{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T16:32:31Z","timestamp":1759336351202},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642214233"},{"type":"electronic","value":"9783642214240"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-21424-0_10","type":"book-chapter","created":{"date-parts":[[2011,6,15]],"date-time":"2011-06-15T11:52:47Z","timestamp":1308138767000},"page":"116-127","source":"Crossref","is-referenced-by-count":7,"title":["Preventing Board Flooding Attacks in Coercion-Resistant Electronic Voting Schemes"],"prefix":"10.1007","author":[{"given":"Reto","family":"Koenig","sequence":"first","affiliation":[]},{"given":"Rolf","family":"Haenni","sequence":"additional","affiliation":[]},{"given":"Stephan","family":"Fischli","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","doi-asserted-by":"crossref","unstructured":"Ara\u00fajo, R., Foulle, S., Traor\u00e9, J.: A practical and secure coercion-resistant scheme for remote elections. In: Chaum, D., Kutylowski, M., Rivest, R.L., Ryan, P.Y.A. (eds.) FEE 2007, Frontiers of Electronic Voting, Schloss Dagstuhl, Germany, pp. 330\u2013342 (2007)","DOI":"10.1007\/978-3-642-12980-3_20"},{"key":"10_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1007\/978-3-642-17619-7_20","volume-title":"Cryptology and Network Security","author":"R. Ara\u00fajo","year":"2010","unstructured":"Ara\u00fajo, R., Ben Rajeb, N., Robbana, R., Traor\u00e9, J., Youssfi, S.: Towards practical and secure coercion-resistant electronic elections. In: Heng, S.-H., Wright, R.N., Goi, B.-M. (eds.) CANS 2010. LNCS, vol.\u00a06467, pp. 278\u2013297. Springer, Heidelberg (2010)"},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"Clarkson, M.R., Chong, S., Myers, A.C.: Civitas: Toward a secure voting system. In: SP 2008, 29th IEEE Symposium on Security and Privacy, Oakland, USA, pp. 354\u2013368 (2008)","DOI":"10.1109\/SP.2008.32"},{"issue":"4","key":"10_CR4","doi-asserted-by":"publisher","first-page":"546","DOI":"10.1007\/s00145-010-9067-9","volume":"23","author":"J. Groth","year":"2010","unstructured":"Groth, J.: A verifiable secret shuffle of homomorphic encryptions. Journal of Cryptology\u00a023(4), 546\u2013579 (2010)","journal-title":"Journal of Cryptology"},{"key":"10_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1007\/978-3-642-01465-9_16","volume-title":"Formal Aspects in Security and Trust","author":"J. Heather","year":"2009","unstructured":"Heather, J., Lundin, D.: The append-only web bulletin board. In: Degano, P., Guttman, J., Martinelli, F. (eds.) FAST 2008. LNCS, vol.\u00a05491, pp. 242\u2013256. Springer, Heidelberg (2009)"},{"key":"10_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1007\/3-540-44448-3_13","volume-title":"Advances in Cryptology - ASIACRYPT 2000","author":"M. Jakobsson","year":"2000","unstructured":"Jakobsson, M., Juels, A.: Mix and match: Secure function evaluation via ciphertexts. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol.\u00a01976, pp. 162\u2013177. Springer, Heidelberg (2000)"},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Juels, A., Catalano, D., Jakobsson, M.: Coercion-resistant electronic elections. In: Atluri, V., De Capitani di Vimercati, S., Dingledine, R. (eds.) WPES 2005, 4th ACM Workshop on Privacy in the Electronic Society, Alexandria, USA, pp. 61\u201370 (2005)","DOI":"10.1145\/1102199.1102213"},{"key":"10_CR8","unstructured":"Meister, G., H\u00fchnlein, D., Eichholz, J., Araujo, R.: eVoting with the European citizen card. In: Br\u00f6mme, A., Busch, C., H\u00fchnlein, D. (eds.) BIOSIG 2008, Special Interest Group on Biometrics and Electronic Signatures, Darmstadt, Germany, pp. 67\u201378 (2008)"},{"issue":"7","key":"10_CR9","doi-asserted-by":"publisher","first-page":"934","DOI":"10.3923\/itj.2009.934.964","volume":"8","author":"B. Meng","year":"2009","unstructured":"Meng, B.: A critical review of receipt-freeness and coercion-resistance. Information Technology Journal\u00a08(7), 934\u2013964 (2009)","journal-title":"Information Technology Journal"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Neff, C.A.: A verifiable secret shuffle and its application to e-voting. In: Samarati, P. (ed.) CCS 2001, 8th ACM Conference on Computer and Communications Security, Philadelphia, USA, pp. 116\u2013125 (2001)","DOI":"10.1145\/501983.502000"},{"key":"10_CR11","unstructured":"Peters, R.A.: A Secure Bulletin Board. Master\u2019s thesis, Department of Mathematics and Computing Science, Technische Universiteit Eindhoven, The Netherlands (2005)"},{"key":"10_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1007\/BFb0053448","volume-title":"Advances in Cryptology - EUROCRYPT \u201994","author":"B. Pfitzmann","year":"1995","unstructured":"Pfitzmann, B.: Breaking an efficient anonymous channel. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol.\u00a0950, pp. 332\u2013340. Springer, Heidelberg (1995)"},{"key":"10_CR13","unstructured":"Schweisgut, J.: Coercion-resistant electronic elections with observer. In: Krimmer, R. (ed.) EVOTE 2006, 2nd International Workshop on Electronic Voting, Bregenz, Austria, pp. 171\u2013177 (2006)"},{"key":"10_CR14","unstructured":"Smith, W.D.: New cryptographic voting scheme with best-known theoretical properties. In: FEE 2005, Workshop on Frontiers in Electronic Elections, Milan, Italy (2005)"},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"Spycher, O., Koenig, R., Haenni, R., Schl\u00e4pfer, M.: A new approach towards coercion-resistant remote e-voting in linear time. In: FC 2011, 15th International Conference on Financial Cryptography, St. Lucia (2011)","DOI":"10.1007\/978-3-642-27576-0_15"},{"key":"10_CR16","doi-asserted-by":"crossref","unstructured":"Weber, G., Araujo, R., Buchmann, J.: On coercion-resistant electronic elections with linear work. In: ARES 2007, 2nd International Conference on Availability, Reliability and Security, Vienna, Austria, pp. 908\u2013916 (2007)","DOI":"10.1109\/ARES.2007.108"},{"key":"10_CR17","volume-title":"Coercion-Resistant Cryptographic Voting: Implementing Free and Secret Electronic Elections","author":"S. Weber","year":"2008","unstructured":"Weber, S.: Coercion-Resistant Cryptographic Voting: Implementing Free and Secret Electronic Elections. VDM Verlag, Saarbr\u00fccken (2008)"},{"key":"10_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1007\/978-3-642-02620-1_28","volume-title":"Information Security and Privacy","author":"D. Wikstr\u00f6m","year":"2009","unstructured":"Wikstr\u00f6m, D.: A commitment-consistent proof of a shuffle. In: Boyd, C., Gonz\u00e1lez Nieto, J. (eds.) ACISP 2009. LNCS, vol.\u00a05594, pp. 407\u2013421. Springer, Heidelberg (2009)"}],"container-title":["IFIP Advances in Information and Communication Technology","Future Challenges in Security and Privacy for Academia and Industry"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-21424-0_10.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T03:03:30Z","timestamp":1606187010000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-21424-0_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642214233","9783642214240"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-21424-0_10","relation":{},"ISSN":["1868-4238","1861-2288"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1861-2288"}],"subject":[],"published":{"date-parts":[[2011]]}}}