{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T00:40:02Z","timestamp":1748565602885,"version":"3.41.0"},"publisher-location":"Cham","reference-count":41,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319228457"},{"type":"electronic","value":"9783319228464"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-22846-4_6","type":"book-chapter","created":{"date-parts":[[2015,8,13]],"date-time":"2015-08-13T13:50:58Z","timestamp":1439473858000},"page":"88-103","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Enhancing the Trustworthiness of Service On-Demand Systems via Smart Vote Filtering"],"prefix":"10.1007","author":[{"given":"Christos V.","family":"Samaras","sequence":"first","affiliation":[]},{"given":"Ageliki","family":"Tsioliaridou","sequence":"additional","affiliation":[]},{"given":"Christos","family":"Liaskos","sequence":"additional","affiliation":[]},{"given":"Dimitris","family":"Spiliotopoulos","sequence":"additional","affiliation":[]},{"given":"Sotiris","family":"Ioannidis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,8,14]]},"reference":[{"issue":"6","key":"6_CR1","doi-asserted-by":"publisher","first-page":"846","DOI":"10.1109\/90.811450","volume":"7","author":"D Aksoy","year":"1999","unstructured":"Aksoy, D., Franklin, M.: R$$\\times $$W: a scheduling approach for large-scale on-demand data broadcast. IEEE\/ACM Trans. Network. 7(6), 846\u2013860 (1999)","journal-title":"IEEE\/ACM Trans. Network."},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"Backes, M., Hritcu, C., Maffei, M.: Automated verification of remote electronic voting protocols in the applied pi-calculus. In: Proceedings of the 21st IEEE Computer Security Foundations Symposium (CSF 2008), pp. 195\u2013209, Pittsburgh, 23\u201325 June 2008 (2008). http:\/\/doi.ieeecomputersociety.org\/10.1109\/CSF.2008.26","DOI":"10.1109\/CSF.2008.26"},{"issue":"8","key":"6_CR3","doi-asserted-by":"publisher","first-page":"642","DOI":"10.1016\/j.cose.2005.07.008","volume":"24","author":"F Baiardi","year":"2005","unstructured":"Baiardi, F., Falleni, A., Granchi, R., Martinelli, F., Petrocchi, M., Vaccarelli, A.: Seas, a secure e-voting protocol: design and implementation. Comput. Secur. 24(8), 642\u2013652 (2005). http:\/\/dx.doi.org\/10.1016\/j.cose.2005.07.008","journal-title":"Comput. Secur."},{"key":"6_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/computers3010001","volume":"3","author":"Y Benkaouz","year":"2014","unstructured":"Benkaouz, Y., Erradi, M.: A distributed protocol for privacy preserving aggregation with non-permanent participants. Computing. J. 3, 1\u201320 (2014). doi:10.1007\/s00607-013-0373-6","journal-title":"Computing. J."},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Benkaouz, Y., Guerraoui, R., Erradi, M., Huc, F.: A distributed polling with probabilistic privacy. In: IEEE 32nd Symposium on Reliable Distributed Systems (SRDS 2013), pp. 41\u201350, Braga, 1\u20133 October 2013 (2013). http:\/\/dx.doi.org\/10.1109\/SRDS.2013.13","DOI":"10.1109\/SRDS.2013.13"},{"key":"6_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/3-540-44987-6_7","volume-title":"Advances in Cryptology - EUROCRYPT 2001","author":"JL Camenisch","year":"2001","unstructured":"Camenisch, J.L., Lysyanskaya, A.: An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 93\u2013118. Springer, Heidelberg (2001)"},{"issue":"10","key":"6_CR7","doi-asserted-by":"publisher","first-page":"1030","DOI":"10.1145\/4372.4373","volume":"28","author":"D Chaum","year":"1985","unstructured":"Chaum, D.: Security without identification: transaction systems to make big brother obsolete. Commun. ACM 28(10), 1030\u20131044 (1985). http:\/\/doi.acm.org\/10.1145\/4372.4373","journal-title":"Commun. ACM"},{"issue":"4","key":"6_CR8","doi-asserted-by":"publisher","first-page":"330","DOI":"10.1016\/j.cose.2004.01.015","volume":"23","author":"Y Chen","year":"2004","unstructured":"Chen, Y., Jan, J., Chen, C.: The design of a secure anonymous internet voting system. Comput. Secur. 