{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T14:33:41Z","timestamp":1725978821362},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319916316"},{"type":"electronic","value":"9783319916323"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-91632-3_3","type":"book-chapter","created":{"date-parts":[[2018,5,22]],"date-time":"2018-05-22T21:58:40Z","timestamp":1527026320000},"page":"35-48","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Performance Evaluation of a Secure and Scalable E-Voting Scheme Using PEPA"],"prefix":"10.1007","author":[{"given":"Mohammed","family":"Alotaibi","sequence":"first","affiliation":[]},{"given":"Nigel","family":"Thomas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,5,24]]},"reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"Backes, M., Hritcu, C., Maffei, M.: Automated verification of remote electronic voting protocols in the applied pi-calculus. In: 2008 21st IEEE Computer Security Foundations Symposium. IEEE (2008)","DOI":"10.1109\/CSF.2008.26"},{"issue":"3","key":"3_CR2","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1016\/j.entcs.2006.03.009","volume":"151","author":"JT Bradley","year":"2006","unstructured":"Bradley, J.T., Gilmore, S.T.: Stochastic simulation methods applied to a secure electronic voting model. Electron. Notes Theor. Comput. Sci. 151(3), 5\u201325 (2006)","journal-title":"Electron. Notes Theor. Comput. Sci."},{"key":"3_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1007\/3-540-57220-1_66","volume-title":"Advances in Cryptology \u2014 AUSCRYPT \u201992","author":"A Fujioka","year":"1993","unstructured":"Fujioka, A., Okamoto, T., Ohta, K.: A practical secret voting scheme for large scale elections. In: Seberry, J., Zheng, Y. (eds.) AUSCRYPT 1992. LNCS, vol. 718, pp. 244\u2013251. Springer, Heidelberg (1993). https:\/\/doi.org\/10.1007\/3-540-57220-1_66"},{"issue":"6","key":"3_CR4","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1016\/S0167-4048(02)01014-3","volume":"21","author":"DA Gritzalis","year":"2002","unstructured":"Gritzalis, D.A.: Principles and requirements for a secure e-voting system. Comput. Secur. 21(6), 539\u2013556 (2002)","journal-title":"Comput. Secur."},{"key":"3_CR5","unstructured":"Hao, F., Kreeger, M., Randell, B., Clarke, D., Shahandashti, S., Lee, P.J.: Every vote counts: ensuring integrity in large-scale electronic voting. In: 2014 Electronic Voting Technology Workshop\/Workshop on Trustworthy Elections (EVT\/WOTE 2014), vol. 2, pp. 1\u201325 (2014)"},{"key":"3_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/978-3-642-41717-7_28","volume-title":"Security Protocols XXI","author":"F Hao","year":"2013","unstructured":"Hao, F., Clarke, D., Shepherd, C.: Verifiable classroom voting: where cryptography meets pedagogy. In: Christianson, B., Malcolm, J., Stajano, F., Anderson, J., Bonneau, J. (eds.) Security Protocols 2013. LNCS, vol. 8263, pp. 245\u2013254. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-41717-7_28"},{"key":"3_CR7","volume-title":"A Compositional Approach to Performance Modelling","author":"J Hillston","year":"2005","unstructured":"Hillston, J.: A Compositional Approach to Performance Modelling, vol. 12. Cambridge University Press, Cambridge (2005)"},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Hillston, J.: Fluid flow approximation of PEPA models. In: Second International Conference on the Quantitative Evaluation of Systems (QEST 2005). IEEE (2005)","DOI":"10.1109\/QEST.2005.12"},{"key":"3_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1007\/978-3-540-31987-0_14","volume-title":"Programming Languages and Systems","author":"S Kremer","year":"2005","unstructured":"Kremer, S., Ryan, M.: Analysis of an electronic voting protocol in the applied Pi calculus. In: Sagiv, M. (ed.) ESOP 2005. LNCS, vol. 3444, pp. 186\u2013200. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/978-3-540-31987-0_14"},{"key":"3_CR10","unstructured":"Madise, \u00dc., Martens, T.: E-voting in Estonia 2005. The first practice of country-wide binding internet voting in the world. In: Electronic Voting, vol. 86 (2006)"},{"key":"3_CR11","unstructured":"Network, M.D.: Web workers API, March 2015. https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/API\/Web_Workers_API . Accessed on 22 Nov 2017"},{"key":"3_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/978-3-319-14054-4_9","volume-title":"Security Standardisation Research","author":"E Stathakidis","year":"2014","unstructured":"Stathakidis, E., Schneider, S., Heather, J.: Robustness modelling and verification of a Mix Net protocol. In: Chen, L., Mitchell, C. (eds.) SSR 2014. LNCS, vol. 8893, pp. 131\u2013150. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-14054-4_9"},{"key":"3_CR13","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.entcs.2005.01.012","volume":"128","author":"N Thomas","year":"2005","unstructured":"Thomas, N.: Performability of a secure electronic voting algorithm. Electron. Notes Theor. Comput. Sci. 128, 45\u201358 (2005)","journal-title":"Electron. Notes Theor. Comput. Sci."},{"key":"3_CR14","unstructured":"Thomas, N., Zhao, Y.: Fluid flow analysis of a model of a secure key distribution centre. In: Proceedings 24th Annual UK Performance Engineering Workshop, Imperial College, London, pp. 44\u201357 (2008)"},{"key":"3_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/978-3-642-02924-0_5","volume-title":"Computer Performance Engineering","author":"N Thomas","year":"2009","unstructured":"Thomas, N., Zhao, Y.: Mean value analysis for a class of PEPA models. In: Bradley, J.T. (ed.) EPEW 2009. LNCS, vol. 5652, pp. 59\u201372. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-02924-0_5"},{"issue":"4","key":"3_CR16","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1145\/1530873.1530880","volume":"36","author":"M Tribastone","year":"2009","unstructured":"Tribastone, M., Duguid, A., Gilmore, S.: The PEPA eclipse plugin. ACM SIGMETRICS Perform. Eval. Rev. 36(4), 28\u201333 (2009)","journal-title":"ACM SIGMETRICS Perform. Eval. Rev."},{"key":"3_CR17","unstructured":"William, S.: Cryptography and Network Security: Principles and Practice, pp. 23\u201350. Prentice-Hall, Inc., Upper Saddle River (1999)"},{"key":"3_CR18","doi-asserted-by":"crossref","unstructured":"Zhao, Y., Thomas, N.: Efficient Analysis of PEPA model of Non-repudiation Protocols (2009)","DOI":"10.1109\/ICPADS.2009.90"},{"key":"3_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1007\/978-3-540-69814-2_5","volume-title":"Performance Evaluation: Metrics, Models and Benchmarks","author":"Y Zhao","year":"2008","unstructured":"Zhao, Y., Thomas, N.: Approximate solution of a PEPA model of a key distribution centre. In: Kounev, S., Gorton, I., Sachs, K. (eds.) SIPEW 2008. LNCS, vol. 5119, pp. 44\u201357. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-69814-2_5"}],"container-title":["Communications in Computer and Information Science","New Frontiers in Quantitative Methods in Informatics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-91632-3_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,18]],"date-time":"2019-10-18T06:05:05Z","timestamp":1571378705000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-91632-3_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319916316","9783319916323"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-91632-3_3","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2018]]}}}