{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T07:35:37Z","timestamp":1768548937430,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642176494","type":"print"},{"value":"9783642176500","type":"electronic"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-17650-0_21","type":"book-chapter","created":{"date-parts":[[2010,12,6]],"date-time":"2010-12-06T10:22:11Z","timestamp":1291630931000},"page":"296-310","source":"Crossref","is-referenced-by-count":10,"title":["Anonymity and Verifiability in Voting: Understanding (Un)Linkability"],"prefix":"10.1007","author":[{"given":"Lucie","family":"Langer","sequence":"first","affiliation":[]},{"given":"Hugo","family":"Jonker","sequence":"additional","affiliation":[]},{"given":"Wolter","family":"Pieters","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"21_CR1","volume-title":"Proc. 2006 USENIX\/ACCURATE Electronic Voting Technology Workshop","author":"B. Adida","year":"2006","unstructured":"Adida, B., Neff, C.A.: Ballot Casting Assurance. In: Proc. 2006 USENIX\/ACCURATE Electronic Voting Technology Workshop. USENIX Association, Berkeley (2006)"},{"key":"21_CR2","first-page":"544","volume-title":"Proc. 26th ACM Symp. on Theory of Computing","author":"J. Benaloh","year":"1994","unstructured":"Benaloh, J., Tuinstra, D.: Receipt-free secret-ballot elections (extended abstract). In: Proc. 26th ACM Symp. on Theory of Computing, pp. 544\u2013553. ACM, New York (1994)"},{"key":"21_CR3","first-page":"14","volume-title":"Proceedings of the USENIX\/ACCURATE Electronic Voting Technology Workshop, EVT 2007","author":"J. Benaloh","year":"2007","unstructured":"Benaloh, J.: Ballot Casting Assurance via Voter-Initiated Poll Station Auditing. In: Proceedings of the USENIX\/ACCURATE Electronic Voting Technology Workshop, EVT 2007, p. 14. USENIX Association, Berkeley (2007)"},{"key":"21_CR4","volume-title":"Advances in Information Security","author":"M. Burmester","year":"2003","unstructured":"Burmester, M., Magkos, E.: Towards Secure and Practical e-Elections in the New Era. In: Advances in Information Security, vol.\u00a07. Kluwer Academic Publishers, Dordrecht (2003)"},{"issue":"1","key":"21_CR5","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/MSECP.2004.1264852","volume":"2","author":"D. Chaum","year":"2004","unstructured":"Chaum, D.: Secret-Ballot Receipts: True Voter-Verifiable Elections. IEEE Security and Privacy\u00a02(1), 38\u201347 (2004)","journal-title":"IEEE Security and Privacy"},{"key":"21_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1007\/11555827_8","volume-title":"Computer Security \u2013 ESORICS 2005","author":"D. Chaum","year":"2005","unstructured":"Chaum, D., Ryan, P.Y.A., Schneider, S.A.: A Practical Voter-Verifiable Election Scheme. In: di Vimercati, S.d.C., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol.\u00a03679, pp. 118\u2013139. Springer, Heidelberg (2005)"},{"key":"21_CR7","unstructured":"Chevallier-Mames, B., Fouque, P.A., Pointcheval, D., Stern, J., Traor\u00e9, J.: On Some Incompatible Properties of Voting Schemes. In: Workshop on Trustworthy Elections, WOTE 2006 (2006)"},{"key":"21_CR8","first-page":"28","volume-title":"CSFW","author":"S. Delaune","year":"2006","unstructured":"Delaune, S., Kremer, S., Ryan, M.: Coercion-Resistance and Receipt-Freeness in Electronic Voting. In: CSFW, pp. 28\u201342. IEEE Computer Society, Los Alamitos (2006)"},{"issue":"2","key":"21_CR9","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D. Dolev","year":"1983","unstructured":"Dolev, D., Yao, A.C.C.: On the Security of Public Key Protocols. IEEE Transactions on Information Theory\u00a029(2), 198\u2013207 (1983)","journal-title":"IEEE Transactions on Information Theory"},{"key":"21_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1007\/3-540-57220-1_66","volume-title":"Advances in Cryptology - AUSCRYPT \u201992","author":"A. Fujioka","year":"1993","unstructured":"Fujioka, A., Okamoto, T., Ohta, K.: A Practical Secret Voting Scheme for Large Scale Elections. In: Zheng, Y., Seberry, J. (eds.) AUSCRYPT 1992. LNCS, vol.