23(4), 330\u2013337 (2004). http:\/\/dx.doi.org\/10.1016\/j.cose.2004.01.015","journal-title":"Comput. Secur."},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Clarkson, M.R., Chong, S., Myers, A.C.: Civitas: Toward a secure voting system. In: 2008 IEEE Symposium on Security and Privacy (S&P 2008), pp. 354\u2013368, Oakland, 18\u201321 May 2008. http:\/\/dx.doi.org\/10.1109\/SP.2008.32","DOI":"10.1109\/SP.2008.32"},{"issue":"1","key":"6_CR10","doi-asserted-by":"crossref","first-page":"89","DOI":"10.3233\/JCS-2012-0458","volume":"21","author":"V Cortier","year":"2013","unstructured":"Cortier, V., Smyth, B.: Attacking and fixing helios: an analysis of ballot secrecy. J. Comput. Secur. 21(1), 89\u2013148 (2013)","journal-title":"J. Comput. Secur."},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"Cranor, L.F., Cytron, R.: Sensus: a security-conscious electronic polling system for the internet. In: 30th Annual Hawaii International Conference on System Sciences (HICSS-30), pp. 561\u2013570, Maui, 7\u201310 January 1997. http:\/\/doi.ieeecomputersociety.org\/10.1109\/HICSS.1997.661700","DOI":"10.1109\/HICSS.1997.661700"},{"issue":"345","key":"6_CR12","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1080\/01621459.1974.10480137","volume":"69","author":"MH Degroot","year":"1974","unstructured":"Degroot, M.H.: Reaching a consensus. J. Am. Stat. Assoc. 69(345), 118\u2013121 (1974)","journal-title":"J. Am. Stat. Assoc."},{"key":"6_CR13","unstructured":"Dykeman, H.D., Ammar, M.H., Wong, J.W.: Scheduling algorithms for videotex systems under broadcast delivery. In: Proceedings of the International Conference on Communications (ICC 1986), pp. 1847\u20131851, Toronto, June 1986"},{"key":"6_CR14","doi-asserted-by":"crossref","unstructured":"Englert, B., Gheissari, R.: Multivalued and deterministic peer-to-peer polling in social networks with reputation conscious participants. In: 12th IEEE International Conference on Ubiquitous Computing and Communications (IUCC-2013), pp. 895\u2013902, Melbourne, July 16\u201318 2013. http:\/\/dx.doi.org\/10.1109\/TrustCom.2013.109","DOI":"10.1109\/TrustCom.2013.109"},{"issue":"9\u201310","key":"6_CR15","doi-asserted-by":"publisher","first-page":"1611","DOI":"10.1016\/j.mcm.2008.05.039","volume":"48","author":"C Fan","year":"2008","unstructured":"Fan, C., Sun, W.: An efficient multi-receipt mechanism for uncoercible anonymous electronic voting. Math. Comput. Model. 48(9\u201310), 1611\u20131627 (2008). http:\/\/dx.doi.org\/10.1016\/j.mcm.2008.05.039","journal-title":"Math. Comput. Model."},{"issue":"11","key":"6_CR16","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1016\/S1353-4858(08)70041-2","volume":"2007","author":"D Frith","year":"2007","unstructured":"Frith, D.: E-voting security: hope or hype? Netw. Secur. 2007(11), 14\u201316 (2007)","journal-title":"Netw. Secur."},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"Gambs, S., Guerraoui, R., Harkous, H., Huc, F., Kermarrec, A.: Scalable and secure polling in dynamic distributed networks. In: IEEE 31st Symposium on Reliable Distributed Systems (SRDS 2012), pp. 181\u2013190, Irvine, 8\u201311 October 2012. http:\/\/dx.doi.org\/10.1109\/SRDS.2012.63","DOI":"10.1109\/SRDS.2012.63"},{"issue":"1","key":"6_CR18","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1016\/j.inffus.2009.04.006","volume":"11","author":"J Greensmith","year":"2010","unstructured":"Greensmith, J., Aickelin, U., Tedesco, G.: Information fusion for anomaly detection with the dendritic cell algorithm. Inf. Fusion 11(1), 21\u201334 (2010)","journal-title":"Inf. Fusion"},{"issue":"6","key":"6_CR19","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1016\/S0167-4048(02)01014-3","volume":"21","author":"D Gritzali","year":"2002","unstructured":"Gritzali, D.: Principles and requirements for a secure e-voting system. Comput. Secur. 21(6), 539\u2013556 (2002). http:\/\/dx.doi.org\/10.1016\/S0167-4048(02)01014\u20133","journal-title":"Comput. Secur."