{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T20:01:54Z","timestamp":1725652914969},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642279003"},{"type":"electronic","value":"9783642279010"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-27901-0_2","type":"book-chapter","created":{"date-parts":[[2012,1,16]],"date-time":"2012-01-16T21:01:25Z","timestamp":1326747685000},"page":"14-22","source":"Crossref","is-referenced-by-count":0,"title":["TTP SmartCard-Based ElGamal Cryptosystem Using Threshold Scheme for Electronic Elections"],"prefix":"10.1007","author":[{"given":"Jordi","family":"Pujol-Ahull\u00f3","sequence":"first","affiliation":[]},{"given":"Roger","family":"Jard\u00ed-Ced\u00f3","sequence":"additional","affiliation":[]},{"given":"Jordi","family":"Castell\u00e0-Roca","sequence":"additional","affiliation":[]},{"given":"Oriol","family":"Farr\u00e0s","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","unstructured":"Koninklijke Philips Electronics N.V.: (2003) Jcop 21 v2.2 72kb spreadsheet (2004), \n                    \n                      http:\/\/www.usmartcards.com\/images\/pdfs\/pdf-61.pdf\n                    \n                    \n                  , \n                    \n                      http:\/\/www.usmartcards.com\/images\/pdfs\/pdf-61.pdf"},{"issue":"2","key":"2_CR2","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"D.L. Chaum","year":"1981","unstructured":"Chaum, D.L.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM\u00a024(2), 84\u201390 (1981), \n                    \n                      http:\/\/doi.acm.org\/10.1145\/358549.358563","journal-title":"Commun. ACM"},{"key":"2_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/3-540-69053-0_9","volume-title":"Advances in Cryptology - EUROCRYPT \u201997","author":"R. Cramer","year":"1997","unstructured":"Cramer, R., Gennaro, R., Schoenmakers, B.: A Secure and Optimally Efficient Multi-Authority Election Scheme. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol.\u00a01233, pp. 103\u2013118. Springer, Heidelberg (1997), \n                    \n                      http:\/\/portal.acm.org\/citation.cfm?id=1754542.1754554"},{"key":"2_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1007\/3-540-39568-7_2","volume-title":"Advances in Cryptology","author":"T. Gamal El","year":"1985","unstructured":"El Gamal, T.: A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol.\u00a0196, pp. 10\u201318. Springer, Heidelberg (1985)"},{"issue":"3","key":"2_CR5","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/40.502402","volume":"16","author":"D. Naccache","year":"1996","unstructured":"Naccache, D., M\u2019Ra\u00efhi, D.: Cryptographic smart cards. IEEE Micro\u00a016(3), 14\u201324 (1996), \n                    \n                      http:\/\/portal.acm.org\/citation.cfm?id=623269.624010","journal-title":"IEEE Micro"},{"key":"2_CR6","unstructured":"Oracle: Java 6.0 mutablebiginteger api (2010), \n                    \n                      http:\/\/www.java2s.com\/Open-Source\/Java-Document\/6.0-JDK-Core\/math\/java\/math\/MutableBigInteger.java.java-doc.htm"},{"key":"2_CR7","unstructured":"Oracle: Javacard 2.2.2 api (2010), \n                    \n                      http:\/\/www.oracle.com\/technetwork\/java\/javacard\/specs-138637.html"},{"key":"2_CR8","unstructured":"Oracle: Javacard 3.0.1 api (2010), \n                    \n                      http:\/\/www.oracle.com\/technetwork\/java\/javacard\/specs-jsp-136430.html"},{"key":"2_CR9","unstructured":"Oracle: Introduction to java card 3.0 specifications (2011), \n                    \n                      http:\/\/java.sun.com\/javacard\/3.0"},{"key":"2_CR10","first-page":"10228","volume-title":"Proceedings of the Conference on Design, Automation and Test in Europe, DATE 2004","author":"M. Renaudin","year":"2004","unstructured":"Renaudin, M., Bouesse, F., Proust, P., Tual, J.P., Sourgen, L., Germain, F.: High security smartcards. In: Proceedings of the Conference on Design, Automation and Test in Europe, DATE 2004, vol.\u00a01, p. 10228. IEEE Computer Society, Washington, DC (2004), \n                    \n                      http:\/\/portal.acm.org\/citation.cfm?id=968878.969074"},{"issue":"11","key":"2_CR11","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Commun. ACM\u00a022(11), 612\u2013613 (1979)","journal-title":"Commun. ACM"},{"key":"2_CR12","first-page":"106","volume-title":"1st IEEE International Workshop on Information Forensics and Security (WIFS 2009)","author":"M. Sterckx","year":"2009","unstructured":"Sterckx, M., Gierlichs, B., Preneel, B., Verbauwhede, I.: Efficient implementation of anonymous credentials on java card smart cards. In: 1st IEEE International Workshop on Information Forensics and Security (WIFS 2009), pp. 106\u2013110. IEEE, London (2009)"}],"container-title":["Lecture Notes in Computer Science","Foundations and Practice of Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-27901-0_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,24]],"date-time":"2019-04-24T20:15:15Z","timestamp":1556136915000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-27901-0_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642279003","9783642279010"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-27901-0_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}