{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T13:42:14Z","timestamp":1767706934142,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031324147"},{"type":"electronic","value":"9783031324154"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-32415-4_27","type":"book-chapter","created":{"date-parts":[[2023,7,21]],"date-time":"2023-07-21T20:25:45Z","timestamp":1689971145000},"page":"391-406","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["RemoteVote and\u00a0SAFE Vote: Towards Usable End-to-End Verification for\u00a0Vote-by-Mail"],"prefix":"10.1007","author":[{"given":"Braden L.","family":"Crimmins","sequence":"first","affiliation":[]},{"given":"Marshall","family":"Rhea","sequence":"additional","affiliation":[]},{"given":"J. Alex","family":"Halderman","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,7,22]]},"reference":[{"key":"27_CR1","unstructured":"Adida, B.: Helios: web-based open-audit voting. In: Usenix Security (2008)"},{"key":"27_CR2","doi-asserted-by":"publisher","unstructured":"Basin, D.A., Radomirovic, S., and Schmid, L.: Dispute resolution in voting. In: 33rd Computer Security Foundations Symposium (2020). https:\/\/doi.org\/10.1109\/CSF49147.2020.00009","DOI":"10.1109\/CSF49147.2020.00009"},{"key":"27_CR3","unstructured":"Benaloh, J.: Ballot casting assurance via voter-initiated poll station auditing. In: Electronic Voting Technology. Usenix (2007). https:\/\/www.usenix.org\/legacy\/events\/evt07\/tech\/full_papers\/benaloh\/benaloh.pdf"},{"key":"27_CR4","unstructured":"Benaloh, J.: Simple verifiable elections. In: Electronic Voting Technology. Usenix (2006). https:\/\/www.usenix.org\/conference\/evt-06\/simple-verifiable-elections"},{"key":"27_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/978-3-030-86942-7_3","volume-title":"Electronic Voting","author":"J Benaloh","year":"2021","unstructured":"Benaloh, J.: STROBE-voting: send two, receive one ballot encoding. In: Krimmer, R., et al. (eds.) E-Vote-ID 2021. LNCS, vol. 12900, pp. 33\u201346. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-86942-7_3"},{"key":"27_CR6","unstructured":"Benaloh, J., Rivest, R.L., Ryan, P.Y.A., Stark, P.B., Teague, V., Vora, P.L.: End-to-end verifiability (2015). https:\/\/arxiv.org\/abs\/1504.03778"},{"key":"27_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1007\/978-3-319-68687-5_6","volume-title":"Electronic Voting","author":"M Bernhard","year":"2017","unstructured":"Bernhard, M., et al.: Public evidence from secret ballots. In: Krimmer, R., Volkamer, M., Braun Binder, N., Kersting, N., Pereira, O., Sch\u00fcrmann, C. (eds.) E-Vote-ID 2017. LNCS, vol. 10615, pp. 84\u2013109. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-68687-5_6"},{"key":"27_CR8","unstructured":"Brumback, K.: Second Georgia county finds previously uncounted votes, Associated Press (2020). https:\/\/apnews.com\/article\/2nd-georgia-county-find-uncounted-votes-018eac6ac24733d63d356ee76f485530"},{"key":"27_CR9","unstructured":"Bulens, P., Giry, D., Pereira, O.: Running mixnet-based elections with Helios. In: Electronic Voting Technology. Usenix (2011). https:\/\/www.usenix.org\/conference\/evtwote-11\/running-mixnet-based-elections-helios"},{"key":"27_CR10","doi-asserted-by":"publisher","unstructured":"Clarkson, M.R., Chong, S., Myers, A.C.: Civitas: Toward a secure voting system. In: 29th IEEE Symposium on Security and Privacy (2008). https:\/\/doi.org\/10.1109\/sp.2008.32","DOI":"10.1109\/sp.2008.32"},{"key":"27_CR11","unstructured":"Cunningham, M.: Millions of Americans are receiving absentee ballot applications from outside groups, ABC News (2020). https:\/\/abcnews.go.com\/Politics\/story?id=72821041"},{"key":"27_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"481","DOI":"10.1007\/978-3-642-40203-6_27","volume-title":"Computer Security \u2013 ESORICS 2013","author":"\u00c9 Cuvelier","year":"2013","unstructured":"Cuvelier, \u00c9., Pereira, O., Peters, T.: Election verifiability or ballot privacy: do we need to choose? In: Crampton, J., Jajodia, S., Mayes, K. (eds.) ESORICS 2013. LNCS, vol. 8134, pp. 481\u2013498. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-40203-6_27"},{"key":"27_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1007\/978-3-662-53357-4_16","volume-title":"Financial Cryptography and Data Security","author":"A Escala","year":"2016","unstructured":"Escala, A., Guasch, S., Herranz, J., Morillo, P.: Universal cast-as-intended verifiability. In: Clark, J., Meiklejohn, S., Ryan, P.Y.A., Wallach, D., Brenner, M., Rohloff, K. (eds.) FC 2016. LNCS, vol. 9604, pp. 233\u2013250. