{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T05:44:32Z","timestamp":1748583872346,"version":"3.40.3"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319222691"},{"type":"electronic","value":"9783319222707"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-22270-7_2","type":"book-chapter","created":{"date-parts":[[2015,8,12]],"date-time":"2015-08-12T03:48:50Z","timestamp":1439351330000},"page":"19-34","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Log Analysis of Estonian Internet Voting 2013\u20132014"],"prefix":"10.1007","author":[{"given":"Sven","family":"Heiberg","sequence":"first","affiliation":[]},{"given":"Arnis","family":"Parsovs","sequence":"additional","affiliation":[]},{"given":"Jan","family":"Willemson","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,8,13]]},"reference":[{"key":"2_CR1","unstructured":"Timeout for Expect: 100-continue as an option, Oct 2013, Curl-library mailing list archives. http:\/\/curl.haxx.se\/mail\/lib-2013-10\/0142.html"},{"key":"2_CR2","unstructured":"Antonyan, T., Davtyan, S., Kentros, S., Kiayias, A., Michel, L., Nicolaou, N., Russell, A., Shvartsman, A.: Automating voting terminal event log analysis. In: Electronic Voting Technology Workshop\/Workshop on Trustworthy Elections (EVT\/WOTE09) (2009)"},{"key":"2_CR3","unstructured":"Bull, C., Nore, H.: Problems encountered. Seminar on Internet voting, Sep 2013. https:\/\/www.regjeringen.no\/contentassets\/c41c2959b8d946bf8007b546552ff9dc\/5_problems_encountered.pdf"},{"issue":"1","key":"2_CR4","doi-asserted-by":"crossref","first-page":"89","DOI":"10.3233\/JCS-2012-0458","volume":"21","author":"V Cortier","year":"2013","unstructured":"Cortier, V., Smyth, B.: Attacking and fixing Helios: an analysis of ballot secrecy. J. Comput. Secur. 21(1), 89\u2013148 (2013)","journal-title":"J. Comput. Secur."},{"key":"2_CR5","unstructured":"Estonian National Electoral Committee: Municipal Elections 2013 Results (2013). http:\/\/kov2013.vvk.ee\/"},{"key":"2_CR6","unstructured":"Estonian National Electoral Committee: Source code of the server side components of Estonian internet-voting system, Jul 2013. https:\/\/github.com\/vvk-ehk\/evalimine"},{"key":"2_CR7","unstructured":"Estonian National Electoral Committee: Statistics about Internet Voting in Estonia (2013). http:\/\/vvk.ee\/voting-methods-in-estonia\/engindex\/statistics"},{"key":"2_CR8","unstructured":"Estonian National Electoral Committee: European Parliament Elections 2014 Results (2014). http:\/\/ep2014.vvk.ee\/detailed-en.html"},{"key":"2_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1007\/978-3-642-32747-6_13","volume-title":"E-Voting and Identity","author":"S Heiberg","year":"2012","unstructured":"Heiberg, S., Laud, P., Willemson, J.: The application of I-voting for estonian parliamentary elections of 2011. In: Kiayias, A., Lipmaa, H. (eds.) VoteID 2011. LNCS, vol. 7187, pp. 208\u2013223. Springer, Heidelberg (2012)"},{"key":"2_CR10","doi-asserted-by":"publisher","first-page":"128","DOI":"10.4018\/978-1-4666-5820-2.ch007","volume-title":"Design, Development, and Use of Secure Electronic Voting Systems","author":"S Heiberg","year":"2014","unstructured":"Heiberg, S., Willemson, J.: Modeling threats of a voting method. In: Zissis, D., Lekkas, D. (eds.) Design, Development, and Use of Secure Electronic Voting Systems, pp. 128\u2013148. IGI Global, Hershey (2014)"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"Heiberg, S., Willemson, J.: Verifiable internet voting in Estonia. In: Krimmer, R., Volkamer, M. (eds.) 6th International Conference on Electronic Voting 2014, (EVOTE 2014), 28\u201331 October 2014, Bregenz, Austria, pp. 23\u201329. TUT Press, Tallinn (2014)","DOI":"10.1109\/EVOTE.2014.7001135"},{"key":"2_CR12","unstructured":"Michel, L.D., Shvartsman, A.A., Volgushev, N.: A systematic approach to analyzing voting terminal event logs. USENIX J. Election Technol. Syst. (JETS) 2(2), April 2014. https:\/\/www.usenix.org\/system\/files\/jets\/issues\/0202\/overview\/jets_0202-michel.pdf"},{"key":"2_CR13","unstructured":"OpenSC project: Regression in e35febe: compute cert length, Dec 2012. https:\/\/github.com\/OpenSC\/OpenSC\/pull\/114"},{"key":"2_CR14","unstructured":"Peisert, S., Bishop, M., Yasinsac, A.: Vote selling, voter anonymity, and forensic logging of electronic voting machines. In: 42nd Hawaii International Conference on System Sciences, 2009. HICSS 2009, pp. 1\u201310. IEEE (2009)"}],"container-title":["Lecture Notes in Computer Science","E-Voting and Identity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-22270-7_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,31]],"date-time":"2023-01-31T04:22:42Z","timestamp":1675138962000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-22270-7_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319222691","9783319222707"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-22270-7_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"13 August 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}