\u00a0718, pp. 244\u2013251. Springer, Heidelberg (1993)"},{"key":"21_CR11","first-page":"63","volume-title":"Proc. 3rd Workshop on Formal Methods in Security Engineering","author":"F. Garcia","year":"2005","unstructured":"Garcia, F., Hasuo, I., Pieters, W., Rossum, P.v.: Provable anonymity. In: Proc. 3rd Workshop on Formal Methods in Security Engineering, pp. 63\u201372. ACM, New York (2005)"},{"key":"21_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1007\/978-3-540-39650-5_8","volume-title":"Computer Security \u2013 ESORICS 2003","author":"M. Gomulkiewicz","year":"2003","unstructured":"Gomulkiewicz, M., Klonowski, M., Kutylowski, M.: Rapid mixing and security of Chaum\u2019s visual electronic voting. In: Snekkenes, E., Gollmann, D. (eds.) ESORICS 2003. LNCS, vol.\u00a02808, pp. 132\u2013145. Springer, Heidelberg (2003)"},{"key":"21_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1007\/3-540-45539-6_38","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"M. Hirt","year":"2000","unstructured":"Hirt, M., Sako, K.: Efficient receipt-free voting based on homomorphic encryption. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807, pp. 539\u2013556. Springer, Heidelberg (2000)"},{"key":"21_CR14","first-page":"339","volume-title":"Proceedings of the 11th USENIX Security Symposium","author":"M. Jakobsson","year":"2002","unstructured":"Jakobsson, M., Juels, A., Rivest, R.L.: Making Mix Nets Robust For Electronic Voting By Randomized Partial Checking. In: Proceedings of the 11th USENIX Security Symposium, pp. 339\u2013353. USENIX Association, Berkeley (2002)"},{"key":"21_CR15","first-page":"61","volume-title":"Proc. ACM Workshop on Privacy in the Electronic Society","author":"A. Juels","year":"2005","unstructured":"Juels, A., Catalano, D., Jakobsson, M.: Coercion-resistant electronic elections. In: Proc. ACM Workshop on Privacy in the Electronic Society, pp. 61\u201370. ACM, New York (2005)"},{"key":"21_CR16","unstructured":"Karlof, C., Sastry, N., Wagner, D.: Cryptographic Voting Protocols: A Systems Perspective. In: Proc. 14th USENIX Security Symposium, pp. 33\u201350 (2005)"},{"key":"21_CR17","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1109\/SP.2009.13","volume-title":"Proceedings of the 2009 30th IEEE Symposium on Security and Privacy (S&P)","author":"R. K\u00fcsters","year":"2009","unstructured":"K\u00fcsters, R., Truderung, T.: An Epistemic Approach to Coercion-Resistance for Electronic Voting Protocols. In: Proceedings of the 2009 30th IEEE Symposium on Security and Privacy (S&P), pp. 251\u2013266. IEEE Computer Society, Los Alamitos (2009)"},{"key":"21_CR18","unstructured":"Rivest, R.L., Smith, W.D.: Three voting protocols: ThreeBallot, VAV, and Twin. In: Proc. Electronic Voting Technology Workshop. USENIX (2007)"},{"key":"21_CR19","doi-asserted-by":"crossref","unstructured":"Ryan, P.Y.A.: A variant of the chaum voter-verifiable scheme. In: Proc. 2005 Workshop on Issues in the Theory of Security, pp. 81\u201388 (2005)","DOI":"10.1145\/1045405.1045414"},{"key":"21_CR20","unstructured":"Smyth, B., Ryan, M.D., Kremer, S., Kourjieh, M.: Election verifiability in electronic voting protocols. In: Proceedings of the 4th Benelux Workshop on Information and System Security (WISSEC 2009). Louvain-la-Neuve, Belgium (2009)"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-17650-0_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,25]],"date-time":"2019-08-25T20:17:52Z","timestamp":1566764272000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-17650-0_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642176494","9783642176500"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-17650-0_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010]]}}}