{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T14:16:07Z","timestamp":1726409767259},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642041341"},{"type":"electronic","value":"9783642041358"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04135-8_7","type":"book-chapter","created":{"date-parts":[[2009,9,1]],"date-time":"2009-09-01T14:48:32Z","timestamp":1251816512000},"page":"106-121","source":"Crossref","is-referenced-by-count":17,"title":["VeryVote: A Voter Verifiable Code Voting System"],"prefix":"10.1007","author":[{"given":"Rui","family":"Joaquim","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Carlos","family":"Ribeiro","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Paulo","family":"Ferreira","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"7_CR1","series-title":"Lecture Notes in Computer Science","first-page":"243","volume-title":"FC 2001","author":"R.L. Rivest","year":"2001","unstructured":"Rivest, R.L.: Electronic voting. In: Syverson, P.F. (ed.) FC 2001. LNCS, vol.\u00a02339, pp. 243\u2013268. Springer, Heidelberg (2001)"},{"key":"7_CR2","unstructured":"Chaum, D.: Surevote. International patent WO 01\/55940 A1 (2001), \n                  \n                    http:\/\/www.surevote.com\/home.html"},{"key":"7_CR3","first-page":"153","volume-title":"5th Conference on Sicherheit in Informationssystemen (SIS 2002)","author":"R. Oppliger","year":"2002","unstructured":"Oppliger, R.: How to address the secure platform problem for remote internet voting. In: Erasim, E., Karagiannis, D. (eds.) 5th Conference on Sicherheit in Informationssystemen (SIS 2002), pp. 153\u2013173. vdf Hochschulverlag, Vienna (2002)"},{"key":"7_CR4","unstructured":"Karlof, C., Sastry, N., Wagner, D.: Cryptographic voting protocols: A systems prespective. In: 14th USENIX Security Symposium, pp. 33\u201350 (2005)"},{"key":"7_CR5","unstructured":"Neff, A.: Practical high certainty intent verification for encrypted votes (2004), \n                  \n                    http:\/\/www.votehere.com\/old\/vhti\/documentation\/vsv-2.0.3638.pdf"},{"key":"7_CR6","unstructured":"UK\u2019s Electoral Commission: Technical report on the may 2003 pilots (2003), \n                  \n                    http:\/\/www.electoralcommission.org.uk\/about-us\/03pilotscheme.cfm"},{"key":"7_CR7","unstructured":"UK\u2019s National Technical Authority for Information Assurance: e-voting security study (2002), \n                  \n                    http:\/\/www.ictparliament.org\/CDTunisi\/ict_compendium\/paesi\/uk\/uk54.pdf"},{"key":"7_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1007\/978-3-540-77493-8_15","volume-title":"E-Voting and Identity","author":"J. Helbach","year":"2007","unstructured":"Helbach, J., Schwenk, J.: Secure internet voting with code sheets. In: Alkassar, A., Volkamer, M. (eds.) VOTE-ID 2007. LNCS, vol.\u00a04896, pp. 166\u2013177. Springer, Heidelberg (2007)"},{"key":"7_CR9","unstructured":"Oppliger, R., Schwenk, J., Helbach, J.: Protecting code voting against vote selling. In: An Analytical Description of CHILL, the CCITT High Level Language. LNI, vol.\u00a0128, pp. 193\u2013204. GI (2008)"},{"key":"7_CR10","unstructured":"Helbach, J., Schwenk, J., Schage, S.: Code voting with linkable group signatures. In: EVOTE 2008 (2008)"},{"key":"7_CR11","unstructured":"Oppliger, R., Schwenk, J.: Captcha-based code voting. In: EVOTE 2008 (2008)"},{"key":"7_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1007\/978-3-540-77493-8_16","volume-title":"E-Voting and Identity","author":"R. Joaquim","year":"2007","unstructured":"Joaquim, R., Ribeiro, C.: Codevoting protection against automatic vote manipulation in an uncontrolled environment. In: Alkassar, A., Volkamer, M. (eds.) VOTE-ID 2007. LNCS, vol.