{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T17:26:16Z","timestamp":1725643576568},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540003878"},{"type":"electronic","value":"9783642555374"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-642-55537-4_41","type":"book-chapter","created":{"date-parts":[[2011,12,15]],"date-time":"2011-12-15T20:12:30Z","timestamp":1323979950000},"page":"253-258","source":"Crossref","is-referenced-by-count":0,"title":["Ein Algorithmus zur sicheren elektronischen Stimmabgabe \u00fcber das Internet"],"prefix":"10.1007","author":[{"given":"Alexander","family":"Prosser","sequence":"first","affiliation":[]},{"given":"Robert","family":"M\u00fcller-T\u00f6r\u00f6k","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"10","key":"41_CR1","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1016\/0167-4048(91)90081-N","volume":"36","author":"H Nurmi","year":"1991","unstructured":"H. Nurmi, A. Salomaa, L. Santean. Secret ballot elections in computer networks. Computers and Security 36 (10):553\u2013560, 1991.","journal-title":"Computers and Security"},{"key":"41_CR2","first-page":"234","volume":"86","author":"G Brassard","year":"1987","unstructured":"G. Brassard, C. Crepeau, J.-M. Robert. All-or-Nothing Disclosure of Secrets. Proceedings ofCRYPTO 86, Springer Verlag, 234\u2013238, 1987.","journal-title":"Springer Verlag"},{"key":"41_CR3","series-title":"New Results and New Trends in Computer Science","first-page":"283","volume-title":"Verifying and recasting secret ballots in computer networks","author":"A Salomaa","year":"1991","unstructured":"A. Salomaa. Verifying and recasting secret ballots in computer networks. New Results and New Trends in Computer Science. Springer-Verlag, Berlin, 283\u2013289,1991."},{"key":"41_CR4","first-page":"178","volume":"42","author":"A Salomaa","year":"1990","unstructured":"A. Salomaa, L. Santean. Secret Selling of Secrets with Several Buyers, EATCS Bulletin 42: 178\u2013186,1990.","journal-title":"EATCS Bulletin"},{"key":"41_CR5","series-title":"Advances in Cryptology-Crypto 86","volume-title":"Practical Solutions to identifications and signature problems","author":"A Fiat","year":"1987","unstructured":"A. Fiat, A. Shamir. How to prove yourself: Practical Solutions to identifications and signature problems. Advances in Cryptology - Crypto 86. SpringerVerlag, Berlin, 1987."},{"key":"41_CR6","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/BF00196725","volume":"4","author":"CP Schnorr","year":"1991","unstructured":"C.P. Schnorr. Efficient identification and signatures for smart cards. Journal ofCryptology (4):161\u2013174,1991.","journal-title":"Journal of Cryptology"},{"key":"41_CR7","volume-title":"Fundamentals of Cryptology","author":"HcA van Tilborg","year":"2000","unstructured":"H.c.A. van Tilborg. Fundamentals of Cryptology. Kluwers Academic Publishers, Boston, 316ff, 2000."},{"unstructured":"A. Prosser, R. Muller-Torok. E-Voting - eine neue Qualitiit im demokratischen EntscheidungsprozeB; akzeptiert durch Wirtschaftsinformatik.","key":"41_CR8"},{"key":"41_CR9","series-title":"Advances in Cryptology-AUSCRYPT92","first-page":"244","volume-title":"A Practical Secret Voting Scheme for Large Scale Elections","author":"A Fujioka","year":"1993","unstructured":"A. Fujioka, T. Okamoto, K. Ohta. A Practical Secret Voting Scheme for Large Scale Elections. Advances in CryptologyAUSCRYPT92. Springer-Verlag, Berlin 244\u2013251, 1993."},{"key":"41_CR10","first-page":"199","volume":"82","author":"D Chaum","year":"1982","unstructured":"D. Chaum: Blind Signatures for Untraceable Payments. D. Chaum, R.L. Rivest, A.T. Sherman. Advances in Cryptology, Proceedings of Crypto 82, 199\u2013203, 1982.","journal-title":"Advances in Cryptology, Proceedings of Crypto"},{"key":"41_CR11","series-title":"Proceedings of the Hawai International Conference on System Sciences (HICSS-97).Hawai","volume-title":"Sensus: A Security-Conscious Electronic Polling System for the Internet","author":"LF Cranor","year":"1997","unstructured":"L.F. Cranor, R.K. Cytron. Sensus: A Security-Conscious Electronic Polling System for the Internet. Proceedings of the Hawai International Conference on System Sciences (HICSS-97) Hawai, 1997 downloaded from\n\n                  http:\/\/lorrie.cranor.org\/pubs\/hicss\/hicss.html"},{"key":"41_CR12","series-title":"j\u2019d International Conference on Enterprise Information Systems, ICEIS.Setubal","first-page":"1061","volume-title":"Electronic Voting via The Internet","author":"A Prosser","year":"2001","unstructured":"A. Prosser, R. Muller-Torok: Electronic Voting via The Internet. j\u2019d International Conference on Enterprise Information Systems, ICEIS. Setubal, 1061\u20131066,2001."}],"container-title":["Operations Research Proceedings 2002"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-55537-4_41","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,22]],"date-time":"2019-04-22T03:04:06Z","timestamp":1555902246000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-55537-4_41"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540003878","9783642555374"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-55537-4_41","relation":{},"subject":[],"published":{"date-parts":[[2003]]}}}