{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,22]],"date-time":"2025-02-22T05:27:19Z","timestamp":1740202039888,"version":"3.37.3"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642129797"},{"type":"electronic","value":"9783642129803"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-12980-3_24","type":"book-chapter","created":{"date-parts":[[2010,5,31]],"date-time":"2010-05-31T01:48:13Z","timestamp":1275270493000},"page":"388-401","source":"Crossref","is-referenced-by-count":0,"title":["Aperio: High Integrity Elections for Developing Countries"],"prefix":"10.1007","author":[{"given":"Aleks","family":"Essex","sequence":"first","affiliation":[]},{"given":"Jeremy","family":"Clark","sequence":"additional","affiliation":[]},{"given":"Carlisle","family":"Adams","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"24_CR1","doi-asserted-by":"crossref","unstructured":"Adida, B., Rivest, R.L.: Scratch & vote: self-contained paper-based cryptographic voting. In: WPES 2006: Proceedings of the 5th ACM workshop on Privacy in electronic society, pp. 29\u201340 (2006)","DOI":"10.1145\/1179601.1179607"},{"key":"24_CR2","unstructured":"Ballot, A.: Merriam-webster dictionary. Online"},{"issue":"2","key":"24_CR3","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"D. Chaum","year":"1981","unstructured":"Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM\u00a024(2), 84\u201390 (1981)","journal-title":"Commun. ACM"},{"key":"24_CR4","doi-asserted-by":"crossref","unstructured":"Chaum, D., Essex, A., Carback, R., Clark, J., Popoveniuc, S., Sherman, A.T., Vora, P.: Scantegrity: End-to-end voter verifiable optical-scan voting. IEEE Security and Privacy Magazine (May\/June 2008)","DOI":"10.1109\/MSP.2008.70"},{"key":"24_CR5","doi-asserted-by":"crossref","unstructured":"Chaum, D., Ryan, P.Y.A., Schneider, S.A.: A Practical, Voter-verifiable, Election Scheme. Technical Report Series CS-TR-880, University of Newcastle Upon Tyne, School of Computer Science (December 2004)","DOI":"10.1007\/11555827_8"},{"key":"24_CR6","unstructured":"Chaum, D., van de Graaf, J., Ryan, P.Y.A., Vora, P.L.: Secret ballot elections with unconditional integrity. Technical report, IACR Eprint (2007), http:\/\/eprint.iacr.org\/"},{"key":"24_CR7","unstructured":"United States Election\u00a0Assistance Commission. 2005 voluntary voting system guidelines (December 2005), http:\/\/eac.gov\/vvsg_intro.htm"},{"key":"24_CR8","unstructured":"Henry, K., Stinson, D., Sui, J.: The effectiveness of receipt-based attacks on threeballot. Technical report, Centre for Applied Cryptographic Research, University of Waterloo (2007)"},{"key":"24_CR9","unstructured":"Jakobsson, M., Juels, A., Rivest, R.L.: Making mix nets robust for electronic voting by randomized partial checking. In: USENIX Security 2002, pp. 339\u2013353 (2002)"},{"key":"24_CR10","unstructured":"Popoveniuc, S., Hosp, B.: An Introduction to Punchscan. In: Preproceedings of the 2006 IAVoSS Workshop on Trustworthy Elections, Robinson College, Cambridge, United Kingdom. International Association for Voting System Sciences (2006)"},{"key":"24_CR11","unstructured":"Popoveniuc, S., Stanton, J.: Undervote and pattern voting: Vulnerability and a mitigation technique (June 2007)"},{"key":"24_CR12","unstructured":"Popoveniuc, S., Stanton, J.: Buying random votes is as hard as buying no-votes. Cryptology ePrint Archive, Report 2008\/059 (2008), http:\/\/eprint.iacr.org\/"},{"key":"24_CR13","unstructured":"Rivest, R.L., Wack, J.: On the notion of \u201csoftware independence\u201d in voting systems. DRAFT Version (July 28, 2006)"},{"key":"24_CR14","unstructured":"Rivest, R.L., Smith, W.D.: Three Voting Protocols: Threeballot, VAV, and Twin. In: Usenix\/Accurate EVT (August 2007)"}],"container-title":["Lecture Notes in Computer Science","Towards Trustworthy Elections"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-12980-3_24.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T11:03:40Z","timestamp":1740135820000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-12980-3_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642129797","9783642129803"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-12980-3_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}