{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,22]],"date-time":"2026-02-22T22:33:55Z","timestamp":1771799635510,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642329456","type":"print"},{"value":"9783642329463","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-32946-3_10","type":"book-chapter","created":{"date-parts":[[2012,8,14]],"date-time":"2012-08-14T08:56:16Z","timestamp":1344934576000},"page":"114-128","source":"Crossref","is-referenced-by-count":57,"title":["Attacking the Washington, D.C. Internet Voting System"],"prefix":"10.1007","author":[{"given":"Scott","family":"Wolchok","sequence":"first","affiliation":[]},{"given":"Eric","family":"Wustrow","sequence":"additional","affiliation":[]},{"given":"Dawn","family":"Isabel","sequence":"additional","affiliation":[]},{"given":"J. Alex","family":"Halderman","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","unstructured":"Internet voting in Estonia. Vabariigi Valimiskomisjon (February 2007), http:\/\/www.vvk.ee\/public\/dok\/Internet_Voting_in_Estonia.pdf"},{"key":"10_CR2","unstructured":"Uncovering the veil on Geneva\u2019s Internet voting solution. Republique Et Canton De Geneve (February 2009), http:\/\/www.geneve.ch\/evoting\/english\/doc\/Flash_IT_vote_electronique_SIDP_final_english.pdf"},{"key":"10_CR3","unstructured":"District of Columbia\u2019s Board of Elections and Ethics adopts open source digital voting foundation technology to support ballot delivery. OSDV Press Release (June 2010), http:\/\/osdv.org\/wp-content\/uploads\/2010\/06\/osdv-press-release-final-62210.pdf"},{"key":"10_CR4","unstructured":"Internet voting, still in beta. The New York Times editorial (January 2010), http:\/\/www.nytimes.com\/2010\/01\/28\/opinion\/28thu4.html"},{"key":"10_CR5","unstructured":"Internet voting. Verified Voting (May 2011), http:\/\/www.verifiedvoting.org\/article.php?list=type&type=27"},{"key":"10_CR6","unstructured":"Adida, B.: Helios: Web-based open-audit voting. In: Proc. 17th USENIX Security Symposium (July 2008)"},{"key":"10_CR7","unstructured":"Appel, A.W., Ginsburg, M., Hursti, H., Kernighan, B.W., Richards, C.D., Tan, G., Venetis, P.: The New Jersey voting-machine lawsuit and the AVC Advantage DRE voting machine. In: Proc. 2009 Electronic Voting Technology Workshop\/Workshop on Trustworthy Elections (EVT\/WOTE) (August 2009)"},{"key":"10_CR8","unstructured":"Butler, K., Enck, W., Hursti, H., McLaughlin, S., Traynor, P., McDaniel, P.: Systemic issues in the Hart InterCivic and Premier voting systems: Reflections on project EVEREST. In: Proc. 2008 Electronic Voting Technology Workshop\/Workshop on Trustworthy Elections (EVT\/WOTE) (July 2008)"},{"key":"10_CR9","unstructured":"Esteghari, S., Desmedt, Y.: Exploiting the client vulnerabilities in Internet e-voting systems: Hacking Helios 2.0 as an example. In: Proc. 2010 Electronic Voting Technology Workship\/Workshop on Trustworthy Elections (EVT\/WOTE) (August 2010)"},{"key":"10_CR10","unstructured":"Feldman, A.J., Halderman, J.A., Felten, E.W.: Security analysis of the Diebold AccuVote-TS voting machine. In: Proc. 2007 Electronic Voting Technology Workshop\/Workshop on Trustworthy Elections (EVT\/WOTE) (August 2007)"},{"key":"10_CR11","unstructured":"Jefferson, D., Rubin, A.D., Simons, B., Wagner, D.: A security analysis of the secure electronic registration and voting experiment (SERVE) (January 2004), http:\/\/servesecurityreport.org\/paper.pdf"},{"key":"10_CR12","unstructured":"Kiayias, A., Korman, M., Walluck, D.: An Internet voting system supporting user privacy. In: 22nd Annual Computer Security Applications Conference"},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Kohno, T., Stubblefield, A., Rubin, A.D., Wallach, D.S.: Analysis of an electronic voting system. In: IEEE Symposium on Security and Privacy, pp.\u00a027\u201340 (May 2004)","DOI":"10.1109\/SECPRI.2004.1301313"},{"key":"10_CR14","unstructured":"Rokey, W., Suleman, I., McGhie, K.W., Togo, D., West, J., Lowery, C.: Making reform a reality: An after-action report on implementation of the Omnibus Election Reform Act. DCBOEE (February 2011), http:\/\/www.dcboee.org\/popup.asp?url=\/pdf_files\/nr_687.pdf"},{"key":"10_CR15","unstructured":"Rubin, A.: Security considerations for remote electronic voting over the Internet, http:\/\/avirubin.com\/e-voting.security.html"},{"key":"10_CR16","unstructured":"Stenbjorn, P.: An overview and design rationale memo. DCBOEE (September 2010), http:\/\/www.dcboee.us\/dvm\/DCdVBM-DesignRationale-v3.pdf"},{"key":"10_CR17","doi-asserted-by":"crossref","unstructured":"Wolchok, S., Wustrow, E., Halderman, J.A., Prasad, H.K., Kankipati, A., Sakhamuri, S.K., Yagati, V., Gonggrijp, R.: Security analysis of India\u2019s electronic voting machines. In: Proc. 17th ACM Conference on Computer and Communications Security (CCS) (October 2010)","DOI":"10.1145\/1866307.1866309"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-32946-3_10.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,6]],"date-time":"2025-04-06T21:30:56Z","timestamp":1743975056000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-32946-3_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642329456","9783642329463"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-32946-3_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012]]}}}