{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T14:25:44Z","timestamp":1743085544201,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642175015"},{"type":"electronic","value":"9783642175022"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-17502-2_4","type":"book-chapter","created":{"date-parts":[[2010,11,27]],"date-time":"2010-11-27T00:32:28Z","timestamp":1290817948000},"page":"41-52","source":"Crossref","is-referenced-by-count":4,"title":["A Mobile and Reliable Anonymous ePoll Infrastructure"],"prefix":"10.1007","author":[{"given":"Pieter","family":"Verhaeghe","sequence":"first","affiliation":[]},{"given":"Kristof","family":"Verslype","sequence":"additional","affiliation":[]},{"given":"Jorn","family":"Lapon","sequence":"additional","affiliation":[]},{"given":"Vincent","family":"Naessens","sequence":"additional","affiliation":[]},{"given":"Bart","family":"De Decker","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","unstructured":"Brands, S.: Technical overview of digital credentials (1999), \n                    \n                      http:\/\/citeseer.ist.psu.edu\/brands02technical.html"},{"key":"4_CR2","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/5931.001.0001","volume-title":"Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy","author":"S. Brands","year":"2000","unstructured":"Brands, S.: Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy. MIT Press, Cambridge (2000)"},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"Camenisch, J., Van Herreweghen, E.: Design and implementation of the idemix anonymous credential system (2002), \n                    \n                      http:\/\/citeseer.ist.psu.edu\/camenisch02design.html","DOI":"10.1145\/586111.586114"},{"key":"4_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/3-540-44987-6_7","volume-title":"Advances in Cryptology - EUROCRYPT 2001","author":"J. Camenisch","year":"2001","unstructured":"Camenisch, J., Lysyanskaya, A.: An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol.\u00a02045, pp. 93\u2013118. Springer, Heidelberg (2001)"},{"issue":"10","key":"4_CR5","doi-asserted-by":"publisher","first-page":"1030","DOI":"10.1145\/4372.4373","volume":"28","author":"D. Chaum","year":"1985","unstructured":"Chaum, D.: Security without identification: transaction systems to make big brother obsolete. ACM Commun.\u00a028(10), 1030\u20131044 (1985)","journal-title":"ACM Commun."},{"key":"4_CR6","unstructured":"De Decker, B., Lapon, J., Layouni, M., Mannadiar, R., Naessens, V., Vangheluwe, H., Verhaeghe, P., Verslype, K.: Adapid deliverable D12: Framework II (2009), \n                    \n                      https:\/\/www.cosic.esat.kuleuven.be\/adapid\/docs\/Adapid_D12.pdf"},{"key":"4_CR7","unstructured":"The belgian electronic identity card, \n                    \n                      http:\/\/eid.belgium.be\/"},{"key":"4_CR8","unstructured":"Kiayias, A.: An internet voting system supporting user privacy (2006), \n                    \n                      http:\/\/www.scientificcommons.org\/42582861"},{"key":"4_CR9","unstructured":"Adida, B., de Marneffe, O., Pereira, O., Quisquater, J.-J.: Electing a University President Using Open-Audit Voting: Analysis of Real-World Use of Helios. In: Jefferson, T.M.D., Hall, J.L. (eds.) Electronic Voting Technology Workshop\/Workshop on Trustworthy Elections. USENIX (2009)"},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"Diaz, C., Dekeyser, H., Kohlweiss, M., Nigusse, G.: Privacy preserving electronic petitions (2008), \n                    \n                      http:\/\/www.cosic.esat.kuleuven.be\/publications\/article-1053.pdf","DOI":"10.1007\/s12394-009-0012-8"},{"key":"4_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/11909033_5","volume-title":"Communications and Multimedia Security","author":"V. Naessens","year":"2006","unstructured":"Naessens, V., Demuynck, L., De Decker, B.: A fair anonymous submission and review system. In: Leitold, H., Markatos, E.P. (eds.) CMS 2006. LNCS, vol.\u00a04237, pp. 43\u201353. Springer, Heidelberg (2006)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Mobile Information and Communication Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-17502-2_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T01:14:14Z","timestamp":1558401254000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-17502-2_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642175015","9783642175022"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-17502-2_4","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2010]]}}}