1109\/SP.2009.20","DOI":"10.1109\/SP.2009.20"},{"key":"6_CR5","unstructured":"Balfanz, D., et al.: Web authentication: an API for accessing public key credentials level 1. W3C recommendation, W3C, March 2019. https:\/\/www.w3.org\/TR\/2019\/REC-webauthn-1-20190304\/"},{"key":"6_CR6","unstructured":"Brand, C., et al.: Client to authenticator protocol (CTAP). Proposed standard, FIDO Alliance, January 2019. https:\/\/fidoalliance.org\/specs\/fido-v2.0-ps-20190130\/fido-client-to-authenticator-protocol-v2.0-ps-20190130.html"},{"key":"6_CR7","unstructured":"Buolamwini, J., Gebru, T.: Gender shades: intersectional accuracy disparities in commercial gender classification. In: Conference on Fairness, Accountability and Transparency, FAT 2018. Proceedings of Machine Learning Research, vol. 81, pp. 77\u201391. PMLR (2018). http:\/\/proceedings.mlr.press\/v81\/buolamwini18a.html"},{"key":"6_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/978-3-030-30625-0_5","volume-title":"Electronic Voting","author":"A Cardillo","year":"2019","unstructured":"Cardillo, A., Akinyokun, N., Essex, A.: Online voting in Ontario municipal elections: a conflict of legal principles and technology? In: Krimmer, R., et al. (eds.) E-Vote-ID 2019. LNCS, vol. 11759, pp. 67\u201382. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-30625-0_5"},{"key":"6_CR9","doi-asserted-by":"publisher","unstructured":"Chaidos, P., Cortier, V., Fuchsbauer, G., Galindo, D.: BeleniosRF: a non-interactive receipt-free electronic voting scheme. In: Proceedings of ACM CCS 2016, pp. 1614\u20131625. ACM (2016). https:\/\/doi.org\/10.1145\/2976749.2978337","DOI":"10.1145\/2976749.2978337"},{"key":"6_CR10","doi-asserted-by":"publisher","first-page":"101951","DOI":"10.1016\/j.cose.2020.101951","volume":"97","author":"MAP Chamikara","year":"2020","unstructured":"Chamikara, M.A.P., Bert\u00f3k, P., Khalil, I., Liu, D., Camtepe, S.: Privacy preserving face recognition utilizing differential privacy. Comput. Secur. 97, 101951 (2020). https:\/\/doi.org\/10.1016\/j.cose.2020.101951","journal-title":"Comput. Secur."},{"issue":"10","key":"6_CR11","doi-asserted-by":"publisher","first-page":"1030","DOI":"10.1145\/4372.4373","volume":"28","author":"D Chaum","year":"1985","unstructured":"Chaum, D.: Security without identification: transaction systems to make big brother obsolete. Commun. ACM 28(10), 1030\u20131044 (1985). https:\/\/doi.org\/10.1145\/4372.4373","journal-title":"Commun. ACM"},{"key":"6_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1007\/3-540-45961-8_15","volume-title":"Advances in Cryptology\u2014EUROCRYPT 1988","author":"D Chaum","year":"1988","unstructured":"Chaum, D.: Elections with unconditionally-secret ballots and disruption equivalent to breaking RSA. In: Barstow, D., et al. (eds.) EUROCRYPT 1988. LNCS, vol. 330, pp. 177\u2013182. Springer, Heidelberg (1988). https:\/\/doi.org\/10.1007\/3-540-45961-8_15"},{"issue":"8","key":"6_CR13","doi-asserted-by":"publisher","first-page":"1397","DOI":"10.1080\/13510347.2018.1470165","volume":"25","author":"N Cheeseman","year":"2018","unstructured":"Cheeseman, N., Lynch, G., Willis, J.: Digital dilemmas: the unintended consequences of election technology. Democratization 25(8), 1397\u20131418 (2018)","journal-title":"Democratization"},{"key":"6_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/978-3-642-27576-0_4","volume-title":"Financial Cryptography and Data Security","author":"J Clark","year":"2012","unstructured":"Clark, J., Hengartner, U.: Selections: internet voting with over-the-shoulder coercion-resistance. In: Danezis, G. (ed.) FC 2011. LNCS, vol. 7035, pp. 47\u201361. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-27576-0_4"},{"key":"6_CR15","unstructured":"Code of Good Practice in Electoral Matters: Guidelines and Explanatory Report (2002). European Commission for Democracy Through Law (Venice Commission). https:\/\/rm.coe.int\/090000168092af01"},{"key":"6_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1007\/978-3-319-11212-1_19","volume-title":"Computer Security - ESORICS 2014","author":"V Cortier","year":"2014","unstructured":"Cortier, V., Galindo, D., Glondu, S., Izabach\u00e8ne, M.: Election verifiability for Helios under weaker trust assumptions. In: Kuty\u0142owski, M., Vaidya, J. (eds.) ESORICS 2014. LNCS, vol. 8713, pp. 327\u2013344. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-11212-1_19"},{"key":"6_CR17","doi-asserted-by":"publisher","unstructured":"Das, A., Galdi, C., Han, H., Ramachandra, R., Dugelay, J., Dantcheva, A.: Recent advances in biometric technology for mobile devices. In: 9th IEEE International Conference on Biometrics Theory, Applications and Systems, pp. 1\u201311. IEEE (2018). https:\/\/doi.org\/10.1109\/BTAS.2018.8698587","DOI":"10.1109\/BTAS.2018.8698587"},{"issue":"1","key":"6_CR18","first-page":"48","volume":"5","author":"C Dziva","year":"2020","unstructured":"Dziva, C., Musara, E., Chigora, P.: Democratisation and securitisation of Zimbabwe\u2019s national elections: opportunities and challenges of biometric voter registration. J. Public Adm. Dev. Altern. (JPADA) 5(1), 48\u201362 (2020)","journal-title":"J. Public Adm. Dev. Altern. (JPADA)"},{"key":"6_CR19","unstructured":"E-valimiste turvalisuse t\u00f6\u00f6r\u00fchma koondaruanne. Estonian Ministry of Economic Affairs and Communications (2019). https:\/\/www.mkm.ee\/sites\/default\/files\/content-editors\/e-valimiste_tooruhma_koondaruanne_12.12.2019_0.pdf. in Estonian"},{"key":"6_CR20","unstructured":"European Parliament, Council of the European Union: Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing directive 95\/46\/EC (General Data Protection Regulation). https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/PDF\/?uri=OJ:L:2016:119:FULL&from=EN"},{"issue":"3","key":"6_CR21","doi-asserted-by":"publisher","first-page":"418","DOI":"10.1089\/elj.2019.0589","volume":"19","author":"A Fowler","year":"2020","unstructured":"Fowler, A.: Promises and perils of mobile voting. Election Law J. Rules Polit. Policy 19(3), 418\u2013431 (2020)","journal-title":"Election Law J. Rules Polit. Policy"},{"key":"6_CR22","doi-asserted-by":"publisher","unstructured":"Grassi, P., et al.: Digital identity guidelines: authentication and lifecycle management [includes updates as of 03\u201302\u20132020] (2020). https:\/\/doi.org\/10.6028\/NIST.SP.800-63b","DOI":"10.6028\/NIST.SP.800-63b"},{"key":"6_CR23","doi-asserted-by":"crossref","unstructured":"Grother, P., Ngan, M., Hanaoka, K.: Face Recognition Vendor Test (FRVT) Part 3: Demographic Effects (2019). https:\/\/nvlpubs.nist.gov\/nistpubs\/ir\/2019\/NIST.IR.8280.pdf","DOI":"10.6028\/NIST.IR.8280"},{"key":"6_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1007\/978-3-319-52240-1_6","volume-title":"Electronic Voting","author":"S Heiberg","year":"2017","unstructured":"Heiberg, S., Martens, T., Vinkel, P., Willemson, J.: Improving the verifiability of the Estonian internet voting scheme. In: Krimmer, R., et al. (eds.) E-Vote-ID 2016. LNCS, vol. 10141, pp. 92\u2013107. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-52240-1_6"},{"key":"6_CR25","unstructured":"House of Commons, Canada: Fact Sheet of Hybrid Voting Process in the House of Commons (2021). https:\/\/www.ourcommons.ca\/Content\/Newsroom\/Articles\/Factsheet-ElectronicVotingSystem-e-Final-02-25.pdf"},{"issue":"1","key":"6_CR26","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1177\/0010836719850219","volume":"55","author":"KL Jacobsen","year":"2020","unstructured":"Jacobsen, K.L.: Biometric voter registration: a new modality of democracy assistance? Coop. Confl. 55(1), 127\u2013148 (2020)","journal-title":"Coop. Confl."