{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T10:52:46Z","timestamp":1725879166313},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319522395"},{"type":"electronic","value":"9783319522401"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-52240-1_8","type":"book-chapter","created":{"date-parts":[[2017,1,25]],"date-time":"2017-01-25T04:11:30Z","timestamp":1485317490000},"page":"125-143","source":"Crossref","is-referenced-by-count":3,"title":["Apollo \u2013 End-to-End Verifiable Internet Voting with Recovery from Vote Manipulation"],"prefix":"10.1007","author":[{"given":"Dawid","family":"Gawe\u0142","sequence":"first","affiliation":[]},{"given":"Maciej","family":"Kosarzecki","sequence":"additional","affiliation":[]},{"given":"Poorvi L.","family":"Vora","sequence":"additional","affiliation":[]},{"given":"Hua","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Filip","family":"Zag\u00f3rski","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,1,26]]},"reference":[{"key":"8_CR1","unstructured":"Adida, B.: Helios: web-based open-audit voting. In: USENIX Security Symposium, pp. 335\u2013348 (2008)"},{"key":"8_CR2","first-page":"10","volume":"9","author":"B Adida","year":"2009","unstructured":"Adida, B., De Marneffe, O., Pereira, O., Quisquater, J.-J., et al.: Electing a university president using open-audit voting: analysis of real-world use of helios. EVT\/WOTE 9, 10 (2009)","journal-title":"EVT\/WOTE"},{"key":"8_CR3","unstructured":"Benaloh, J.: Simple verifiable elections. In: EVT (2006)"},{"key":"8_CR4","unstructured":"Benaloh, J., Byrne, M., Kortum, P.T., McBurnett, N., Pereira, O., Stark, P.B., Wallach, D.S.: STAR-vote: a secure, transparent, auditable, and reliable voting system. CoRR, abs\/1211.1904 (2012)"},{"key":"8_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1007\/978-3-642-23822-2_19","volume-title":"Computer Security \u2013 ESORICS 2011","author":"D Bernhard","year":"2011","unstructured":"Bernhard, D., Cortier, V., Pereira, O., Smyth, B., Warinschi, B.: Adapting Helios for provable ballot privacy. In: Atluri, V., Diaz, C. (eds.) ESORICS 2011. LNCS, vol. 6879, pp. 335\u2013354. Springer, Heidelberg (2011). doi: 10.1007\/978-3-642-23822-2_19"},{"key":"8_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"626","DOI":"10.1007\/978-3-642-34961-4_38","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2012","author":"D Bernhard","year":"2012","unstructured":"Bernhard, D., Pereira, O., Warinschi, B.: How not to prove yourself: pitfalls of the Fiat-Shamir heuristic and applications to Helios. In: Wang, X., Sako, K. (eds.) ASIACRYPT 2012. LNCS, vol. 7658, pp. 626\u2013643. Springer, Heidelberg (2012). doi: 10.1007\/978-3-642-34961-4_38"},{"key":"8_CR7","unstructured":"Carback, R.T., Chaum, D., Clark, J., Conway, J., Essex, A., Hernson, P.S., Mayberry, T., Popoveniuc, S., Rivest, R.L., Shen, E., Sherman, A.T., Vora, P.L.: Scantegrity II municipal election at Takoma Park: the first E2E binding governmental election with ballot privacy. In: USENIX Security Symposium (2010)"},{"key":"8_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1007\/978-3-319-11212-1_19","volume-title":"Computer Security - ESORICS 2014","author":"V Cortier","year":"2014","unstructured":"Cortier, V., Galindo, D., Glondu, S., Izabach\u00e8ne, M.: Election verifiability for Helios under weaker trust assumptions. In: Kuty\u0142owski, M., Vaidya, J. (eds.) ESORICS 2014. LNCS, vol. 8713, pp. 327\u2013344. Springer, Heidelberg (2014). doi: 10.1007\/978-3-319-11212-1_19"},{"issue":"1","key":"8_CR9","doi-asserted-by":"crossref","first-page":"89","DOI":"10.3233\/JCS-2012-0458","volume":"21","author":"V Cortier","year":"2013","unstructured":"Cortier, V., Smyth, B.: Attacking and fixing Helios: an analysis of ballot secrecy. J. Comput. Secur. 21(1), 89\u2013148 (2013)","journal-title":"J. Comput. Secur."},{"key":"8_CR10","unstructured":"Details, C.: Django: list of security vulnerabilities. MITRE\u2019s CVE web site, Technical report (2015)"},{"key":"8_CR11","unstructured":"Estehghari, S., Desmedt, Y.: Exploiting the client vulnerabilities in internet e-voting systems: hacking Helios 2.0 as an example. In: EVT\/WOTE (2010)"},{"key":"8_CR12","unstructured":"D. Foundation. Clickjacking protection in django. Technical report, Django Software Foundation (2015)"},{"key":"8_CR13","unstructured":"Gjosteen, K.: Analysis of an internet voting protocol. Technical report, IACR Eprint report 2010\/380 (2010)"},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Grewal, G.S., Ryan, M.D., Chen, L., Clarkson, M.R.: Du-vote: remote electronic voting with untrusted computers. In: IEEE 28th Computer Security Foundations Symposium, CSF 2015, Verona, Italy, 13\u201317 July 2015, pp. 155\u2013169 (2015)","DOI":"10.1109\/CSF.2015.18"},{"key":"8_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/978-3-319-22270-7_3","volume-title":"E-Voting