\u00a04896, pp. 178\u2013188. Springer, Heidelberg (2007)"},{"key":"7_CR13","unstructured":"Adida, B., Neff, A.: Ballot casting assurance. In: EVT 2006, Vancouver, B.C., Canada, USENIX\/ACCURATE (2006)"},{"issue":"4","key":"7_CR14","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"IT-31","author":"T. ElGamal","year":"1985","unstructured":"ElGamal, T.: A public-key cryptosystem and signature scheme based on discrete logarithms. IEEE Transactions on Information Theory\u00a0IT-31(4), 469\u2013472 (1985)","journal-title":"IEEE Transactions on Information Theory"},{"key":"7_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"174","DOI":"10.1007\/3-540-48658-5_19","volume-title":"Advances in Cryptology - CRYPTO \u201994","author":"R. Cramer","year":"1994","unstructured":"Cramer, R., Damg\u00e5rd, I., Schoenmakers, B.: Proofs of partial knowledge and simplified design of witness hiding protocols. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol.\u00a0839, pp. 174\u2013187. Springer, Heidelberg (1994)"},{"key":"7_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/3-540-69053-0_9","volume-title":"Advances in Cryptology - EUROCRYPT \u201997","author":"R. Cramer","year":"1997","unstructured":"Cramer, R., Gennaro, R., Schoenmakers, B.: A secure and optimally efficient multi-authority election scheme. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol.\u00a01233, pp. 103\u2013118. Springer, Heidelberg (1997)"},{"key":"7_CR17","unstructured":"Estonian National Electoral Commitee: Internet voting in estonia (2007), \n                  \n                    http:\/\/www.vvk.ee\/engindex.html"},{"issue":"2","key":"7_CR18","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"D. Chaum","year":"1981","unstructured":"Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM\u00a024(2), 84\u201388 (1981)","journal-title":"Commun. ACM"},{"key":"7_CR19","unstructured":"Neff, C.A.: Verifiable mixing (shuffling) of elgamal pairs (2004)"},{"key":"7_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1007\/3-540-47721-7_12","volume-title":"Advances in Cryptology - CRYPTO \u201986","author":"A. Fiat","year":"1987","unstructured":"Fiat, A., Shamir, A.: How to prove yourself: Practical solutions to identification and signature. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol.\u00a0263, pp. 186\u2013194. Springer, Heidelberg (1987)"},{"key":"7_CR21","unstructured":"Jakobsson, M., Juels, A., Rivest, R.: Making mix nets robust for electronic voting by randomized partial checking. In: 2002 USENIX Security Symposium, San Francisco, CA, USA, pp. 339\u2013353 (2002)"},{"key":"7_CR22","unstructured":"Adida, B.: Advances in Cryptographic Voting Systems, PhD thesis. MIT (2006)"},{"key":"7_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"494","DOI":"10.1007\/11766155_35","volume-title":"Emerging Trends in Information and Communication Security","author":"M. Gogolewski","year":"2006","unstructured":"Gogolewski, M., Klonowski, M., Kubiak, P., Kuty\u0142owski, M., Lauks, A., Zag\u00f3rski, F.: Kleptographic attacks on e-election schemes with receipts. In: M\u00fcller, G. (ed.) ETRICS 2006. LNCS, vol.\u00a03995, pp. 494\u2013508. Springer, Heidelberg (2006)"},{"key":"7_CR24","unstructured":"Volkamer, M., Grimm, R.: Multiple casts in online voting: Analyzing chances. In: Robert Krimmer, R. (ed.) Electronic Voting 2006, Castle Hofen, Bregenz, Austria, GI. LNI, vol.\u00a0P-86, pp. 97\u2013106 (2006)"}],"container-title":["Lecture Notes in Computer Science","E-Voting and Identity"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04135-8_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,9]],"date-time":"2019-03-09T17:09:30Z","timestamp":1552151370000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04135-8_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642041341","9783642041358"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04135-8_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}