},{"key":"6_CR27","doi-asserted-by":"crossref","unstructured":"Juels, A., Catalano, D., Jakobsson, M.: Coercion-resistant electronic elections. In: Proceedings of WPES 2005, pp. 61\u201370. ACM (2005)","DOI":"10.1145\/1102199.1102213"},{"key":"6_CR28","doi-asserted-by":"publisher","unstructured":"Kim, G., Eum, S., Suhr, J.K., Kim, I., Park, K.R., Kim, J.: Face liveness detection based on texture and frequency analyses. In: 5th IAPR International Conference on Biometrics, ICB 2012, New Delhi, India, 29 March\u20131 April 2012, pp. 67\u201372. IEEE (2012). https:\/\/doi.org\/10.1109\/ICB.2012.6199760","DOI":"10.1109\/ICB.2012.6199760"},{"key":"6_CR29","unstructured":"Krips, K., Kubjas, I., Willemson, J.: An internet voting protocol with distributed verification receipt generation. In: Proceedings of the Third International Joint Conference on Electronic Voting E-Vote-ID 2018, Bregenz, Austria, 2\u20135 October 2018, pp. 128\u2013146. TalTech Press (2018). https:\/\/digikogu.taltech.ee\/en\/item\/0050d4bb-192b-4531-8e23-ccf8b565222e"},{"key":"6_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1007\/978-3-030-30625-0_14","volume-title":"Electronic Voting","author":"K Krips","year":"2019","unstructured":"Krips, K., Willemson, J.: On practical aspects of coercion-resistant remote voting systems. In: Krimmer, R., et al. (eds.) E-Vote-ID 2019. LNCS, vol. 11759, pp. 216\u2013232. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-30625-0_14"},{"key":"6_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/978-3-319-22270-7_4","volume-title":"E-Voting and Identity","author":"O Kulyk","year":"2015","unstructured":"Kulyk, O., Teague, V., Volkamer, M.: Extending Helios towards private eligibility verifiability. In: Haenni, R., Koenig, R.E., Wikstr\u00f6m, D. (eds.) VOTELID 2015. LNCS, vol. 9269, pp. 57\u201373. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-22270-7_4"},{"key":"6_CR32","doi-asserted-by":"publisher","unstructured":"Li, Y., Li, Y., Yan, Q., Kong, H., Deng, R.H.: Seeing your face is not enough: an inertial sensor-based liveness detection for face authentication. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 1558\u20131569. ACM (2015). https:\/\/doi.org\/10.1145\/2810103.2813612","DOI":"10.1145\/2810103.2813612"},{"key":"6_CR33","doi-asserted-by":"publisher","unstructured":"Lyastani, S.G., Schilling, M., Neumayr, M., Backes, M., Bugiel, S.: Is FIDO2 the kingslayer of user authentication? A comparative usability study of FIDO2 passwordless authentication. In: 2020 IEEE Symposium on Security and Privacy, SP 2020, pp. 268\u2013285. IEEE (2020). https:\/\/doi.org\/10.1109\/SP40000.2020.00047","DOI":"10.1109\/SP40000.2020.00047"},{"key":"6_CR34","unstructured":"Madise, \u00dc., Martens, T.: E-voting in Estonia 2005. The first practice of country-wide binding internet voting in the world. In: Electronic Voting 2006: 2nd International Workshop, Co-Organized by Council of Europe, ESF TED, IFIP WG 8.6 and E-Voting.CC. LNI, vol. P-86, pp. 15\u201326. GI (2006)"},{"key":"6_CR35","doi-asserted-by":"publisher","unstructured":"Marasco, E., Ross, A.: A survey on antispoofing schemes for fingerprint recognition systems. ACM Comput. Surv. 47(2), 28:1\u201328:36 (2014). https:\/\/doi.org\/10.1145\/2617756","DOI":"10.1145\/2617756"},{"key":"6_CR36","unstructured":"Moore, L., Sawhney, N.: Under the Hood: The West Virginia Mobile Voting Pilot (2019). https:\/\/sos.wv.gov\/FormSearch\/Elections\/Informational\/West-Virginia-Mobile-Voting-White-Paper-NASS-Submission.pdf"},{"key":"6_CR37","doi-asserted-by":"publisher","unstructured":"Neumann, S., Volkamer, M.: Civitas and the real world: problems and solutions from a practical point of view. In: Seventh International Conference on Availability, Reliability and Security, ARES 2012, Prague, pp. 180\u2013185. IEEE Computer Society (2012). https:\/\/doi.org\/10.1109\/ARES.2012.75","DOI":"10.1109\/ARES.2012.75"},{"key":"6_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/BFb0028157","volume-title":"Security Protocols","author":"T Okamoto","year":"1998","unstructured":"Okamoto, T.: Receipt-free electronic voting schemes for large scale elections. In: