{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T20:12:56Z","timestamp":1725739976681},"publisher-location":"Berlin, Heidelberg","reference-count":31,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642391842"},{"type":"electronic","value":"9783642391859"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-39185-9_4","type":"book-chapter","created":{"date-parts":[[2013,7,7]],"date-time":"2013-07-07T20:39:03Z","timestamp":1373229543000},"page":"61-75","source":"Crossref","is-referenced-by-count":0,"title":["Vote Casting in Any Preferred Constituency: A New Voting Channel"],"prefix":"10.1007","author":[{"given":"Jurlind","family":"Budurushi","sequence":"first","affiliation":[]},{"given":"Maria","family":"Henning","sequence":"additional","affiliation":[]},{"given":"Melanie","family":"Volkamer","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"Austrian Ministry for Science and Research: Evaluierungsbericht: E-Voting bei den Hochsch\u00fclerinnen- und Hochsch\u00fcler-schaftswahlen 2009, E-voting evaluation report, Wien (2010) (in German)","key":"4_CR1"},{"unstructured":"Briefwahl, \n                  \n                    http:\/\/www.bundeswahlleiter.de\/de\/glossar\/texte\/Briefwahl.html\n                  \n                  \n                 (online: accessed May 10, 2013) (in German)","key":"4_CR2"},{"unstructured":"Br\u00e4unlich, K., Kasten, A., Grimm, R.: Der neue Personalausweis zur Authentifizierung bei elektronischen Wahlen. In: Der 12. Deutsche IT-Sicherheitskongress - Sicher in die digitale Welt von morgen, pp. 211\u2013225 (2011) (in German)","key":"4_CR3"},{"unstructured":"Br\u00e4unlich, K., Grimm, R., Kasten, A., Vow\u00e9, S., Jahn, N.: Der neue Personalausweis zur Authentifizierung von W\u00e4hlern bei Onlinewahlen (2011) (in German)","key":"4_CR4"},{"unstructured":"Budurushi, J.: End-to-End Verifiable and Coercion Resistant Electronic Voting Protocol for Distributed Voting Machines in Polling Stations. Master thesis. Darmstadt (2012)","key":"4_CR5"},{"key":"4_CR6","first-page":"257","volume-title":"5th International Conference on Electronic Voting 2012","author":"J. Budurushi","year":"2012","unstructured":"Budurushi, J., Neumann, S., Volkamer, M.: Smart Cards in Electronic Voting: Lessons Learned from Applications in Legally binding Elections and Approaches Proposed in Scientific Papers. In: Kripp, M.J., Volkamer, M., Grimm, R. (eds.) 5th International Conference on Electronic Voting 2012, vol.\u00a0205, pp. 257\u2013270. Gesellschaft f\u00fcr Informatik, Bregenz (2012)"},{"unstructured":"Bundesgesetzblatt I, No. 21, pp. 383\u2013388 (May 9, 1956), \n                  \n                    http:\/\/www.bgbl.de\/Xaver\/start.xav?startbk=Bundesanzeiger_BGBl&bk=Bundesanzeiger_BGBl&start=\/\/%5Battr_id=%27bgbl156s0383.pdf%27%5D\n                  \n                  \n                 (online: accessed May 10, 2013) (in German)","key":"4_CR7"},{"unstructured":"Bundesgesetzblatt I, No. 26, pp. 1342\u20131350 (April 26, 2002), \n                  \n                    http:\/\/www.bgbl.de\/Xaver\/start.xav?startbk=Bundesanzeiger_BGBl&bk=Bundesanzeiger_BGBl&start=\/\/%5Battr_id=%27bgbl102s1342.pdf%27%5D\n                  \n                  \n                 (online: accessed May 10, 2013) (in German)","key":"4_CR8"},{"key":"4_CR9","first-page":"1","volume-title":"4th International Conference for Internet Technology and Secured Transactions","author":"J. Carracedo Gallardo","year":"2009","unstructured":"Carracedo Gallardo, J., Belleboni, P.E.: