{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T01:08:46Z","timestamp":1725498526354},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540774921"},{"type":"electronic","value":"9783540774938"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-77493-8_16","type":"book-chapter","created":{"date-parts":[[2007,12,17]],"date-time":"2007-12-17T13:02:36Z","timestamp":1197896556000},"page":"178-188","source":"Crossref","is-referenced-by-count":5,"title":["CodeVoting Protection Against Automatic Vote Manipulation in an Uncontrolled Environment"],"prefix":"10.1007","author":[{"given":"Rui","family":"Joaquim","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Carlos","family":"Ribeiro","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"16_CR1","doi-asserted-by":"crossref","unstructured":"Brickell, E., Camenisch, J., Chen, L.: Direct anonymous attestation. In: CCS 2004: Proceedings of the 11th ACM conference on Computer and communications security, NewYork, USA, pp. 132\u2013145 (2004)","DOI":"10.1145\/1030083.1030103"},{"key":"16_CR2","unstructured":"California Internet Voting Task Force: A report on the feasibility of Internet voting (January 2000), http:\/\/www.ss.ca.gov\/executive\/ivote"},{"key":"16_CR3","unstructured":"Chaum, David: SureVote. September 2007.\/\/ International patent WO 01\/55940 A1 (02 August 2001), http:\/\/www.surevote.com\/home.html"},{"key":"16_CR4","unstructured":"Clarkson, M., Myers, A.: Coercion-Resistant Remote Voting Using Decryption Mixes. In: Workshop on Frontiers in Electronic Elections, Milan, Italy (September 2005)"},{"key":"16_CR5","unstructured":"Estonian Internet Voting System (July 2007), http:\/\/www.vvk.ee"},{"key":"16_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1007\/3-540-45539-6_38","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"M. Hirt","year":"2000","unstructured":"Hirt, M., Sako, K.: Efficient Receipt-Free Voting Based on Homomorphic Encryption. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807, pp. 539\u2013556. Springer, Heidelberg (2000)"},{"key":"16_CR7","unstructured":"Internet Policy Institute: Report of the National Workshop on Internet Voting: Issues and Research Agenda (March 2001), http:\/\/www.diggov.org\/archive\/library\/dgo2000\/dir\/PDF\/vote.pdf"},{"key":"16_CR8","unstructured":"Jefferson, D., Rubin, A., Simons, B., Wagner, D.: A Security Analysis of the Secure Electronic Registration and Voting Experiment (SERVE) (January 2004), http:\/\/www.servesecurityreport.org\/paper.pdf"},{"key":"16_CR9","doi-asserted-by":"crossref","unstructured":"Juels, A., Catalano, D., Jakobsson, M.: Coercion-Resistant Electronic Elections. In: Workshop on Privacy in the Electronic Society, Alexandria, Virginia, pp. 61\u201370 (November 2005)","DOI":"10.1145\/1102199.1102213"},{"key":"16_CR10","unstructured":"Kutylowski, M., Zag\u00f3rski, F.: Coercion-Free Internet Voting with Receipts. In: Workshop on e-Voting and e-Govrnment in the UK. Edinburgh (February 2006)"},{"key":"16_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1007\/3-540-36552-4_27","volume-title":"Information Security and Cryptology - ICISC 2002","author":"B. Lee","year":"2003","unstructured":"Lee, B., Kim, K.: Receipt-Free Electronic Voting Scheme with a Tamper-Resistant Randomizer. In: Lee, P.J., Lim, C.H. (eds.) ICISC 2002. LNCS, vol.\u00a02587, pp. 389\u2013406. Springer, Heidelberg (2003)"},{"key":"16_CR12","doi-asserted-by":"crossref","unstructured":"Okamoto, T.: Receipt-Free Electronic Voting Schemes for Large Scale Elections. In: Security Protocols Workshop, Paris, France, pp. 25\u201335 (April 1997)","DOI":"10.1007\/BFb0028157"},{"key":"16_CR13","doi-asserted-by":"crossref","unstructured":"Rubin, A.: Security Considerations for Remote Electronic Voting Over the Internet. Communications of the ACM\u00a045(12) (2002)","DOI":"10.1145\/585597.585599"},{"key":"16_CR14","doi-asserted-by":"crossref","unstructured":"Sadeghi, A., Selhorst, M., St\u00fcble, C., Wachsmann, C., Winandy, M.: TCG Inside? - A Note on TPM Specification Compliance. In: STC 2006: Proceedings of the 1st ACM Workshop on Scalable Trusted Computing, Virginia, USA (November 2006)","DOI":"10.1145\/1179474.1179487"},{"key":"16_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1007\/3-540-49264-X_32","volume-title":"Advances in Cryptology - EUROCRYPT 1995","author":"K. Sako","year":"1995","unstructured":"Sako, K., Kilian, J.: Receipt-Free Mix-Type Voting Scheme A Practical Solution to the Implementation of a Voting Booth. In: Guillou, L.C., Quisquater, J.-J. (eds.) EUROCRYPT 1995. LNCS, vol.\u00a0921, pp. 393\u2013403. Springer, Heidelberg (1995)"},{"key":"16_CR16","unstructured":"UK\u2019s National Technical Authority for Information Assurance: e-Voting Security Study. July (2002), http:\/\/www.ictparliament.org\/CDTunisi\/ict_compendium\/paesi\/uk\/uk54.pdf"},{"key":"16_CR17","unstructured":"Volkamer, M., Alkassar, A., Sadeghi, A., Schulz, S.: Enabling the Application of the Open Systems like PCs for Online Voting. In: FEE 2006: Proceedings of the Frontiers in Electronic Elections Workshop, Germany ( September 2006)"},{"key":"16_CR18","unstructured":"Z\u00faquete, A., Costa, C., Romao, M.: An Intrusion-tolerant e-Voting Client System. In: WRAITS 2007: 1st Workshop on Recent Advances on Intrusion-Tolerant Systems, Lisbon, Portugal ( March 2007)"}],"container-title":["Lecture Notes in Computer Science","E-Voting and Identity"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-77493-8_16.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T11:14:34Z","timestamp":1619522074000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-77493-8_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540774921","9783540774938"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-77493-8_16","relation":{},"subject":[]}}