Christianson, B., Crispo, B., Lomas, M., Roe, M. (eds.) Security Protocols 1997. LNCS, vol. 1361, pp. 25\u201335. Springer, Heidelberg (1998). https:\/\/doi.org\/10.1007\/BFb0028157"},{"key":"6_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1007\/978-3-319-68687-5_13","volume-title":"Electronic Voting","author":"\u015e Patachi","year":"2017","unstructured":"Patachi, \u015e, Sch\u00fcrmann, C.: Eos a universal verifiable and coercion resistant voting protocol. In: Krimmer, R., Volkamer, M., Braun Binder, N., Kersting, N., Pereira, O., Sch\u00fcrmann, C. (eds.) E-Vote-ID 2017. LNCS, vol. 10615, pp. 210\u2013227. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-68687-5_13"},{"key":"6_CR40","doi-asserted-by":"publisher","unstructured":"Peixoto, B., Michelassi, C., Rocha, A.: Face liveness detection under bad illumination conditions. In: Macq, B., Schelkens, P. (eds.) 18th IEEE International Conference on Image Processing, ICIP 2011, pp. 3557\u20133560. IEEE (2011). https:\/\/doi.org\/10.1109\/ICIP.2011.6116484","DOI":"10.1109\/ICIP.2011.6116484"},{"issue":"2","key":"6_CR41","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1109\/MSECP.2003.1193209","volume":"1","author":"S Prabhakar","year":"2003","unstructured":"Prabhakar, S., Pankanti, S., Jain, A.K.: Biometric recognition: security and privacy concerns. IEEE Secur. Priv. 1(2), 33\u201342 (2003). https:\/\/doi.org\/10.1109\/MSECP.2003.1193209","journal-title":"IEEE Secur. Priv."},{"key":"6_CR42","unstructured":"Aiello, R.: A historic first: MPs hold House of Commons votes by app (2021). https:\/\/www.ctvnews.ca\/politics\/a-historic-first-mps-hold-house-of-commons-votes-by-app-1.5338151"},{"key":"6_CR43","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"552","DOI":"10.1007\/3-540-45682-1_32","volume-title":"Advances in Cryptology \u2014 ASIACRYPT 2001","author":"RL Rivest","year":"2001","unstructured":"Rivest, R.L., Shamir, A., Tauman, Y.: How to leak a secret. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 552\u2013565. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-45682-1_32"},{"key":"6_CR44","doi-asserted-by":"crossref","unstructured":"Rosacker, K.M., Rosacker, R.E.: Voting is a right: a decade of societal, technological and experiential progress towards the goal of remote-access voting. Transforming Government: People, Process and Policy (2020)","DOI":"10.1108\/TG-03-2020-0053"},{"issue":"9","key":"6_CR45","doi-asserted-by":"publisher","first-page":"2013","DOI":"10.1109\/TIFS.2017.2691658","volume":"12","author":"A Roy","year":"2017","unstructured":"Roy, A., Memon, N.D., Ross, A.: MasterPrint: exploring the vulnerability of partial fingerprint-based authentication systems. IEEE Trans. Inf. Forensics Secur. 12(9), 2013\u20132025 (2017). https:\/\/doi.org\/10.1109\/TIFS.2017.2691658","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"6_CR46","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1007\/978-3-662-53357-4_12","volume-title":"Financial Cryptography and Data Security","author":"PYA Ryan","year":"2016","unstructured":"Ryan, P.Y.A., R\u00f8nne, P.B., Iovino, V.: Selene: voting with transparent verifiability and coercion-mitigation. In: Clark, J., Meiklejohn, S., Ryan, P.Y.A., Wallach, D., Brenner, M., Rohloff, K. (eds.) FC 2016. LNCS, vol. 9604, pp. 176\u2013192. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-53357-4_12"},{"key":"6_CR47","doi-asserted-by":"crossref","unstructured":"Sabra, M., Maiti, A., Jadliwala, M.: Zoom on the keystrokes: exploiting video calls for keystroke inference attacks. In: 28th Annual Network and Distributed System Security Symposium, NDSS 2021, Virtually, 21\u201325 February 2021. The Internet Society (2021). https:\/\/www.ndss-symposium.org\/ndss-paper\/zoom-on-the-keystrokes-exploiting-video-calls-for-keystroke-inference-attacks\/","DOI":"10.14722\/ndss.2021.23063"},{"key":"6_CR48","unstructured":"Scytl: individual verifiability, Swiss Post E-voting protocol explained. Technical