Use of the New Smart Identity Card to Reinforce Electronic Voting Guarantees. In: 4th International Conference for Internet Technology and Secured Transactions, pp. 1\u20136. IEEE Press, London (2009)"},{"doi-asserted-by":"crossref","unstructured":"Chaum, D., Essex, A., Carback, R., Clark, J., Popoveniuc, S., Sherman, T.A., Vora, L.P.: Scantegrity: End-to-End Voter-Verifiable Optical-Scan Voting. IEEE Security & Privacy, 40\u201346 (2008)","key":"4_CR10","DOI":"10.1109\/MSP.2008.70"},{"unstructured":"Deutscher Bundestag, Drucksache 17\/10158, \n                  \n                    http:\/\/dipbt.bundestag.de\/dip21\/btd\/17\/101\/1710158.pdf\n                  \n                  \n                 (online: accessed May 10, 2013) (in German)","key":"4_CR11"},{"unstructured":"Estonian National Electoral Committee: E-voting System General Overview, \n                  \n                    http:\/\/www.vvk.ee\/public\/dok\/General_Description_E-Voting_2010.pdf\n                  \n                  \n                 (online: accessed May 10, 2013)","key":"4_CR12"},{"unstructured":"Federal Constitutional Court of Germany: Entscheidungen des Bundesverfassungsgerichts (BVerfGE) 59, pp. 119\u2013128 (1981)","key":"4_CR13"},{"unstructured":"Federal Constitutional Court of Germany: Entscheidungen des Bundesverfassungsgerichts (BVerfGE) 123, pp. 39\u201388 (2009)","key":"4_CR14"},{"unstructured":"Federal Constitutional Court of Germany: Entscheidungen des Bundesverfassungsgerichts (BVerfGE) 95, pp. 335\u2013407 (1996)","key":"4_CR15"},{"unstructured":"Federal Office for Information Security: Advanced Security Mechanism for Machine Readable Travel Documents - Part 2. Technical report, BSI-TR-03110-2 (2012)","key":"4_CR16"},{"unstructured":"Federal Office for Information Security: Functional Specification eID-Server - Part 1. Technical report, BSI-TR-03130-1 (2012)","key":"4_CR17"},{"key":"4_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/978-3-642-13556-9_6","volume-title":"Architecting Critical Systems","author":"J.P. Gibson","year":"2010","unstructured":"Gibson, J.P., Lallet, E., Raffy, J.-L.: Engineering a Distributed e-Voting System Architecture: Meeting Critical Requirements. In: Giese, H. (ed.) ISARCS 2010. LNCS, vol.\u00a06150, pp. 89\u2013108. Springer, Heidelberg (2010)"},{"unstructured":"Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile, \n                  \n                    http:\/\/tools.ietf.org\/html\/rfc5280\n                  \n                  \n                 (online: accessed May 10, 2013)","key":"4_CR19"},{"key":"4_CR20","first-page":"67","volume-title":"Proceedings of the Special Interest Group on Biometrics and Electronic Signatures","author":"G. Meister","year":"2008","unstructured":"Meister, G., H\u00fchnlein, D., Araujo, R.: eVoting with the European Citizen Card. In: Br\u00f6mme, A., Busch, C., H\u00fchnlein, D. (eds.) Proceedings of the Special Interest Group on Biometrics and Electronic Signatures, vol.