{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T16:11:07Z","timestamp":1746115867972,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642417160"},{"type":"electronic","value":"9783642417177"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-41717-7_10","type":"book-chapter","created":{"date-parts":[[2013,11,5]],"date-time":"2013-11-05T06:40:29Z","timestamp":1383633629000},"page":"71-83","source":"Crossref","is-referenced-by-count":0,"title":["Independent Computations for Safe Remote Electronic Voting"],"prefix":"10.1007","author":[{"given":"Alec","family":"Yasinsac","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","unstructured":"Jefferson, D., Rubin, A.D., Simons, B., Wagner, D.: A security analysis of the secure electronic registration and voting experiment (SERVE). Technical report (January 2004), http:\/\/www.servesecurityreport.org\/"},{"key":"10_CR2","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1145\/1022594.1022624","volume":"47","author":"D. Jefferson","year":"2004","unstructured":"Jefferson, D., Rubin, A.D., Simons, B., Wagner, D.: Analyzing internet voting security. Communications of the ACM\u00a047, 59\u201364 (2004)","journal-title":"Communications of the ACM"},{"issue":"2","key":"10_CR3","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"D.L. Chaum","year":"1981","unstructured":"Chaum, D.L.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM\u00a024(2), 84\u201390 (1981)","journal-title":"Commun. ACM"},{"key":"10_CR4","first-page":"372","volume-title":"Proceedings of the 26th Annual Symposium on Foundations of Computer Science, SFCS 1985","author":"J.D. Cohen","year":"1985","unstructured":"Cohen, J.D., Fischer, M.J.: A robust and verifiable cryptographically secure election scheme. In: Proceedings of the 26th Annual Symposium on Foundations of Computer Science, SFCS 1985, pp. 372\u2013382. IEEE Computer Society, Washington, DC (1985)"},{"key":"10_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"411","DOI":"10.1007\/3-540-48658-5_37","volume-title":"Advances in Cryptology - CRYPTO \u201994","author":"K. Sako","year":"1994","unstructured":"Sako, K., Kilian, J.: Secure voting using partially compatible homomorphisms. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol.\u00a0839, pp. 411\u2013424. Springer, Heidelberg (1994)"},{"key":"10_CR6","first-page":"335","volume-title":"Proceedings of the 17th Conference on Security Symposium, SS 2008","author":"B. Adida","year":"2008","unstructured":"Adida, B.: Helios: web-based open-audit voting. In: Proceedings of the 17th Conference on Security Symposium, SS 2008, pp. 335\u2013348. USENIX Association, Berkeley (2008)"},{"issue":"2","key":"10_CR7","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/s10207-011-0124-7","volume":"10","author":"G. Coker","year":"2011","unstructured":"Coker, G., Guttman, J., Loscocco, P., Herzog, A., Millen, J., O\u2019Hanlon, B., Ramsdell, J., Segall, A., Sheehy, J., Sniffen, B.: Principles of remote attestation. Int. J. Inf. Secur.\u00a010(2), 63\u201381 (2011)","journal-title":"Int. J. Inf. Secur."},{"key":"10_CR8","unstructured":"Yasinsac, A.: Identification: Remote Attestation. In: Wireless Sensor Network Security, Cryptology & Information Security Series (CIS), ch. 11. IOS Press (November 2007) ISBN: 978-1-58603-813-7"},{"key":"10_CR9","first-page":"85","volume-title":"Proceedings of the 5th ACM Workshop on Wireless Security, WiSe 2006","author":"A. Seshadri","year":"2006","unstructured":"Seshadri, A., Luk, M., Perrig, A., van Doorn, L., Khosla, P.: Scuba: Secure code update by attestation in sensor networks. In: Proceedings of the 5th ACM Workshop on Wireless Security, WiSe 2006, pp. 85\u201394. ACM, New York (2006)"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Shi, E., Perrig, A., van Doorn, L.: Bind: a fine-grained attestation service for secure distributed systems. In: 2005 IEEE Symposium on Security and Privacy, pp. 154\u2013168 (2005)","DOI":"10.1109\/SP.2005.4"},{"issue":"3","key":"10_CR11","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/MSP.2008.75","volume":"6","author":"A. Yasinsac","year":"2008","unstructured":"Yasinsac, A., Bishop, M.: The dynamics of counting and recounting votes. IEEE Security & Privacy\u00a06(3), 22\u201329 (2008)","journal-title":"IEEE Security & Privacy"},{"key":"10_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/978-3-642-12980-3_5","volume-title":"Towards Trustworthy Elections","author":"S. Bruck","year":"2010","unstructured":"Bruck, S., Jefferson, D., Rivest, R.L.: A modular voting architecture (frog voting). In: Chaum, D., Jakobsson, M., Rivest, R.L., Ryan, P.Y.A., Benaloh, J., Kutylowski, M., Adida, B. (eds.) Towards Trustworthy Elections. LNCS, vol.\u00a06000, pp. 97\u2013106. Springer, Heidelberg (2010)"},{"key":"10_CR13","unstructured":"Pettis, E., Hunter, N., Lin, M.: S. Le. Military Remote Electronic Voting Protocol. Senior Project, School of Computing, University of South Alabama (December 6, 2012)"},{"key":"10_CR14","first-page":"28","volume-title":"Proceedings of the 19th IEEE Workshop on Computer Security Foundations, CSFW 2006","author":"S. Delaune","year":"2006","unstructured":"Delaune, S., Kremer, S., Ryan, M.: Coercion-resistance and receipt-freeness in electronic voting. In: Proceedings of the 19th IEEE Workshop on Computer Security Foundations, CSFW 2006, pp. 28\u201342. IEEE Computer Society, Washington, DC (2006)"},{"key":"10_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1007\/3-540-45539-6_38","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"M. Hirt","year":"2000","unstructured":"Hirt, M., Sako, K.: Efficient receipt-free voting based on homomorphic encryption. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807, pp. 539\u2013556. Springer, Heidelberg (2000)"},{"key":"10_CR16","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1145\/1102199.1102213","volume-title":"Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, WPES 2005","author":"A. Juels","year":"2005","unstructured":"Juels, A., Catalano, D., Jakobsson, M.: Coercion-resistant electronic elections. In: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, WPES 2005, pp. 61\u201370. ACM, New York (2005)"},{"key":"10_CR17","doi-asserted-by":"crossref","unstructured":"Clarkson, M.R., Chong, S., Myers, A.C.: Civitas: Toward a secure voting system. In: IEEE Symposium on Security and Privacy, SP 2008, pp. 354\u2013368 (2008)","DOI":"10.1109\/SP.2008.32"},{"key":"10_CR18","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1109\/SP.2009.13","volume-title":"Proceedings of the 2009 30th IEEE Symposium on Security and Privacy, SP 2009","author":"R. Kuesters","year":"2009","unstructured":"Kuesters, R., Truderung, T.: An epistemic approach to coercion-resistance for electronic voting protocols. In: Proceedings of the 2009 30th IEEE Symposium on Security and Privacy, SP 2009, pp. 251\u2013266. IEEE Computer Society, Washington, DC (2009)"}],"container-title":["Lecture Notes in Computer Science","Security Protocols XXI"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-41717-7_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T19:33:18Z","timestamp":1746041598000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-41717-7_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642417160","9783642417177"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-41717-7_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}