report, Swiss Post, November 2017. https:\/\/www.post.ch\/-\/media\/post\/evoting\/dokumente\/swiss-post-online-voting-protocol-explained.pdf?la=de"},{"key":"6_CR49","doi-asserted-by":"publisher","unstructured":"Shukla, D., Kumar, R., Serwadda, A., Phoha, V.V.: Beware, your hands reveal your secrets! In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, AZ, USA, 3\u20137 November 2014, pp. 904\u2013917. ACM (2014). https:\/\/doi.org\/10.1145\/2660267.2660360","DOI":"10.1145\/2660267.2660360"},{"issue":"1","key":"6_CR50","first-page":"23","volume":"67","author":"O Shweiki","year":"2019","unstructured":"Shweiki, O., Lee, Y.: Compelled use of biometric keys to unlock a digital device: deciphering recent legal developments. United States Attorneys\u2019 Bull. 67(1), 23\u201342 (2019)","journal-title":"United States Attorneys\u2019 Bull."},{"key":"6_CR51","unstructured":"Stenerud, I.S.G., Bull, C.: When reality comes knocking Norwegian experiences with verifiable electronic voting. In: Proceedings of EVOTE 2012. LNI, vol. P-205, pp. 21\u201333. GI (2012)"},{"key":"6_CR52","unstructured":"Wolf, P., Alim, A., Kasaro, B., Namugera, P., Saneem, M., Zorigt, T.: Introducing biometric technology in elections. International Institute for Democracy and Electoral Assistance (2017). https:\/\/www.idea.int\/sites\/default\/files\/publications\/introducing-biometric-technology-in-elections-reissue.pdf"},{"key":"6_CR53","doi-asserted-by":"publisher","unstructured":"Xu, Y., Heinly, J., White, A.M., Monrose, F., Frahm, J.: Seeing double: reconstructing obscured typed input from repeated compromising reflections. In: Sadeghi, A., Gligor, V.D., Yung, M. (eds.) 2013 ACM SIGSAC Conference on Computer and Communications Security, CCS 2013, Berlin, Germany, 4\u20138 November 2013, pp. 1063\u20131074. ACM (2013). https:\/\/doi.org\/10.1145\/2508859.2516709","DOI":"10.1145\/2508859.2516709"},{"key":"6_CR54","unstructured":"Xu, Y., Price, T., Frahm, J., Monrose, F.: Virtual U: defeating face liveness detection by building virtual models from your public photos. In: 25th USENIX Security Symposium, pp. 497\u2013512. USENIX Association (2016). https:\/\/www.usenix.org\/conference\/usenixsecurity16\/technical-sessions\/presentation\/xu"},{"issue":"4","key":"6_CR55","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1145\/954339.954342","volume":"35","author":"W Zhao","year":"2003","unstructured":"Zhao, W., Chellappa, R., Phillips, P.J., Rosenfeld, A.: Face recognition: a literature survey. ACM Comput. Surv. 35(4), 399\u2013458 (2003). https:\/\/doi.org\/10.1145\/954339.954342","journal-title":"ACM Comput. Surv."}],"container-title":["Lecture Notes in Computer Science","Emerging Technologies for Authorization and Authentication"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-93747-8_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,12]],"date-time":"2022-05-12T15:08:40Z","timestamp":1652368120000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-93747-8_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030937461","9783030937478"],"references-count":55,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-93747-8_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"13 January 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ETAA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Emerging Technologies for Authorization and Authentication","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Darmstadt","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 October 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 October 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"etaa2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/hosting.services.iit.cnr.it\/etaa2021\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"14","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"11","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"79% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}