{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T08:28:15Z","timestamp":1761812895604,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":44,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783032081230"},{"type":"electronic","value":"9783032081247"}],"license":[{"start":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T00:00:00Z","timestamp":1761868800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T00:00:00Z","timestamp":1761868800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-08124-7_11","type":"book-chapter","created":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T08:22:54Z","timestamp":1761812574000},"page":"216-236","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Inference Attacks on\u00a0Encrypted Online Voting via\u00a0Traffic Analysis"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-7236-7527","authenticated-orcid":false,"given":"Anastasiia","family":"Belousova","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5282-0965","authenticated-orcid":false,"given":"Francesco","family":"Marchiori","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3612-1934","authenticated-orcid":false,"given":"Mauro","family":"Conti","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,31]]},"reference":[{"issue":"4","key":"11_CR1","doi-asserted-by":"publisher","first-page":"1174","DOI":"10.1214\/aoms\/1177705688","volume":"31","author":"A Ansari","year":"1960","unstructured":"Ansari, A., Bradley, R.: Rank-sum tests for dispersions. Ann. Math. Statist. 31(4), 1174\u20131189 (1960)","journal-title":"Ann. Math. Statist."},{"key":"11_CR2","unstructured":"Assembly Voting: Assembly voting (2025). https:\/\/assemblyvoting.com\/. Accessed 11 May 2025"},{"key":"11_CR3","unstructured":"Belenios: Belenios (2025). https:\/\/www.belenios.org\/. Accessed 11 May 2025"},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"Berger, V., Zhou, Y.: Kolmogorov\u2013smirnov test: overview (2014)","DOI":"10.1002\/9781118445112.stat06558"},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"Bernhard, D., Kulyk, O., Volkamer, M.: Security proofs for participation privacy, receipt-freeness and ballot privacy for the Helios voting scheme. In: Proceedings of the 12th International Conference on Availability, Reliability and Security, pp. 1\u201310 (2017)","DOI":"10.1145\/3098954.3098990"},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"Blanchard, E., Gallais, A., Leblond, E., Sidhoum-Rahal, D., Walter, J.: An analysis of the security and privacy issues of the neovote online voting system. In: International Joint Conference on Electronic Voting, pp. 1\u201318. Springer, Cham (2022)","DOI":"10.1007\/978-3-031-15911-4_1"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Brunet, J., Pananos, A.D., Essex, A.: Review your choices: when confirmation pages break ballot secrecy in online elections. In: International Joint Conference on Electronic Voting, pp. 36\u201352. Springer, Cham (2022)","DOI":"10.1007\/978-3-031-15911-4_3"},{"issue":"4","key":"11_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1513601.1513604","volume":"12","author":"S Cabuk","year":"2009","unstructured":"Cabuk, S., Brodley, C.E., Shields, C.: IP covert channel detection. ACM Trans. Inf. Syst. Security 12(4), 1\u201329 (2009)","journal-title":"ACM Trans. Inf. Syst. Security"},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"Chondros, N., et al.: D-demos: a distributed, end-to-end verifiable, internet voting system. In: 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS), pp. 711\u2013720. IEEE (2016)","DOI":"10.1109\/ICDCS.2016.56"},{"issue":"2","key":"11_CR10","first-page":"60","volume":"6","author":"MJM Chowdhury","year":"2013","unstructured":"Chowdhury, M.J.M.: Comparison of e-voting schemes: Estonian and Norwegian solutions. Int. J. Appl. Inf. Syst. 6(2), 60\u201366 (2013)","journal-title":"Int. J. Appl. Inf. Syst."},{"key":"11_CR11","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1016\/j.neucom.2018.03.067","volume":"307","author":"M Christ","year":"2018","unstructured":"Christ, M., Braun, N., Neuffer, J., Kempa-Liehr, A.W.: Time series feature extraction on basis of scalable hypothesis tests (tsfresh-a python package). Neurocomputing 307, 72\u201377 (2018)","journal-title":"Neurocomputing"},{"key":"11_CR12","doi-asserted-by":"crossref","unstructured":"Clarkson, M.R., Chong, S., Myers, A.S.: Civitas: toward a secure voting system. In: Proceedings of the IEEE Symposium on Security and Privacy (SP), pp. 354\u2013368 (2008)","DOI":"10.1109\/SP.2008.32"},{"key":"11_CR13","unstructured":"Council of Europe: Recommendation CM\/Rec(2017)5 of the committee of ministers to member states on standards for e-voting (2017). https:\/\/www.coe.int\/en\/web\/electoral-assistance\/e-voting. Accessed 14 July 2025"},{"issue":"1","key":"11_CR14","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1080\/03461238.1928.10416862","volume":"1928","author":"H Cram\u00e9r","year":"1928","unstructured":"Cram\u00e9r, H.: On the composition of elementary errors. Scand. Actuar. J. 1928(1), 13\u201374 (1928)","journal-title":"Scand. Actuar. J."