{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T04:04:28Z","timestamp":1742961868155,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642279003"},{"type":"electronic","value":"9783642279010"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-27901-0_13","type":"book-chapter","created":{"date-parts":[[2012,1,16]],"date-time":"2012-01-16T21:01:25Z","timestamp":1326747685000},"page":"164-180","source":"Crossref","is-referenced-by-count":10,"title":["Vote-Independence: A Powerful Privacy Notion for Voting Protocols"],"prefix":"10.1007","author":[{"given":"Jannik","family":"Dreier","sequence":"first","affiliation":[]},{"given":"Pascal","family":"Lafourcade","sequence":"additional","affiliation":[]},{"given":"Yassine","family":"Lakhnech","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","first-page":"104","volume-title":"Proceedings of the 28th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2001","author":"M. Abadi","year":"2001","unstructured":"Abadi, M., Fournet, C.: Mobile values, new names, and secure communication. In: Proceedings of the 28th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2001, pp. 104\u2013115. ACM, New York (2001)"},{"key":"13_CR2","first-page":"10","volume-title":"Proceedings of the 2009 Conference on Electronic Voting Technology\/Workshop on Trustworthy Elections, EVT\/WOTE 2009","author":"B. Adida","year":"2009","unstructured":"Adida, B., De Marneffe, O., Pereira, O., Quisquater, J.-J.: Electing a university president using open-audit voting: analysis of real-world use of helios. In: Proceedings of the 2009 Conference on Electronic Voting Technology\/Workshop on Trustworthy Elections, EVT\/WOTE 2009, p. 10. USENIX Association, Berkeley (2009)"},{"issue":"1","key":"13_CR3","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.jlap.2007.06.002","volume":"75","author":"B. Blanchet","year":"2008","unstructured":"Blanchet, B., Abadi, M., Fournet, C.: Automated verification of selected equivalences for security protocols. Journal of Logic and Algebraic Programming\u00a075(1), 3\u201351 (2008)","journal-title":"Journal of Logic and Algebraic Programming"},{"key":"13_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/978-3-540-77493-8_10","volume-title":"E-Voting and Identity","author":"J.-M. Bohli","year":"2007","unstructured":"Bohli, J.-M., M\u00fcller-Quade, J., R\u00f6hrich, S.: Bingo Voting: Secure and Coercion-Free Voting Using a Trusted Random Number Generator. In: Alkassar, A., Volkamer, M. (eds.) VOTE-ID 2007. LNCS, vol.\u00a04896, pp. 111\u2013124. Springer, Heidelberg (2007)"},{"key":"13_CR5","unstructured":"UK Electoral Commission. Key issues and conclusions: May 2007 electoral pilot schemes, \n                    \n                      http:\/\/www.electoralcommission.org.uk\/elections\/pilots\/May2007"},{"key":"13_CR6","unstructured":"Bundesverfassungsgericht (Germanys Federal Constitutional Court). Use of voting computers in 2005 bundestag election unconstitutional (March 2009), press release 19\/2009, \n                    \n                      http:\/\/www.bundesverfassungsgericht.de\/en\/press\/bvg09-019en.html"},{"key":"13_CR7","doi-asserted-by":"publisher","first-page":"435","DOI":"10.3233\/JCS-2009-0340","volume":"17","author":"S. Delaune","year":"2009","unstructured":"Delaune, S., Kremer, S., Ryan, M.: Verifying privacy-type properties of electronic voting protocols. Journal of Computer Security\u00a017, 435\u2013487 (2009)","journal-title":"Journal of Computer Security"},{"key":"13_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1007\/978-3-642-12980-3_18","volume-title":"Towards Trustworthy Elections","author":"S. Delaune","year":"2010","unstructured":"Delaune, S., Kremer, S., Ryan, M.D.: Verifying Privacy-Type Properties of Electronic Voting Protocols: A Taster. In: Chaum, D., Jakobsson, M., Rivest, R.L., Ryan, P.Y.A., Benaloh, J., Kutylowski, M., Adida, B. (eds.) Towards Trustworthy Elections. LNCS, vol.\u00a06000, pp. 289\u2013309. Springer, Heidelberg (2010)"},{"key":"13_CR9","unstructured":"Dreier, J., Lafourcade, P., Lakhnech, Y.: Vote-independence: A powerful privacy notion for voting protocols. Technical Report TR-2011-8, Verimag Research Report (April 2011), \n                    \n                      http:\/\/www-verimag.imag.fr\/TR\/TR-2011-8.pdf"},{"key":"13_CR10","series-title":"Lecture Notes in Computer Science","first-page":"244","volume-title":"Advances in Cryptology - AUSCRYPT 1992","author":"A. Fujioka","year":"1992","unstructured":"Fujioka, A., Okamoto, T., Ohta, K.: A Practical Secret Voting Scheme for Large Scale Elections. In: Zheng, Y., Seberry, J. (eds.) AUSCRYPT 1992. LNCS, vol.