\u00a0137, pp. 67\u201378. Gesellschaft f\u00fcr Informatik, Darmstadt (2008)"},{"doi-asserted-by":"crossref","unstructured":"Mishra, A., Gupta, B.B., Joshi, R.C.: A Comparative Study of Distributed Denial of Service Attacks, Intrusion Tolerance and Mitigation Techniques. In: European Intelligence and Security Informatics Conference (EISIC), pp. 286\u2013289 (2011)","key":"4_CR21","DOI":"10.1109\/EISIC.2011.15"},{"unstructured":"Personalausweisgesetz (PAuswG), \n                  \n                    http:\/\/www.gesetze-im-internet.de\/pauswg\/BJNR134610009.html\n                  \n                  \n                 (online: accessed May 10, 2013) (in German)","key":"4_CR22"},{"key":"4_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1007\/978-3-642-12980-3_15","volume-title":"Towards Trustworthy Elections","author":"S. Popoveniuc","year":"2010","unstructured":"Popoveniuc, S., Hosp, B.: An Introduction to PunchScan. In: Chaum, D., Jakobsson, M., Rivest, R.L., Ryan, P.Y.A., Benaloh, J., Kutylowski, M., Adida, B. (eds.) Towards Trustworthy Elections. LNCS, vol.\u00a06000, pp. 242\u2013259. Springer, Heidelberg (2010)"},{"unstructured":"Referentenentwurf Bundesmeldegesetz (MG), \n                  \n                    http:\/\/philipbanse.de\/docs\/Referenenentwurf_Meldegesetz.pdf\n                  \n                  \n                 (online: accessed May 10, 2013) (in German)","key":"4_CR24"},{"unstructured":"Richter, P.: Briefwahl f\u00fcr alle? - Die Freigabe der Fernwahl und der Grundsatz der \u00d6ffentlichkeit der Wahl. In: Die O \u0308ffentliche Verwaltung, pp. 606\u2013610. W. Kohlhammer GmbH (2010) (in German)","key":"4_CR25"},{"key":"4_CR26","series-title":"IFIP AICT","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-04280-5_1","volume-title":"Software Services for e-Business and e-Society","author":"T. R\u00f6ssler","year":"2009","unstructured":"R\u00f6ssler, T.: Electronic Voting Using Identity Domain Separation and Hardware Security Modules. In: Godart, C., Gronau, N., Sharma, S., Canals, G. (eds.) I3E 2009. IFIP AICT, vol.\u00a0305, pp. 1\u201312. Springer, Heidelberg (2009)"},{"doi-asserted-by":"crossref","unstructured":"Ryan, Y.A.P., Bismark, D., Heather, J., Schneider, S., Xia, Z.: Pr\u00eat \u00e0 voter: a voter-verifiable voting system. IEEE Transactions on Information Forensics and Security, 662\u2013673 (2009)","key":"4_CR27","DOI":"10.1109\/TIFS.2009.2033233"},{"unstructured":"Sandler, D.R., Wallach, D.S.: The case for networked remote voting precincts. In: Proceedings of the 3rd USENIX\/ACCURATE Electronic Voting Technology Workshop, San Jose, CA (2008)","key":"4_CR28"},{"unstructured":"Schreiber, W.: Bundeswahlgesetz: Kommentar. Carl Heymanns Verlag, K\u00f6ln (2009) (in German)","key":"4_CR29"},{"unstructured":"Subramani, S.: Denial of Service attacks and mitigation techniques: Real time implementation with detailed analysis. SANS Institute InfoSec Reading Room, \n                  \n                    http:\/\/www.sans.org\/reading_room\/whitepapers\/detection\/denial-service-attacks-mitigation-techniques-real-time-implementation-detailed-analysi_33764\n                  \n                  \n                 (online: accessed May 10, 2013)","key":"4_CR30"},{"unstructured":"The Transport Layer Security (TLS) Protocol Version 1.2 , \n                  \n                    http:\/\/tools.ietf.org\/html\/rfc5246\n                  \n                  \n                 (online: accessed May 10, 2013)","key":"4_CR31"}],"container-title":["Lecture Notes in Computer Science","E-Voting and Identify"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-39185-9_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,15]],"date-time":"2019-05-15T09:01:59Z","timestamp":1557910919000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-39185-9_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642391842","9783642391859"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-39185-9_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}