},{"key":"11_CR15","doi-asserted-by":"crossref","unstructured":"Damodaran, A., Rastikian, S., R\u00f8nne, P.B., Ryan, P.Y.: Hyperion: transparent end-to-end verifiable voting with coercion mitigation. Cryptology ePrint Archive (2024)","DOI":"10.1007\/978-3-032-07891-9_7"},{"key":"11_CR16","unstructured":"DW: Russia imprisons woman who wrote \u2018no to war\u2019 on ballot paper (2024). https:\/\/p.dw.com\/p\/4dwdm. Accessed 1 May 2025"},{"key":"11_CR17","unstructured":"ElectionBuddy: Electionbuddy (2025). https:\/\/electionbuddy.com\/. Accessed 11 May 2025"},{"key":"11_CR18","unstructured":"Eligo: Electronic, digital and online voting: what\u2019s the difference? (2025). https:\/\/eligovoting.com\/electronic-digital-and-online-voting\/. Accessed 27 May 2025"},{"key":"11_CR19","unstructured":"Eligo: Eligo (2025). https:\/\/eligovoting.com\/. Accessed 11 May 2025"},{"key":"11_CR20","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1080\/00949658608810963","volume":"26","author":"T Epps","year":"1986","unstructured":"Epps, T., Singleton, K.: An omnibus test for the two-sample problem using the empirical characteristic function. J. Stat. Comput. Simul. 26, 177\u2013203 (1986)","journal-title":"J. Stat. Comput. Simul."},{"key":"11_CR21","unstructured":"Euronews: Money for votes: Corruption arrests tarnish Spain regional elections (2023). https:\/\/www.euronews.com\/2023\/05\/27\/money-for-votes-corruption-arrests-tarnish-spain-regional-elections. Accessed 25 May 2025"},{"key":"11_CR22","unstructured":"Euronews: Eu calls for swift probe of alleged irregularities in Georgia election (2024). https:\/\/www.euronews.com\/my-europe\/2024\/10\/28\/eu-calls-for-swift-probe-of-alleged-georgian-election-irregularities. Accessed 25 May 2025"},{"key":"11_CR23","unstructured":"Europe, N.G.: Woman fined for writing \u2018burn in hell\u2019 alongside putin\u2019s name on ballot sheet (2024). Accessed 1 May 2025"},{"issue":"3","key":"11_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.46586\/tches.v2020.i3.1-21","volume":"2020","author":"L Frittoli","year":"2020","unstructured":"Frittoli, L.: Strengthening sequential side-channel attacks through change detection. TCHES 2020(3), 1\u201321 (2020)","journal-title":"TCHES"},{"key":"11_CR25","unstructured":"Government of Ireland: D\u00e1il election voters. selfies\/photographs (2024). https:\/\/www.gov.ie\/en\/department-of-housing-local-government-and-heritage\/publications\/d%C3%A1il-election-voters\/. Accessed 1 May 2025"},{"issue":"6","key":"11_CR26","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1016\/S0167-4048(02)01014-3","volume":"21","author":"DA Gritzalis","year":"2002","unstructured":"Gritzalis, D.A.: Principles and requirements for a secure e-voting system. Comput. Secur. 21(6), 539\u2013556 (2002)","journal-title":"Comput. Secur."},{"key":"11_CR27","unstructured":"Helios: Helios voting (2025). https:\/\/vote.heliosvoting.org\/. Accessed 11 May 2025"},{"issue":"3","key":"11_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3439725","volume":"54","author":"J Huang","year":"2021","unstructured":"Huang, J., He, D., Obaidat, M.S., Vijayakumar, P., Luo, M., Choo, K.R.: The application of the blockchain technology in voting systems: a review. ACM Comput. Surv. 54(3), 1\u201328 (2021)","journal-title":"ACM Comput. Surv."