\u00a0718, pp. 244\u2013251. Springer, Heidelberg (1992)"},{"key":"13_CR11","unstructured":"Juels, A., Catalano, D., Jakobsson, M.: Coercion-resistant electronic elections, Cryptology ePrint Archive, Report 2002\/165 (2002), \n                    \n                      http:\/\/eprint.iacr.org\/"},{"key":"13_CR12","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1145\/1102199.1102213","volume-title":"Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, WPES 2005","author":"A. Juels","year":"2005","unstructured":"Juels, A., Catalano, D., Jakobsson, M.: Coercion-resistant electronic elections. In: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, WPES 2005, pp. 61\u201370. ACM, New York (2005)"},{"key":"13_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1007\/978-3-540-31987-0_14","volume-title":"Programming Languages and Systems","author":"S. Kremer","year":"2005","unstructured":"Kremer, S., Ryan, M.: Analysis of an Electronic Voting Protocol in the Applied Pi Calculus. In: Sagiv, M. (ed.) ESOP 2005. LNCS, vol.\u00a03444, pp. 186\u2013200. Springer, Heidelberg (2005)"},{"key":"13_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1007\/978-3-642-15497-3_24","volume-title":"Computer Security \u2013 ESORICS 2010","author":"S. Kremer","year":"2010","unstructured":"Kremer, S., Ryan, M., Smyth, B.: Election Verifiability in Electronic Voting Protocols. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol.\u00a06345, pp. 389\u2013404. Springer, Heidelberg (2010)"},{"key":"13_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/978-3-540-24691-6_19","volume-title":"Information Security and Cryptology - ICISC 2003","author":"B. Lee","year":"2004","unstructured":"Lee, B., Boyd, C., Dawson, E., Kim, K., Yang, J., Yoo, S.: Providing Receipt-Freeness in Mixnet-Based Voting Protocols. In: Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003. LNCS, vol.\u00a02971, pp. 245\u2013258. Springer, Heidelberg (2004)"},{"key":"13_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1007\/11818175_22","volume-title":"Advances in Cryptology - CRYPTO 2006","author":"T. Moran","year":"2006","unstructured":"Moran, T., Naor, M.: Receipt-Free Universally-Verifiable Voting with Everlasting Privacy. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol.\u00a04117, pp. 373\u2013392. Springer, Heidelberg (2006)"},{"key":"13_CR17","unstructured":"Participants of the Dagstuhl Conference on Frontiers\u00a0of E-Voting. Dagstuhl accord (2007), \n                    \n                      http:\/\/www.dagstuhlaccord.org\/"},{"key":"13_CR18","doi-asserted-by":"crossref","unstructured":"Okamoto, T.: An electronic voting scheme. In: Proceedings of the IFIP World Conference on IT Tools, pp. 21\u201330 (1996)","DOI":"10.1007\/978-0-387-34979-4_3"},{"key":"13_CR19","doi-asserted-by":"crossref","unstructured":"Smyth, B., Cortier, V.: Attacking and fixing helios: An analysis of ballot secrecy. In: Accepted at CSF 2011 (2011)","DOI":"10.1109\/CSF.2011.27"},{"key":"13_CR20","doi-asserted-by":"crossref","unstructured":"Smyth, B., Cortier, V.: Attacking and fixing helios: An analysis of ballot secrecy. Cryptology ePrint Archive, Report 2010\/625 (2010), \n                    \n                      http:\/\/eprint.iacr.org\/","DOI":"10.1109\/CSF.2011.27"},{"key":"13_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1007\/978-3-642-16074-5_11","volume-title":"Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security","author":"B. Smyth","year":"2010","unstructured":"Smyth, B., Ryan, M.D., Kremer, S., Kourjieh, M.: Towards Automatic Analysis of Election Verifiability Properties. In: Armando, A., Lowe, G. (eds.) ARSPA-WITS 2010. LNCS, vol.\u00a06186, pp. 146\u2013163. Springer, Heidelberg (2010)"},{"key":"13_CR22","unstructured":"Ministerie van Binnenlandse Zaken en Koninkrijksrelaties (Netherland\u2019s Ministry of\u00a0the Interior and Kingdom Relations). Stemmen met potlood en papier (voting with pencil and paper) (May 2008), press release, \n                    \n                      http:\/\/www.minbzk.nl\/onderwerpen\/grondwet-en\/verkiezingen\/nieuws--en\/112441\/stemmen-met-potlood"}],"container-title":["Lecture Notes in Computer Science","Foundations and Practice of Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-27901-0_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T20:36:56Z","timestamp":1558298216000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-27901-0_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642279003","9783642279010"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-27901-0_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}