},{"issue":"1","key":"6_CR20","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/j.jpdc.2011.09.003","volume":"72","author":"R Guerraoui","year":"2012","unstructured":"Guerraoui, R., Huguenin, K., Kermarrec, A., Monod, M., Vigfusson, Y.: Decentralized polling with respectable participants. J. Parallel Distrib. Comput. 72(1), 13\u201326 (2012). http:\/\/dx.doi.org\/10.1016\/j.jpdc.2011.09.003","journal-title":"J. Parallel Distrib. Comput."},{"key":"6_CR21","unstructured":"Hoang, B., Imine, A.: Efficient polling protocol for decentralized social networks. CoRR abs\/1412.7653 (2014). http:\/\/arxiv.org\/abs\/1412.7653"},{"issue":"2","key":"6_CR22","first-page":"47","volume":"1","author":"R Joaquim","year":"2003","unstructured":"Joaquim, R., Z\u00faquete, A., Ferreira, P.: Revs-a robust electronic voting system. IADIS Int. J. WWW\/Internet 1(2), 47\u201363 (2003)","journal-title":"IADIS Int. J. WWW\/Internet"},{"key":"6_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cosrev.2013.08.002","volume":"10","author":"H Jonker","year":"2013","unstructured":"Jonker, H., Mauw, S., Pang, J.: Privacy and verifiability in voting systems: Methods, developments and trends. Comput. Sci. Rev. 10, 1\u201330 (2013). http:\/\/dx.doi.org\/10.1016\/j.cosrev.2013.08.002","journal-title":"Comput. Sci. Rev."},{"issue":"10","key":"6_CR24","doi-asserted-by":"publisher","first-page":"2534","DOI":"10.1016\/j.comcom.2008.03.018","volume":"31","author":"C Li","year":"2008","unstructured":"Li, C., Hwang, M., Liu, C.: An electronic voting protocol with deniable authentication for mobile ad hoc networks. Comput. Commun. 31(10), 2534\u20132540 (2008). http:\/\/dx.doi.org\/10.1016\/j.comcom.2008.03.018","journal-title":"Comput. Commun."},{"issue":"2","key":"6_CR25","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1109\/TNET.2010.2062534","volume":"19","author":"C Liaskos","year":"2011","unstructured":"Liaskos, C., Petridou, S., Papadimitriou, G.: Towards realizable, low-cost broadcast systems for dynamic environments. IEEE\/ACM Trans. Netw. 19(2), 383\u2013392 (2011)","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"6_CR26","doi-asserted-by":"crossref","unstructured":"Liaskos, C., Papadimitriou, G., Douligeris, C.: Sensor swarm query filtering: heightened attack resilience for broadcast on-demand services. In: IEEE Symposium on Computers and Communications (ISCC 2013), pp. 000312\u2013000317. IEEE (2013)","DOI":"10.1109\/ISCC.2013.6754965"},{"key":"6_CR27","doi-asserted-by":"crossref","unstructured":"Liaskos, C., Tsioliaridou, A., Papadimitriou, G., Nicopolitidis, P.: Minimal wireless broadcast schedules for multi-objective pursuits. IEEE Transactions on Vehicular Technology p. preprint (2014)","DOI":"10.1109\/TVT.2014.2352399"},{"key":"6_CR28","doi-asserted-by":"crossref","unstructured":"Malkhi, D., Margo, O., Pavlov, E.: E-voting without cryptography. In: Financial Cryptography, 6th International Conference (FC 2002), pp. 1\u201315, Southampton, 11\u201314 March 2002. http:\/\/dx.doi.org\/10.1007\/3-540-36504-4_1","DOI":"10.1007\/3-540-36504-4_1"},{"issue":"7","key":"6_CR29","doi-asserted-by":"publisher","first-page":"934","DOI":"10.3923\/itj.2009.934.964","volume":"8","author":"B Meng","year":"2009","unstructured":"Meng, B.: A critical review of receipt-freeness and coercion-resistance. Inf. Technol. J. 8(7), 934\u2013964 (2009)","journal-title":"Inf. Technol. J."},{"issue":"9","key":"6_CR30","doi-asserted-by":"publisher","first-page":"942","DOI":"10.4304\/jsw.5.9.942-949","volume":"5","author":"B Meng","year":"2010","unstructured":"Meng, B., Li, Z., Qin, J.: A receipt-free coercion-resistant remote internet voting protocol without physical assumptions through deniable encryption and trapdoor commitment scheme. J. Softw. 5(9), 942\u2013949 (2010)","journal-title":"J. Softw."},{"issue":"2","key":"6_CR31","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/0167-6423(82)90012-0","volume":"2","author":"J Misra","year":"1982","unstructured":"Misra, J., Gries, D.: Finding repeated elements. Sci. Comput. Program. 2(2), 143\u2013152 (1982)","journal-title":"Sci. Comput. Program."