{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T20:51:30Z","timestamp":1762375890455},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319116976"},{"type":"electronic","value":"9783319116983"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-11698-3_26","type":"book-chapter","created":{"date-parts":[[2014,10,9]],"date-time":"2014-10-09T05:18:13Z","timestamp":1412831893000},"page":"335-348","source":"Crossref","is-referenced-by-count":2,"title":["Countering Ballot Stuffing and Incorporating Eligibility Verifiability in Helios"],"prefix":"10.1007","author":[{"given":"Sriramkrishnan","family":"Srinivasan","sequence":"first","affiliation":[]},{"given":"Chris","family":"Culnane","sequence":"additional","affiliation":[]},{"given":"James","family":"Heather","sequence":"additional","affiliation":[]},{"given":"Steve","family":"Schneider","sequence":"additional","affiliation":[]},{"given":"Zhe","family":"Xia","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"26_CR1","unstructured":"Adida, B.: Helios Web-based open-audit voting. In: van Oorschot, P.C. (ed.) USENIX Security Symposium, pp. 335\u2013348. USENIX Association (2008)"},{"key":"26_CR2","unstructured":"Adida, B., De Marneffe, O., Pereira, O., Quisquater, J.: Electing a university president using open-audit voting: analysis of real-world use of helios. In: Proceedings of the 2009 Conference on Electronic Voting Technology\/Workshop on Trustworthy Elections, p. 10. USENIX Association (2009)"},{"key":"26_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"386","DOI":"10.1007\/978-3-540-31979-5_33","volume-title":"Information Security Practice and Experience","author":"J. Baek","year":"2005","unstructured":"Baek, J., Safavi-Naini, R., Susilo, W.: Token-controlled public key encryption. In: Deng, R.H., Bao, F., Pang, H., Zhou, J. (eds.) ISPEC 2005. LNCS, vol.\u00a03439, pp. 386\u2013397. Springer, Heidelberg (2005)"},{"key":"26_CR4","unstructured":"Benaloh, J.: Simple verifiable elections. In: Proceedings of the USENIX\/Accurate Electronic Voting Technology Workshop 2006 on Electronic Voting Technology Workshop, p. 5. USENIX Association (2006)"},{"key":"26_CR5","unstructured":"Clarkson, M.E., Chong, S., Myers, A.C.: Civitas: A secure remote voting system. In: Chaum, D., Kutylowski, M., Rivest, R.L., Ryan, P.Y.A. (eds.) Frontiers of Electronic Voting. Dagstuhl Seminar Proceedings, vol.\u00a007311, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany (2007)"},{"key":"26_CR6","doi-asserted-by":"crossref","unstructured":"Cortier, V., Smyth, B.: Attacking and fixing helios: An analysis of ballot secrecy. In: CSF, pp. 297\u2013311. IEEE Computer Society (2011)","DOI":"10.1109\/CSF.2011.27"},{"key":"26_CR7","unstructured":"Essex, A., Clark, J., Hengartner, U.: Cobra: toward concurrent ballot authorization for Internet voting. In: EVT 2012 (2012)"},{"key":"26_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1007\/11889663_16","volume-title":"Financial Cryptography and Data Security","author":"D. Galindo","year":"2006","unstructured":"Galindo, D., Herranz, J.: A generic construction for token-controlled public key encryption. In: Di Crescenzo, G., Rubin, A. (eds.) FC 2006. LNCS, vol.\u00a04107, pp. 177\u2013190. Springer, Heidelberg (2006)"},{"key":"26_CR9","unstructured":"Haber, S., Benaloh, J., Halevi, S.: The helios e-voting demo for the iacr. International Association for Cryptologic Research (2010), \n                    \n                      http:\/\/www.iacr.org\/elections\/eVoting\/heliosDemo.pdf"},{"key":"26_CR10","doi-asserted-by":"crossref","unstructured":"Juels, A., Catalano, D., Jakobsson, M.: Coercion-resistant electronic elections. In: Atluri, V., di Vimercati, S.D.C., Dingledine, R. (eds.) WPES, pp. 61\u201370. ACM (2005)","DOI":"10.1145\/1102199.1102213"},{"key":"26_CR11","unstructured":"Smyth, B.: Replay attacks that violate ballot secrecy in helios. Cryptology ePrint Archive, Report 2012\/185 (2012), \n                    \n                      http:\/\/eprint.iacr.org\/"},{"key":"26_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1007\/978-3-642-16074-5_11","volume-title":"Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security","author":"B. Smyth","year":"2010","unstructured":"Smyth, B., Ryan, M., Kremer, S., Kourjieh, M.: Towards automatic analysis of election verifiability properties. In: Armando, A., Lowe, G. (eds.) ARSPA-WITS 2010. LNCS, vol.\u00a06186, pp. 146\u2013163. Springer, Heidelberg (2010)"}],"container-title":["Lecture Notes in Computer Science","Network and System Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-11698-3_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,28]],"date-time":"2019-05-28T02:54:32Z","timestamp":1559012072000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-11698-3_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319116976","9783319116983"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-11698-3_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}