and Identity","author":"JA Halderman","year":"2015","unstructured":"Halderman, J.A., Teague, V.: The New South Wales iVote system: security failures and verification flaws in a live online election. In: Haenni, R., Koenig, R.E., Wikstr\u00f6m, D. (eds.) VOTELID 2015. LNCS, vol. 9269, pp. 35\u201353. Springer, Heidelberg (2015). doi: 10.1007\/978-3-319-22270-7_3"},{"key":"8_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/978-3-642-32747-6_6","volume-title":"E-Voting and Identity","author":"M Heiderich","year":"2012","unstructured":"Heiderich, M., Frosch, T., Niemietz, M., Schwenk, J.: The bug that made me president a browser- and web-security case study on Helios voting. In: Kiayias, A., Lipmaa, H. (eds.) Vote-ID 2011. LNCS, vol. 7187, pp. 89\u2013103. Springer, Heidelberg (2012). doi: 10.1007\/978-3-642-32747-6_6"},{"key":"8_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1007\/978-3-540-27809-2_9","volume-title":"Financial Cryptography","author":"A Kiayias","year":"2004","unstructured":"Kiayias, A., Yung, M.: The vector-ballot e-voting approach. In: Juels, A. (ed.) FC 2004. LNCS, vol. 3110, pp. 72\u201389. Springer, Heidelberg (2004). doi: 10.1007\/978-3-540-27809-2_9"},{"key":"8_CR18","doi-asserted-by":"crossref","unstructured":"Kusters, R., Truderung, T., Vogt, A.: Accountability: definition and relationship to verifiability. In: CCS (2010)","DOI":"10.1145\/1866307.1866366"},{"key":"8_CR19","doi-asserted-by":"crossref","unstructured":"Kusters, R., Truderung, T., Vogt, A.: Clash attacks on the verifiability of e-voting systems. In: 2012 IEEE Symposium on Security and Privacy (SP), pp. 395\u2013409. IEEE (2012)","DOI":"10.1109\/SP.2012.32"},{"key":"8_CR20","first-page":"1","volume":"1","author":"E Moher","year":"2014","unstructured":"Moher, E., Clark, J., Essex, A.: Diffusion of voter responsibility: potential failings in E2E voter receipt checking. USENIX J. Election Technol. Syst. (JETS) 1, 1\u201317 (2014)","journal-title":"USENIX J. Election Technol. Syst. (JETS)"},{"key":"8_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1007\/978-3-319-10178-1_20","volume-title":"Electronic Government and the Information Systems Perspective","author":"S Neumann","year":"2014","unstructured":"Neumann, S., Olembo, M.M., Renaud, K., Volkamer, M.: Helios verification: to alleviate, or to nominate: is that the question, or shall we have both? In: K\u0151, A., Francesconi, E. (eds.) EGOVIS 2014. LNCS, vol. 8650, pp. 246\u2013260. Springer, Heidelberg (2014). doi: 10.1007\/978-3-319-10178-1_20"},{"key":"8_CR22","unstructured":"Popoveniuc, S., Kelsey, J., Regenscheid, A., Vora, P.: Performance requirements for end-to-end verifiable elections. In: Proceedings of the 2010 International Conference on Electronic Voting Technology\/Workshop on Trustworthy Elections, pp. 1\u201316. USENIX Association (2010)"},{"key":"8_CR23","doi-asserted-by":"crossref","unstructured":"Springall, D., Finkenauer, T., Durumeric, Z., Kitcat, J., Hursti, H., MacAlpine, M., Halderman, J.A.: Security analysis of the Estonian internet voting system. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS 2014, pp. 703\u2013715. ACM, New York (2014)","DOI":"10.1145\/2660267.2660315"},{"key":"8_CR24","unstructured":"West, M., Barth, A., Veditz, D.: Content security policy level 2. Last call WD, W3C, July 2014"},{"key":"8_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1007\/978-3-642-32946-3_10","volume-title":"Financial Cryptography and Data Security","author":"S Wolchok","year":"2012","unstructured":"Wolchok, S., Wustrow, E., Isabel, D., Halderman, J.A.: Attacking the Washington, D.C. Internet voting system. In: Keromytis, A.D. (ed.) FC 2012. LNCS, vol. 7397, pp. 114\u2013128. Springer, Heidelberg (2012). doi: 10.1007\/978-3-642-32946-3_10"},{"key":"8_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1007\/978-3-642-38980-1_28","volume-title":"Applied Cryptography and Network Security","author":"F Zag\u00f3rski","year":"2013","unstructured":"Zag\u00f3rski, F., Carback, R.T., Chaum, D., Clark, J., Essex, A., Vora, P.L.: Remotegrity: design and use of an end-to-end verifiable remote voting system. In: Jacobson, M., Locasto, M., Mohassel, P., Safavi-Naini, R. (eds.) ACNS 2013. LNCS, vol. 7954, pp. 441\u2013457. Springer, Heidelberg (2013). doi: 10.1007\/978-3-642-38980-1_28"}],"container-title":["Lecture Notes in Computer Science","Electronic Voting"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-52240-1_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,17]],"date-time":"2019-09-17T19:39:02Z","timestamp":1568749142000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-52240-1_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319522395","9783319522401"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-52240-1_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}