},{"issue":"17","key":"11_CR29","doi-asserted-by":"publisher","first-page":"5874","DOI":"10.3390\/s21175874","volume":"21","author":"U Jafar","year":"2021","unstructured":"Jafar, U., Aziz, M.J.A., Shukur, Z.: Blockchain for electronic voting system\u2013review and open research challenges. Sensors 21(17), 5874 (2021)","journal-title":"Sensors"},{"key":"11_CR30","doi-asserted-by":"crossref","unstructured":"Lalitha, V., Samundeswari, S., Roobinee, R., Swetha, L.S.: Decentralized online voting system using blockchain. In: 2022 International Conference on Applied Artificial Intelligence and Computing (ICAAIC), pp. 1387\u20131391. IEEE (2022)","DOI":"10.1109\/ICAAIC53929.2022.9792791"},{"issue":"1","key":"11_CR31","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1093\/biomet\/58.1.213","volume":"58","author":"Y Lepage","year":"1971","unstructured":"Lepage, Y.: A combination of Wilcoxon\u2019s and Ansari-Bradley\u2019s statistics. Biometrika 58(1), 213\u2013217 (1971)","journal-title":"Biometrika"},{"key":"11_CR32","doi-asserted-by":"crossref","unstructured":"Licht, N., Duenas-Cid, D., Krivonosova, I., Krimmer, R.: To i-vote or not to i-vote: drivers and barriers to the implementation of internet voting. In: Electronic Voting: 6th International Joint Conference, E-Vote-ID 2021, Virtual Event, 5\u20138 October 2021, Proceedings 6, pp. 91\u2013105. Springer, Cham (2021)","DOI":"10.1007\/978-3-030-86942-7_7"},{"key":"11_CR33","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/s10260-014-0255-x","volume":"23","author":"M Marozzi","year":"2014","unstructured":"Marozzi, M.: The multisample cucconi test. Stat. Methods Appl. 23, 209\u2013227 (2014)","journal-title":"Stat. Methods Appl."},{"key":"11_CR34","unstructured":"NCSL: Secrecy of the ballot and ballot selfies (2024). https:\/\/www.ncsl.org\/elections-and-campaigns\/secrecy-of-the-ballot-and-ballot-selfies. Accessed 1 May 2025"},{"issue":"5\u20137","key":"11_CR35","doi-asserted-by":"publisher","first-page":"747","DOI":"10.1002\/sim.4780130535","volume":"13","author":"M Podgor","year":"1994","unstructured":"Podgor, M., Gastwirth, J.: On non-parametric and generalized tests for the two-sample problem with location and scale change alternatives. Stat. Med. 13(5\u20137), 747\u2013758 (1994)","journal-title":"Stat. Med."},{"key":"11_CR36","unstructured":"POLITICO Europe: Vote-buying allegations rock Bulgaria as protests escalate (2024). https:\/\/www.politico.eu\/article\/vote-buying-allegation-election-bulgaria-protest\/. Accessed 25 May 2025"},{"key":"11_CR37","unstructured":"POLYAS: Case studies (2025). https:\/\/www.polyas.com\/case-studies. Accessed 11 May 2025"},{"key":"11_CR38","unstructured":"POLYAS: Polyas (2025). https:\/\/www.polyas.com\/. Accessed 11 May 2025"},{"key":"11_CR39","doi-asserted-by":"crossref","unstructured":"Sheela, A.S., Franklin, R.G.: E-voting system using homomorphic encryption technique. In: Journal of Physics: Conference Series, vol.\u00a01770, p. 012011. IOP Publishing (2021)","DOI":"10.1088\/1742-6596\/1770\/1\/012011"},{"key":"11_CR40","unstructured":"Specter, M.A., Koppel, J., Weitzner, D.: The ballot is busted before the blockchain: a security analysis of voatz, the first internet voting application used in $$\\{$$US$$\\}$$. federal elections. In: 29th USENIX Security Symposium (USENIX Security 2020), pp. 1535\u20131553 (2020)"},{"key":"11_CR41","unstructured":"The Federal Returning Officer: European parliament election 2024. On the Sunday of the election (2024). https:\/\/www.bundeswahlleiterin.de\/en\/europawahlen\/2024\/informationen-waehler\/wahlsonntag.html#6d33b849-0698-4561-946a-c15a4684264f. Accessed 1 May 2025"},{"key":"11_CR42","unstructured":"Tribunal Superior Eleitoral: Resolu\u00c7\u00c3o n$$^{\\underline{{\\rm o}}}$$ 23.736, de 27 de fevereiro de 2024 (2024). https:\/\/www.tse.jus.br\/legislacao\/compilada\/res\/2024\/resolucao-no-23-736-de-27-de-fevereiro-de-2024. Accessed 1 May 2025"},{"key":"11_CR43","unstructured":"Voatz: Voatz (2025). https:\/\/voatz.com\/. Accessed 11 May 2025"},{"key":"11_CR44","doi-asserted-by":"crossref","unstructured":"Wu, Y., Kasahara, S.: Smart contract-based e-voting system using homomorphic encryption and zero-knowledge proof. In: International Conference on Applied Cryptography and Network Security, pp. 67\u201383. Springer, Cham (2023)","DOI":"10.1007\/978-3-031-41181-6_4"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-08124-7_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T08:23:20Z","timestamp":1761812600000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-08124-7_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,31]]},"ISBN":["9783032081230","9783032081247"],"references-count":44,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-08124-7_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025,10,31]]},"assertion":[{"value":"31 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Seoul","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Korea (Republic of)","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isw2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/isc25.skku.edu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}