},{"key":"6_CR32","doi-asserted-by":"crossref","unstructured":"Pardede, E., Taniar, D., Awan, I., Al-Sudani, W., Gill, A., Li, C., Wang, J., Liu, F.: Protection through multimedia CAPTCHAs. In: Proceedings of the 8th International Conference on Advances in Mobile Computing and Multimedia (MoMM 2010), p. 63. ACM Press (2010)","DOI":"10.1145\/1971519.1971533"},{"issue":"1\u20132","key":"6_CR33","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1016\/S0378-4371(00)00633-6","volume":"293","author":"L Pietronero","year":"2001","unstructured":"Pietronero, L., Tosatti, E., Tosatti, V., Vespignani, A.: Explaining the uneven distribution of numbers in nature: the laws of Benford and Zipf. Physica A 293(1\u20132), 297\u2013304 (2001)","journal-title":"Physica A"},{"issue":"3","key":"6_CR34","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1016\/j.csi.2006.06.001","volume":"29","author":"GZ Qadah","year":"2007","unstructured":"Qadah, G.Z., Taha, R.: Electronic voting systems: Requirements, design, and implementation. Computer Standards Interfaces 29(3), 376\u2013386 (2007). http:\/\/dx.doi.org\/10.1016\/j.csi.2006.06.001","journal-title":"Computer Standards Interfaces"},{"issue":"2","key":"6_CR35","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1016\/j.cose.2005.11.003","volume":"25","author":"K Sampigethaya","year":"2006","unstructured":"Sampigethaya, K., Poovendran, R.: A framework and taxonomy for comparison of electronic voting schemes. Comput. Secur. 25(2), 137\u2013153 (2006). http:\/\/dx.doi.org\/10.1016\/j.cose.2005.11.003","journal-title":"Comput. Secur."},{"key":"6_CR36","unstructured":"Sharaf, M.A., Chrysanthis, P.: On-Demand Broadcast: new Challenges and Scheduling Algorithms. In: Proceedings of the 1st Hellenic Conference on the Management of Data (2002)"},{"key":"6_CR37","doi-asserted-by":"crossref","unstructured":"Sieka, B., Kshemkalyani, A.D., Singhal, M.: On the security of polling protocols in peer-to-peer systems. In: 4th International Conference on Peer-to-Peer Computing (P2P 2004), pp. 36\u201344, Zurich, 15\u201317 August 2004. http:\/\/doi.ieeecomputersociety.org\/10.1109\/PTP.2004.1334929","DOI":"10.1109\/PTP.2004.1334929"},{"key":"6_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1007\/978-3-642-23496-5_14","volume-title":"Autonomic and Trusted Computing","author":"M Smart","year":"2011","unstructured":"Smart, M., Ritter, E.: True trustworthy elections: remote electronic voting using trusted computing. In: Calero, J.M.A., Yang, L.T., M\u00e1rmol, F.G., Garc\u00eda Villalba, L.J., Li, A.X., Wang, Y. (eds.) ATC 2011. LNCS, vol. 6906, pp. 187\u2013202. Springer, Heidelberg (2011)"},{"key":"6_CR39","doi-asserted-by":"crossref","unstructured":"Tsioliaridou, A., Zhang, C., Liaskos, C.: Fast and fair handling of multimedia captcha flows. International Journal of Interactive Mobile Technologies (2015). (To appear )","DOI":"10.3991\/ijim.v9i4.4644"},{"key":"6_CR40","unstructured":"XJ Technologies: The AnyLogic Simulator (2013). http:\/\/www.xjtek.com\/anylogic\/"},{"key":"6_CR41","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/j.entcs.2006.12.004","volume":"168","author":"A Zwierko","year":"2007","unstructured":"Zwierko, A., Kotulski, Z.: A light-weight e-voting system with distributed trust. Electr. Notes Theor. Comput. Sci. 168, 109\u2013126 (2007). http:\/\/dx.doi.org\/10.1016\/j.entcs.2006.12.004","journal-title":"Electr. Notes Theor. Comput. Sci."}],"container-title":["Lecture Notes in Computer Science","Trust and Trustworthy Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-22846-4_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T00:08:58Z","timestamp":1748563738000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-22846-4_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319228457","9783319228464"],"references-count":41,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-22846-4_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"14 August 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}