{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:21:52Z","timestamp":1725556912845},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642129797"},{"type":"electronic","value":"9783642129803"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-12980-3_17","type":"book-chapter","created":{"date-parts":[[2010,5,31]],"date-time":"2010-05-31T01:48:13Z","timestamp":1275270493000},"page":"274-288","source":"Crossref","is-referenced-by-count":5,"title":["A Verifiable Voting Protocol Based on Farnel"],"prefix":"10.1007","author":[{"given":"Roberto","family":"Ara\u00fajo","sequence":"first","affiliation":[]},{"given":"Ricardo Felipe","family":"Cust\u00f3dio","sequence":"additional","affiliation":[]},{"given":"Jeroen","family":"van de Graaf","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"17_CR1","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"D. Chaum","year":"1981","unstructured":"Chaum, D.: Untraceable electronic mail, return addresses and digital pseudonyms. Communications of the ACM\u00a024(2), 84\u201388 (1981)","journal-title":"Communications of the ACM"},{"key":"17_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1007\/3-540-69053-0_9","volume-title":"Advances in Cryptology - EUROCRYPT \u201997","author":"R. Cramer","year":"1997","unstructured":"Cramer, R., Gennaro, R., Schoenmakers, B.: A secure and optimally efficient multi-authority election scheme. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol.\u00a01233, pp. 103\u2013118. Springer, Heidelberg (1997)"},{"key":"17_CR3","unstructured":"Cust\u00f3dio, R.: Farnel: um protocolo de vota\u00e7\u00e3o papel com verificabilidade parcial. Invited Talk to Simp\u00f3sio de Seguran\u00e7a em Inform\u00e1tica (SSI) (November 2001)"},{"key":"17_CR4","unstructured":"Cust\u00f3dio, R., Devegili, A., Ara\u00fajo, R.: Farnel: um protocolo de vota\u00e7\u00e3o papel com verificabilidade parcial (2001) (unpublished notes)"},{"key":"17_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1007\/3-540-39568-7_2","volume-title":"Advances in Cryptology","author":"T. El Gamal","year":"1985","unstructured":"El Gamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol.\u00a0196, pp. 10\u201318. Springer, Heidelberg (1985)"},{"key":"17_CR6","unstructured":"Jones, D.W.: Chain voting (August 2005), \n                  \n                    http:\/\/vote.nist.gov\/threats"},{"key":"17_CR7","unstructured":"Karlof, C., Sastry, N., Wagner, D.: Cryptographic voting protocols: A systems perspective. In: Proceedings of the Fourteenth USENIX Security Symposium (USENIX Security 2005), August 2005, pp. 33\u201350 (2005)"},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"Andrew Neff, C.: A verifiable secret shuffle and its application to e-voting. In: ACM Conference on Computer and Communications Security, pp. 116\u2013125 (2001)","DOI":"10.1145\/501983.502000"},{"key":"17_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1007\/3-540-46766-1_9","volume-title":"Advances in Cryptology - CRYPTO \u201991","author":"T.P. Pedersen","year":"1992","unstructured":"Pedersen, T.P.: Non-interactive and information-theoretic secure verifiable secret sharing. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol.\u00a0576, pp. 129\u2013140. Springer, Heidelberg (1992)"},{"key":"17_CR10","unstructured":"Rivest, R.L.: The threeballot voting system (October 2006), \n                  \n                    http:\/\/people.csail.mit.edu\/rivest\/Rivest-TheThreeBallotVotingSystem.pdf"},{"key":"17_CR11","unstructured":"Kim, S., Lee, Y., Lee, K., Won, D.: Efficient voter verifiable e-voting schemes with cryptographic receipts, June 2006. In: IAVoSS Workshop On Trustworthy Elections (WOTE 2006), Cambridge (2006)"}],"container-title":["Lecture Notes in Computer Science","Towards Trustworthy Elections"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-12980-3_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,9]],"date-time":"2020-01-09T02:39:07Z","timestamp":1578537547000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-12980-3_17"}},"subtitle":["(Extended Abstract)"],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642129797","9783642129803"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-12980-3_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}