{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T22:14:54Z","timestamp":1757542494555},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642417160"},{"type":"electronic","value":"9783642417177"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-41717-7_8","type":"book-chapter","created":{"date-parts":[[2013,11,5]],"date-time":"2013-11-05T06:40:29Z","timestamp":1383633629000},"page":"54-65","source":"Crossref","is-referenced-by-count":6,"title":["Verifiable Postal Voting"],"prefix":"10.1007","author":[{"given":"Josh","family":"Benaloh","sequence":"first","affiliation":[]},{"given":"Peter Y. A.","family":"Ryan","sequence":"additional","affiliation":[]},{"given":"Vanessa","family":"Teague","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","unstructured":"Adida, B.: Helios: Web-based Open-Audit Voting (2008)"},{"key":"8_CR2","unstructured":"Benaloh, J., Byrne, M., Kortum, P., McBurnett, N., Pereira, O., Stark, P.B., Wallach, D.S.: Star-vote: A secure, transparent, auditable, and reliable voting system (2012)"},{"key":"8_CR3","unstructured":"Benaloh, J.: Simple verifiable elections. In: Proc. 1st USENIX Accurate Electronic Voting Technology Workshop (2006)"},{"key":"8_CR4","unstructured":"Benaloh, J., Jones, D., Lazarus, E., Lindeman, M., Stark, P.B.: Soba: Secrecy-preserving observable ballot-level audit. In: Proc. USENIX Accurate Electronic Voting Technology Workshop (2011)"},{"key":"8_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/3-540-69053-0_9","volume-title":"Advances in Cryptology - EUROCRYPT \u201997","author":"R. Cramer","year":"1997","unstructured":"Cramer, R., Gennaro, R., Schoenmakers, B.: A secure and optimally efficient multi-authority election scheme. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol.\u00a01233, pp. 103\u2013118. Springer, Heidelberg (1997)"},{"key":"8_CR6","unstructured":"Chaum, D.: SureVote: Technical Overview. In: Proceedings of the Workshop on Trustworthy Elections, WOTE 2001 (2001)"},{"key":"8_CR7","unstructured":"Gjsteen, K.: Analysis of an internet voting protocol. Cryptology ePrint Archive, Report 2010\/380 (2010), \n                  \n                    http:\/\/eprint.iacr.org\/"},{"key":"8_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1007\/978-3-642-15497-3_25","volume-title":"Computer Security \u2013 ESORICS 2010","author":"J. Heather","year":"2010","unstructured":"Heather, J., Ryan, P.Y.A., Teague, V.: Pretty good democracy for more expressive voting schemes. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol.\u00a06345, pp. 405\u2013423. Springer, Heidelberg (2010)"},{"key":"8_CR9","unstructured":"Jakobsson, M., Juels, A., Rivest, R.: Making Mix Nets Robust for Electronic Voting by Randomized Partial Checking. In: USENIX Security Symposium, pp. 339\u2013353 (2002)"},{"key":"8_CR10","unstructured":"Jones, D.W., Simons, B.: Broken Ballots: Will Your Vote Count? University of Chicago Press (2012)"},{"key":"8_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1698750.1698756","volume":"13","author":"T. Moran","year":"2010","unstructured":"Moran, T., Naor, M.: Split-ballot voting: Everlasting privacy with distributed trust. ACM Transactions on Information and System Security\u00a013, 16:1\u201316:43 (2010)","journal-title":"ACM Transactions on Information and System Security"},{"key":"8_CR12","doi-asserted-by":"crossref","unstructured":"Ryan, P.Y.A., Teague, V.: Pretty Good Deomcracy. In: Proceedings of the Seventeenth International Workshop on Security Protocols 2009 (2013)","DOI":"10.1007\/978-3-642-36213-2_15"},{"key":"8_CR13","unstructured":"Rosen, A., Ta-shma, A., Riva, B., Ben-Nun, J.(Y.): Wombat voting system"},{"key":"8_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1007\/3-540-49264-X_32","volume-title":"Advances in Cryptology - EUROCRYPT \u201995","author":"K. Sako","year":"1995","unstructured":"Sako, K., Kilian, J.: Receipt-free mix-type voting scheme. In: Guillou, L.C., Quisquater, J.-J. (eds.) EUROCRYPT 1995. LNCS, vol.\u00a0921, pp. 393\u2013403. Springer, Heidelberg (1995)"},{"key":"8_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1007\/978-3-642-38980-1_28","volume-title":"Applied Cryptography and Network Security","author":"F. Zag\u00f3rski","year":"2013","unstructured":"Zag\u00f3rski, F., Carback, R.T., Chaum, D., Clark, J., Essex, A., Vora, P.L.: Remotegrity: Design and use of an end-to-end verifiable remote voting system. In: Jacobson, M., Locasto, M., Mohassel, P., Safavi-Naini, R. (eds.) ACNS 2013. LNCS, vol.\u00a07954, pp. 441\u2013457. Springer, Heidelberg (2013)"}],"container-title":["Lecture Notes in Computer Science","Security Protocols XXI"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-41717-7_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,24]],"date-time":"2019-05-24T02:42:06Z","timestamp":1558665726000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-41717-7_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642417160","9783642417177"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-41717-7_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}