{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T04:15:41Z","timestamp":1746159341572,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642545245"},{"type":"electronic","value":"9783642545252"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-54525-2_37","type":"book-chapter","created":{"date-parts":[[2014,2,7]],"date-time":"2014-02-07T14:26:22Z","timestamp":1391783182000},"page":"416-427","source":"Crossref","is-referenced-by-count":4,"title":["Analysis of Electronic Voting Protocol Using Strand Space Model"],"prefix":"10.1007","author":[{"given":"Venkatasamy","family":"Sureshkumar","sequence":"first","affiliation":[]},{"given":"Ramalingam","family":"Anitha","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"37_CR1","doi-asserted-by":"crossref","unstructured":"Backes, M., Hritcu, C., Maffei, M.: Automated verification of remote electronic voting protocols in the applied pi-calculus. In: 21st IEEE Comp. Secur. Foundations Symposium, CSF 2008, pp. 195\u2013209 (2008)","DOI":"10.1109\/CSF.2008.26"},{"key":"37_CR2","doi-asserted-by":"crossref","unstructured":"Baskar, A., Ramanujam, R., Suresh, S.P.: Knowledge-based modelling of voting protocols. In: Proceedings of the 11th Conference on Theoretical Aspects of Rationality and Knowledge, pp. 62\u201371. ACM (2007)","DOI":"10.1145\/1324249.1324261"},{"key":"37_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/978-3-642-12980-3_11","volume-title":"Towards Trustworthy Elections","author":"B. Chevallier-Mames","year":"2010","unstructured":"Chevallier-Mames, B., Fouque, P.-A., Pointcheval, D., Stern, J., Traor\u00e9, J.: On some incompatible properties of voting schemes. In: Chaum, D., Jakobsson, M., Rivest, R.L., Ryan, P.Y.A., Benaloh, J., Kutylowski, M., Adida, B. (eds.) Towards Trustworthy Elections. LNCS, vol.\u00a06000, pp. 191\u2013199. Springer, Heidelberg (2010)"},{"issue":"4","key":"37_CR4","doi-asserted-by":"crossref","first-page":"435","DOI":"10.3233\/JCS-2009-0340","volume":"17","author":"S. Delaune","year":"2009","unstructured":"Delaune, S., Kremer, S., Ryan, M.: Verifying privacy-type properties of electronic voting protocols. J. Comp. Secur.\u00a017(4), 435\u2013487 (2009)","journal-title":"J. Comp. Secur."},{"key":"37_CR5","doi-asserted-by":"crossref","unstructured":"Delaune, S., Kremer, S., Ryan, M.: Coercion-resistance and receipt-freeness in electronic voting. In: Proceedings of the 19th IEEE Comp. Secur. Foundations Workshop, pp. 28\u201339. IEEE Comp. Soc. Press (2006)","DOI":"10.1109\/CSFW.2006.8"},{"key":"37_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1007\/3-540-57220-1_66","volume-title":"Advances in Cryptology - AUSCRYPT \u201992","author":"A. Fujioka","year":"1993","unstructured":"Fujioka, A., Okamoto, T., Ohta, K.: A Practical Secret Voting Scheme for Large Scale Elections. In: Zheng, Y., Seberry, J. (eds.) AUSCRYPT 1992. LNCS, vol.\u00a0718, pp. 244\u2013251. Springer, Heidelberg (1993)"},{"issue":"2","key":"37_CR7","doi-asserted-by":"crossref","first-page":"191","DOI":"10.3233\/JCS-1999-72-304","volume":"7","author":"F.J.T. F\u00e1brega","year":"1999","unstructured":"F\u00e1brega, F.J.T., Herzog, J.C., Guttman, J.D.: Strand spaces: Proving security protocols correct. J. Comp. Secur.\u00a07(2), 191\u2013230 (1999)","journal-title":"J. Comp. Secur."},{"key":"37_CR8","unstructured":"Jonker, H.L., Pieters, W.: Receipt-freeness as a special case of anonymity in epistemic logic. In: Proceedings of the IAVoSS Workshop on Trustworthy Elections (2006)"},{"issue":"2","key":"37_CR9","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1504\/IJGUC.2013.056248","volume":"4","author":"Y. Liu","year":"2013","unstructured":"Liu, Y.: Fairness analysis of e-commerce protocols based on strand spaces. International Journal of Grid and Utility Computing\u00a04(2), 128\u2013133 (2013)","journal-title":"International Journal of Grid and Utility Computing"},{"key":"37_CR10","doi-asserted-by":"crossref","unstructured":"Petrakos, N., Kotzanikolaou, P., Douligeris, C.: Using Strand Space Model to Verify the Privacy Properties of a Fair Anonymous Authentication Scheme. In: 16th Panhellenic Conference on Informatics, pp. 105\u2013110 (2012)","DOI":"10.1109\/PCi.2012.73"},{"key":"37_CR11","doi-asserted-by":"crossref","unstructured":"Zhang, L., Luo, J.: Formal analysis of anonymity based on strand space model. In: First IEEE International Conference on Ubi-Media Computing, pp. 75\u201381 (2008)","DOI":"10.1109\/UMEDIA.2008.4570869"},{"key":"37_CR12","unstructured":"Zuzana, R.: Electronic Voting Schemes. Master\u2019s thesis. Comenius University (2002)"}],"container-title":["Communications in Computer and Information Science","Recent Trends in Computer Networks and Distributed Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-54525-2_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T20:17:47Z","timestamp":1746130667000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-54525-2_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642545245","9783642545252"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-54525-2_37","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2014]]}}}