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-53357-4_16"},{"key":"27_CR14","unstructured":"Joffe-Block, J.: Four vote-by-mail ballot applications do not mean four votes, Associated Press (2020). https:\/\/apnews.com\/article\/9414462696"},{"key":"27_CR15","unstructured":"Kennedy, L.: How the 2000 election came down to a Supreme Court decision, History (2020). https:\/\/www.history.com\/news\/2000-election-bush-gore-votes-supreme-court"},{"key":"27_CR16","doi-asserted-by":"publisher","unstructured":"Langer, L., Schmidt, A., Buchmann, J., Volkamer, M., Stolfik, A.: Towards a framework on the security requirements for electronic voting protocols. In: RE- VOTE. IEEE (2010). https:\/\/doi.org\/10.1109\/RE-VOTE.2009.9","DOI":"10.1109\/RE-VOTE.2009.9"},{"issue":"5","key":"27_CR17","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/MSP.2012.56","volume":"10","author":"M Lindeman","year":"2012","unstructured":"Lindeman, M., Stark, P.: A gentle introduction to risk-limiting audits. IEEE Secur. Priv. 10(5), 42\u201349 (2012). https:\/\/doi.org\/10.1109\/MSP.2012.56","journal-title":"IEEE Secur. Priv."},{"key":"27_CR18","doi-asserted-by":"publisher","unstructured":"Marky, K., Kulyk, O., Renaud, K., Volkamer, M.: What did I really vote for? On the usability of verifiable e-voting schemes. In: CHI. ACM (2018). https:\/\/doi.org\/10.1145\/3173574.3173750","DOI":"10.1145\/3173574.3173750"},{"key":"27_CR19","unstructured":"National Conference of State Legislatures: Voting outside the polling place: Absentee, all-mail and other voting at home options, (2020). https:\/\/www.ncsl.org\/research\/elections-and-campaigns\/absentee-and-early-voting.aspx"},{"key":"27_CR20","unstructured":"Pereira, O.: Verifiable elections with commitment consistent encryption: a primer (2014). http:\/\/arxiv.org\/abs\/1412.7358"},{"key":"27_CR21","unstructured":"Rivest, R.L., Virza, M.: Software independence revisited. In: Real-World Electronic Voting: Design, Analysis and Deployment. Ed. by F. Hao P.Y.A. Ryan. CRC Press (2016). https:\/\/www.realworldevoting.com\/files\/Chapter1.pdf"},{"key":"27_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1007\/978-3-662-53357-4_12","volume-title":"Financial Cryptography and Data Security","author":"PYA Ryan","year":"2016","unstructured":"Ryan, P.Y.A., R\u00f8nne, P.B., Iovino, V.: Selene: voting with transparent verifiability and coercion-Mitigation. In: Clark, J., Meiklejohn, S., Ryan, P.Y.A., Wallach, D., Brenner, M., Rohloff, K. (eds.) FC 2016. LNCS, vol. 9604, pp. 176\u2013192. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-53357-4_12"},{"key":"27_CR23","unstructured":"Stewart III, C.: How We Voted in 2020: A first look at the Survey of the performance of American elections. (2020). http:\/\/electionlab.mit.edu\/sites\/default\/files\/2020-12\/How-we-voted-in-2020-v01.pdf"},{"key":"27_CR24","unstructured":"U.S. Census Bureau: Voting and registration in the election of November 2020 (2021). https:\/\/www.census.gov\/data\/tables\/time-series\/demo\/voting-and-registration\/p20-585.html"},{"key":"27_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1007\/978-3-642-38980-1_28","volume-title":"Applied Cryptography and Network Security","author":"F Zag\u00f3rski","year":"2013","unstructured":"Zag\u00f3rski, F., Carback, R.T., Chaum, D., Clark, J., Essex, A., Vora, P.L.: Remotegrity: design and use of an end-to-end verifiable remote voting system. In: Jacobson, M., Locasto, M., Mohassel, P., Safavi-Naini, R. (eds.) ACNS 2013. LNCS, vol. 7954, pp. 441\u2013457. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-38980-1_28"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security. FC 2022 International Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-32415-4_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,21]],"date-time":"2023-07-21T20:28:23Z","timestamp":1689971303000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-32415-4_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031324147","9783031324154"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-32415-4_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"22 July 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Financial Cryptography and Data Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Grenada","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Grenada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 May 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 May 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fc2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/fc22.ifca.ai\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Hotcrp","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"159","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"32","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}