{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T01:43:01Z","timestamp":1725500581076},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540775652"},{"type":"electronic","value":"9783540775669"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-77566-9_51","type":"book-chapter","created":{"date-parts":[[2008,1,5]],"date-time":"2008-01-05T06:18:43Z","timestamp":1199513923000},"page":"585-598","source":"Crossref","is-referenced-by-count":7,"title":["Short Ballot Assumption and Threeballot Voting Protocol"],"prefix":"10.1007","author":[{"given":"Jacek","family":"Cicho\u0144","sequence":"first","affiliation":[]},{"given":"Miros\u0142aw","family":"Kuty\u0142owski","sequence":"additional","affiliation":[]},{"given":"Bogdan","family":"We\u0327glorz","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"51_CR1","unstructured":"Appel, A.W.: How to defeat Rivest\u2019s ThreeBallot voting system. Draft (October 2006), \n                    \n                      http:\/\/www.cs.princeton.edu\/~appel\/papers\/DefeatingThreeBallot.pdf"},{"key":"51_CR2","unstructured":"Ara\u00fajo, R., Cust\u00f3dio, R.F., van de Graaf, J.: A Verifiable Voting Protocol based on Farnel. In: Proceedings of Workshop On Trustworthy Elections(WOTE) (2007), \n                    \n                      http:\/\/research.microsoft.com\/conferences\/WOTE2007\/papers\/07.pdf"},{"key":"51_CR3","unstructured":"Belote, G., Jones, H., Juang, J.: Threeballot in the field. Draft (2006), \n                    \n                      http:\/\/theory.lcs.mit.edu\/classes\/6.857\/projects\/threeBallotPaper.pdf"},{"key":"51_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1007\/11555827_8","volume-title":"Computer Security \u2013 ESORICS 2005","author":"D. Chaum","year":"2005","unstructured":"Chaum, D., Ryan, P.Y.A., Schneider, S.: A Practical Voter-Verifiable Election Scheme. In: di Vimercati, S.d.C., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol.\u00a03679, pp. 118\u2013139. Springer, Heidelberg (2005)"},{"key":"51_CR5","unstructured":"Clark, J., Essex, A., Adams, C.: On the Security of Ballot Receipts in E2E Voting Systems. In: Proceedings of Workshop On Trustworthy Elections (WOTE) (2007), \n                    \n                      http:\/\/research.microsoft.com\/conferences\/WOTE2007\/papers\/08.pdf"},{"key":"51_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"494","DOI":"10.1007\/11766155_35","volume-title":"Emerging Trends in Information and Communication Security","author":"M. Gogolewski","year":"2006","unstructured":"Gogolewski, M., Klonowski, M., Kuty\u0142owski, M., Kubiak, P., Lauks, A., Zag\u00f3rski, F.: Kleptographic Attacks on E-voting Schemes. In: M\u00fcller, G. (ed.) ETRICS 2006. LNCS, vol.\u00a03995, pp. 494\u2013508. Springer, Heidelberg (2006)"},{"key":"51_CR7","unstructured":"Henry, K., Stinson, D.R., Sui, J.: The Effectiveness of Receipt-Based Attacks on ThreeBallot. Cryptology ePrint Archive, \n                    \n                      http:\/\/eprint.iacr.org\/2007\/287"},{"key":"51_CR8","unstructured":"Hosp, B., Popoveniuc, S.: An introduction to Punchscan. In: Threat Analysis for Voting System. A Workshop on Rating Voting Methods VSRW 2006 (2006), \n                    \n                      http:\/\/vote.cs.gwu.edu\/vsrw2006\/papers\/9.pdf"},{"key":"51_CR9","unstructured":"Rivest, R.L.: The Threeballot voting system. Draft, Version 10\/1\/06 (2006)"},{"key":"51_CR10","unstructured":"Rivest, R., Smith, W.: Three Voting Protocols: ThreeBallot, VAV, and Twin. In: EVT. Proceedings of USENIX\/ACCURATE Electronic Voting Technology Workshop (2007)"},{"key":"51_CR11","unstructured":"Strauss, Ch.: A critical review of the triple ballot voting system. part 2: Cracking the triple ballot encryption. Draft (October 8, 2006), \n                    \n                      http:\/\/www.cs.princeton.edu\/~appel\/voting\/Strauss-ThreeBallotCritique2v1.5.pdf"},{"key":"51_CR12","unstructured":"Strauss, Ch.: The trouble with triples: A critical review of the triple ballot (3ballot) scheme, part 1. Draft (October 5, 2006), \n                    \n                      http:\/\/www.cs.princeton.edu\/~appel\/voting\/Strauss-TroubleWithTriples.pdf"},{"key":"51_CR13","unstructured":"Top-To-Bottom Review, \n                    \n                      http:\/\/www.sos.ca.gov\/elections\/elections_vsr.htm"}],"container-title":["Lecture Notes in Computer Science","SOFSEM 2008: Theory and Practice of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-77566-9_51.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T10:45:06Z","timestamp":1619520306000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-77566-9_51"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540775652","9783540775669"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-77566-9_51","relation":{},"subject":[]}}