{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T11:33:50Z","timestamp":1725536030382},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642033148"},{"type":"electronic","value":"9783642033155"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-03315-5_13","type":"book-chapter","created":{"date-parts":[[2009,7,25]],"date-time":"2009-07-25T03:15:46Z","timestamp":1248491746000},"page":"170-183","source":"Crossref","is-referenced-by-count":1,"title":["Design and Analysis of a Practical E-Voting Protocol"],"prefix":"10.1007","author":[{"given":"Mari\u00e1n","family":"Novotn\u00fd","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","volume-title":"Proceedings of the 28th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages","author":"M. Abadi","year":"2001","unstructured":"Abadi, M., Fournet, C.: Mobile values, new names, and secure communication. In: Proceedings of the 28th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages. ACM, New York (2001)"},{"key":"13_CR2","volume-title":"Proceedings of the 4th ACM Conference on Computer and Communications Security","author":"M. Abadi","year":"1997","unstructured":"Abadi, M., Gordon, A.D.: A calculus for cryptographic protocols: the spi calculus. In: Proceedings of the 4th ACM Conference on Computer and Communications Security. ACM, New York (1997)"},{"key":"13_CR3","doi-asserted-by":"crossref","unstructured":"Backes, M., Hritcu, C., Maffei, M.: Automated Verification of Remote Electronic Voting Protocols in the Applied Pi-calculus. In: Proceedings of 21st IEEE Computer Security Foundations Symposium (2008)","DOI":"10.1109\/CSF.2008.26"},{"key":"13_CR4","volume-title":"14th IEEE Computer Security Foundations Workshop","author":"B. Blanchet","year":"2001","unstructured":"Blanchet, B.: An Efficient Cryptographic Protocol Verifier Based on Prolog Rules. In: 14th IEEE Computer Security Foundations Workshop. IEEE Computer Society, Los Alamitos (2001)"},{"key":"13_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1007\/BFb0052229","volume-title":"Advances in Cryptology - CRYPTO \u201997","author":"R. Canetti","year":"1997","unstructured":"Canetti, R., Dwork, C., Naor, M., Ostrovsky, R.: Deniable Encryption. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol.\u00a01294, pp. 90\u2013104. Springer, Heidelberg (1997)"},{"key":"13_CR6","volume-title":"Advances in Cryptology - Crypto","author":"D. Chaum","year":"1983","unstructured":"Chaum, D.: Blind signatures for untraceable payments. In: Advances in Cryptology - Crypto. Springer, Heidelberg (1983)"},{"key":"13_CR7","volume-title":"Proc. 19th IEEE Computer Security Foundations Workshop","author":"S. Delaune","year":"2006","unstructured":"Delaune, S., Kremer, S., Ryan, M.D.: Coercion-resistance and receipt-freeness in electronic voting. In: Proc. 19th IEEE Computer Security Foundations Workshop. IEEE Computer Society Press, Los Alamitos (2006)"},{"key":"13_CR8","series-title":"Lecture Notes in Computer Science","volume-title":"Advances in Cryptology - AUSCRYPT \u201992","author":"A. Fujioka","year":"1993","unstructured":"Fujioka, A., Okamoto, T., Ohta, K.: A Practical Secret Voting Scheme for Large Scale Elections. In: Zheng, Y., Seberry, J. (eds.) AUSCRYPT 1992. LNCS, vol.\u00a0718. Springer, Heidelberg (1993)"},{"volume-title":"Electronic Voting and Democracy A Comparative Analysis","year":"2004","key":"13_CR9","unstructured":"Kersting, N., Baldersheim, H. (eds.): Electronic Voting and Democracy A Comparative Analysis. Palgrave Macmillan, Hampshire (2004)"},{"key":"13_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1007\/978-3-540-31987-0_14","volume-title":"Programming Languages and Systems","author":"S. Kremer","year":"2005","unstructured":"Kremer, S., Ryan, M.D.: Analysis of an Electronic Voting Protocol in the Applied Pi Calculus. In: Sagiv, M. (ed.) ESOP 2005. LNCS, vol.\u00a03444, pp. 186\u2013200. Springer, Heidelberg (2005)"},{"key":"13_CR11","volume-title":"Modern Cryptography: Theory and Practice","author":"W. Mao","year":"2003","unstructured":"Mao, W.: Modern Cryptography: Theory and Practice. Prentice Hall Professional Technical Reference, Englewood Cliffs (2003)"},{"key":"13_CR12","volume-title":"IFIP World Conference on IT Tools","author":"T. Okamoto","year":"1996","unstructured":"Okamoto, T.: An electronic voting scheme. In: IFIP World Conference on IT Tools. Chapman & Hall, Boca Raton (1996)"},{"key":"13_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","DOI":"10.1007\/BFb0030404","volume-title":"Security Protocols Workshop 1997.","author":"T. Okamoto","year":"1998","unstructured":"Okamoto, T.: Receipt-Free Electronic Voting Schemes for Large Scale Elections. In: Christianson, B., Lomas, M. (eds.) Security Protocols 1997. LNCS, vol.\u00a01361. Springer, Heidelberg (1998)"},{"key":"13_CR14","unstructured":"Rjaskova, Z.: Electronic voting schemes. Master\u2019s thesis. Comenius University (2002)"},{"key":"13_CR15","doi-asserted-by":"crossref","unstructured":"Sampigethaya, R., Poovendran, R.: A Framework and Taxonomy for Comparison of Electronic Voting Schemes. Elsevier Computers & Security\u00a025 (2006)","DOI":"10.1016\/j.cose.2005.11.003"}],"container-title":["IFIP Advances in Information and Communication Technology","The Future of Identity in the Information Society"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-03315-5_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T13:52:36Z","timestamp":1558446756000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-03315-5_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642033148","9783642033155"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-03315-5_13","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2009]]}}}