{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,10]],"date-time":"2025-12-10T08:42:41Z","timestamp":1765356161525},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319522395"},{"type":"electronic","value":"9783319522401"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-52240-1_6","type":"book-chapter","created":{"date-parts":[[2017,1,25]],"date-time":"2017-01-25T04:11:30Z","timestamp":1485317490000},"page":"92-107","source":"Crossref","is-referenced-by-count":23,"title":["Improving the Verifiability of the Estonian Internet Voting Scheme"],"prefix":"10.1007","author":[{"given":"Sven","family":"Heiberg","sequence":"first","affiliation":[]},{"given":"Tarvi","family":"Martens","sequence":"additional","affiliation":[]},{"given":"Priit","family":"Vinkel","sequence":"additional","affiliation":[]},{"given":"Jan","family":"Willemson","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,1,26]]},"reference":[{"key":"6_CR1","unstructured":"Ansper, A., Buldas, A., J\u00fcrgenson, A., Oruaas, M., Priisalu, J., Raiend, K., Veldre, A., Willemson, J., Virunurm, K.: E-voting concept security: analysis and measures (2010). http:\/\/www.vvk.ee\/public\/dok\/General_Description_E-Voting_2010.pdf"},{"key":"6_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1007\/978-3-642-29011-4_17","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2012","author":"S Bayer","year":"2012","unstructured":"Bayer, S., Groth, J.: Efficient zero-knowledge argument for correctness of a shuffle. In: Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. LNCS, vol. 7237, pp. 263\u2013280. Springer, Heidelberg (2012). doi: 10.1007\/978-3-642-29011-4_17"},{"key":"6_CR3","unstructured":"Estonian National Electoral Committee. Statistics about Internet Voting in Estonia. http:\/\/vvk.ee\/voting-methods-in-estonia\/engindex\/statistics"},{"key":"6_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1007\/978-3-319-29485-8_12","volume-title":"Topics in Cryptology - CT-RSA 2016","author":"P Fauzi","year":"2016","unstructured":"Fauzi, P., Lipmaa, H.: Efficient culpably sound NIZK shuffle argument without random oracles. In: Sako, K. (ed.) CT-RSA 2016. LNCS, vol. 9610, pp. 200\u2013216. Springer, Heidelberg (2016). doi: 10.1007\/978-3-319-29485-8_12"},{"issue":"1","key":"6_CR5","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1089\/elj.2010.0098","volume":"11","author":"SN Goggin","year":"2012","unstructured":"Goggin, S.N., Byrne, M.D., Gilbert, J.E.: Post-election auditing: effects of procedure and ballot type on manual counting accuracy, efficiency, and auditor satisfaction and confidence. Election Law J. 11(1), 36\u201351 (2012)","journal-title":"Election Law J."},{"key":"6_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1007\/978-3-642-32747-6_13","volume-title":"E-Voting and Identity","author":"S Heiberg","year":"2012","unstructured":"Heiberg, S., Laud, P., Willemson, J.: The application of i-voting for Estonian parliamentary elections of 2011. In: Kiayias, A., Lipmaa, H. (eds.) Vote-ID 2011. LNCS, vol. 7187, pp. 208\u2013223. Springer, Heidelberg (2012). doi: 10.1007\/978-3-642-32747-6_13"},{"key":"6_CR7","doi-asserted-by":"crossref","first-page":"128","DOI":"10.4018\/978-1-4666-5820-2.ch007","volume-title":"Design, Development, and Use of Secure Electronic Voting Systems","author":"S Heiberg","year":"2014","unstructured":"Heiberg, S., Willemson, J.: Modeling threats of a voting method. In: Zissis, D., Lekkas, D. (eds.) Design, Development, and Use of Secure Electronic Voting Systems, pp. 128\u2013148. IGI Global, Hershey (2014)"},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Heiberg, S., Willemson, J.: Verifiable Internet voting in Estonia. In: Krimmer, R., Volkamer, M. (eds.) 6th International Conference on Electronic Voting 2014, (EVOTE 2014), Bregenz, Austria, 28\u201331 October 2014, pp. 23\u201329. TUT Press (2014)","DOI":"10.1109\/EVOTE.2014.7001135"},{"key":"6_CR9","doi-asserted-by":"crossref","first-page":"170","DOI":"10.1016\/j.cose.2012.10.001","volume":"32","author":"R Joaquim","year":"2013","unstructured":"Joaquim, R., Ferreira, P., Ribeiro, C.: EVIV: an end-to-end verifiable Internet voting system. Comput. Secur. 32, 170\u2013191 (2013)","journal-title":"Comput. Secur."},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"K\u00fcsters, R., Truderung, T., Vogt, A.: Clash attacks on the verifiability of e-voting systems. In: IEEE Symposium on Security and Privacy, SP 2012, San Francisco, California, USA, 21\u201323 May 2012, pp. 395\u2013409. IEEE Computer Society (2012)","DOI":"10.1109\/SP.2012.32"},{"key":"6_CR11","unstructured":"Popoveniuc, S., Kelsey, J., Regenscheid, A., Vora, P.L.: Performance requirements for end-to-end verifiable elections. In: Jones, D.W., Quisquater, J-J., Rescorla, E. (eds.) In: Proceeding of the 2010 International Conference on Electronic Voting Technology Workshop\/Workshop on Trustworthy Elections, EVT\/WOTE 2010, Washington, D.C., USA, 9\u201310 August 2010. USENIX Association (2010)"},{"key":"6_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"688","DOI":"10.1007\/3-540-46885-4_68","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 1989","author":"CP Schnorr","year":"1990","unstructured":"Schnorr, C.P.: Efficient identification and signatures for smart cards. In: Quisquater, J.-J., Vandewalle, J. (eds.) EUROCRYPT 1989. LNCS, vol. 434, pp. 688\u2013689. Springer, Heidelberg (1990). doi: 10.1007\/3-540-46885-4_68"},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"Springall, D., Finkenauer, T., Durumeric, Z., Kitcat, J., Hursti, H., MacAlpine, M., Halderman, J.A.: Security analysis of the Estonian Internet voting system. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 703\u2013715. ACM (2014)","DOI":"10.1145\/2660267.2660315"},{"key":"6_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1007\/978-3-642-12678-9_7","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2010","author":"B Terelius","year":"2010","unstructured":"Terelius, B., Wikstr\u00f6m, D.: Proofs of restricted shuffles. In: Bernstein, D.J., Lange, T. (eds.) AFRICACRYPT 2010. LNCS, vol. 6055, pp. 100\u2013113. Springer, Heidelberg (2010). doi: 10.1007\/978-3-642-12678-9_7"}],"container-title":["Lecture Notes in Computer Science","Electronic Voting"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-52240-1_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,17]],"date-time":"2019-09-17T19:38:54Z","timestamp":1568749134000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-52240-1_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319522395","9783319522401"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-52240-1_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}