{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T07:28:36Z","timestamp":1743146916117,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":30,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662639573"},{"type":"electronic","value":"9783662639580"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-662-63958-0_23","type":"book-chapter","created":{"date-parts":[[2021,9,16]],"date-time":"2021-09-16T14:04:04Z","timestamp":1631801044000},"page":"263-278","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Mobile Voting \u2013 Still Too Risky?"],"prefix":"10.1007","author":[{"given":"Sven","family":"Heiberg","sequence":"first","affiliation":[]},{"given":"Kristjan","family":"Krips","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6290-2099","authenticated-orcid":false,"given":"Jan","family":"Willemson","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,17]]},"reference":[{"key":"23_CR1","unstructured":"Abdalla, M., et al.: Algorithms, key size and protocols report. Tech. rep. ECRYPT CSA (2018). https:\/\/www.ecrypt.eu.org\/csa\/documents\/D5.4-FinalAlgKeySizeProt.pdf"},{"key":"23_CR2","first-page":"35","volume":"2018","author":"A Cardillo","year":"2018","unstructured":"Cardillo, A., Essex, A.: The threat of SSL\/TLS stripping to online voting. Proc. E-Vote-ID 2018, 35\u201350 (2018)","journal-title":"Proc. E-Vote-ID"},{"key":"23_CR3","doi-asserted-by":"crossref","unstructured":"Cetinkaya, O.: Analysis of security requirements for cryptographic voting protocols (extended abstract). In: Proceedings ARES 2008, pp. 1451\u20131456. IEEE Computer Society (2008)","DOI":"10.1109\/ARES.2008.167"},{"key":"23_CR4","unstructured":"Corbet, S.: France Holds Local Elections Despite COVID-19 Outbreak Fears. Time, March 2020. https:\/\/time.com\/5803469\/france-local-elections-coronavirus\/"},{"key":"23_CR5","doi-asserted-by":"crossref","unstructured":"Durumeric, Z., et al.: The security impact of HTTPS interception. In: Proceedings of NDSS 2017. The Internet Society (2017)","DOI":"10.14722\/ndss.2017.23456"},{"key":"23_CR6","doi-asserted-by":"crossref","unstructured":"Eilu, E., Baguma, R.: Designing reality Fit M-voting. In: Proceedings of the 7th International Conference on Theory and Practice of Electronic Governance. ICEGOV 2013, pp. 326\u2013329. ACM (2013)","DOI":"10.1145\/2591888.2591946"},{"issue":"2","key":"23_CR7","doi-asserted-by":"publisher","first-page":"111","DOI":"10.3923\/ajit.2010.111.116","volume":"9","author":"UO Ekong","year":"2010","unstructured":"Ekong, U.O., Ekong, V.: M-voting: a panacea for enhanced e-participation. Asian J. Inf. Technol. 9(2), 111\u2013116 (2010)","journal-title":"Asian J. Inf. Technol."},{"key":"23_CR8","unstructured":"Felt, A.P., et al.: Rethinking connection security indicators. In: Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), Denver, CO, pp. 1\u201314. USENIX Association, June 2016. https:\/\/www.usenix.org\/conference\/soups2016\/technical-sessions\/presentation\/porter-felt"},{"key":"23_CR9","doi-asserted-by":"crossref","unstructured":"Gamba, J., Rashed, M., Razaghpanah, A., Tapiador, J., Vallina-Rodriguez, N.: An analysis of pre-installed android software. In: 2020 IEEE Symposium on Security and Privacy (SP), pp. 197\u2013213, May 2020","DOI":"10.1109\/SP40000.2020.00013"},{"key":"23_CR10","doi-asserted-by":"crossref","unstructured":"Heiberg, S., Willemson, J.: Modeling threats of a voting method. In: Design, Development, and Use of Secure Electronic Voting Systems, pp. 128\u2013148. IGI Global (2014)","DOI":"10.4018\/978-1-4666-5820-2.ch007"},{"key":"23_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1007\/978-3-540-77493-8_15","volume-title":"E-Voting and Identity","author":"J Helbach","year":"2007","unstructured":"Helbach, J., Schwenk, J.: Secure internet voting with code sheets. In: Alkassar, A., Volkamer, M. (eds.) Vote-ID 2007. LNCS, vol. 4896, pp. 166\u2013177. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-77493-8_15"},{"issue":"2","key":"23_CR12","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1111\/j.1467-9256.2008.00314.x","volume":"28","author":"H Hermanns","year":"2008","unstructured":"Hermanns, H.: Mobile democracy: mobile phones as democratic tools. Politics 28(2), 74\u201382 (2008)","journal-title":"Politics"},{"key":"23_CR13","first-page":"349","volume":"2016","author":"M Ikram","year":"2016","unstructured":"Ikram, M., Vallina-Rodriguez, N., Seneviratne, S., K\u00e2afar, M.A., Paxson, V.: An analysis of the privacy and security risks of android VPN permission-enabled apps. Proc. IMC 2016, 349\u2013364 (2016)","journal-title":"Proc. IMC"},{"key":"23_CR14","doi-asserted-by":"crossref","unstructured":"Kellner, A., Horlboge, M., Rieck, K., Wressnegger, C.: False sense of security: a study on the effectivity of jailbreak detection in banking apps. In: Proceedings of IEEE EuroS&P 2019, pp. 1\u201314. IEEE (2019)","DOI":"10.1109\/EuroSP.2019.00011"},{"key":"23_CR15","unstructured":"Kogeda, O.P., Mpekoa, N.: Model for a mobile phone voting system for South Africa. In: Proceedings of 15th Annual Conference on World Wide Web Applications, Cape Town, South Africa (2013)"},{"key":"23_CR16","doi-asserted-by":"crossref","unstructured":"Kondracki, B., Aliyeva, A., Egele, M., Polakis, J., Nikiforakis, N.: Meddling middlemen: empirical analysis of the risks of data-saving mobile browsers. In: 2020 IEEE S&P, pp. 1678\u20131692. IEEE, May 2020","DOI":"10.1109\/SP40000.2020.00077"},{"key":"23_CR17","unstructured":"Krimmer, R.: The evolution of e-voting: why voting technology is used and how it affects democracy. Ph.D. thesis, Tallinn University of Technology (2012)"},{"key":"23_CR18","doi-asserted-by":"crossref","unstructured":"Leith, D.J.: Web browser privacy: what do browsers say when they phone home? (2020), SCSS Technical Report, 24th February 2020","DOI":"10.1109\/ACCESS.2021.3065243"},{"key":"23_CR19","doi-asserted-by":"crossref","unstructured":"Luo, M., Laperdrix, P., Honarmand, N., Nikiforakis, N.: Time does not heal all wounds: a longitudinal analysis of security-mechanism support in mobile browsers. In: Proceedings of NDSS 2019. The Internet Society (2019)","DOI":"10.14722\/ndss.2019.23149"},{"key":"23_CR20","doi-asserted-by":"crossref","unstructured":"Luo, M., Starov, O., Honarmand, N., Nikiforakis, N.: Hindsight: understanding the evolution of UI vulnerabilities in mobile browsers. In: Proceedings of the 2017 ACM CCS, CCS 2017, pp. 149\u2013162. ACM (2017)","DOI":"10.1145\/3133956.3133987"},{"key":"23_CR21","doi-asserted-by":"crossref","unstructured":"Mitrou, L., Gritzalis, D., Katsikas, S.K.: Revisiting legal and regulatory requirements for secure e-voting. In: Ghonaimy, A., El-Hadidi, M.T., Aslan, H.K. (eds.) Security in the Information Society: Visions and Perspectives, IFIP TC11 17$${}^{\\text{th}}$$ International Conference on Information Security (SEC2002), 7\u20139 May 2002, Cairo, Egypt. IFIP Conference Proceedings, vol. 214, pp. 469\u2013480. Kluwer (2002)","DOI":"10.1007\/978-0-387-35586-3_37"},{"key":"23_CR22","doi-asserted-by":"crossref","unstructured":"Rajasegaran, J., Karunanayake, N., Gunathillake, A., Seneviratne, S., Jourjon, G.: A multi-modal neural embeddings approach for detecting mobile counterfeit apps. In: The World Wide Web Conference, WWW 2019, San Francisco, CA, USA, 13\u201317 May 2019, pp. 3165\u20133171. ACM (2019)","DOI":"10.1145\/3308558.3313427"},{"key":"23_CR23","unstructured":"Reis, C., Moshchuk, A., Oskov, N.: Site isolation: process separation for web sites within the browser. In: 28th USENIX Security Symposium (USENIX Security 19), Santa Clara, CA, pp. 1661\u20131678. USENIX Association, August 2019. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/reis"},{"key":"23_CR24","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/978-3-030-05918-7_21","volume-title":"Mining Intelligence and Knowledge Exploration","author":"D Salvador","year":"2018","unstructured":"Salvador, D., Cucurull, J., Juli\u00e0, P.: wraudit: a tool to transparently monitor web resources\u2019 integrity. In: Groza, A., Prasath, R. (eds.) MIKE 2018. LNCS (LNAI), vol. 11308, pp. 239\u2013247. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-05918-7_21"},{"key":"23_CR25","doi-asserted-by":"crossref","unstructured":"Schryen, G.: Security aspects of internet voting. In: 37th Hawaii International Conference on System Sciences (HICSS-37 2004), CD-ROM\/Abstracts Proceedings, 5\u20138 January 2004, Big Island, HI, USA. IEEE Computer Society (2004)","DOI":"10.1109\/HICSS.2004.1265298"},{"key":"23_CR26","doi-asserted-by":"crossref","unstructured":"Scoccia, G.L., Kanj, I., Malavolta, I., Razavi, K.: Leave my apps alone! a study on how android developers access installed apps on user\u2019s device. In: Proceedings of the 7th IEEE\/ACM International Conference on Mobile Software Engineering and Systems (2020). http:\/\/www.ivanomalavolta.com\/files\/papers\/MOBILESoft_iam_2020.pdf","DOI":"10.1145\/3387905.3388594"},{"key":"23_CR27","unstructured":"Shapshak, T.: Africa not just a mobile-first continent - it\u2019s mobile only (2012), CNN Business. https:\/\/edition.cnn.com\/2012\/10\/04\/tech\/mobile\/africa-mobile-opinion\/index.html"},{"key":"23_CR28","unstructured":"Specter, M.A., Koppel, J., Weitzner, D.: The Ballot is Busted Before the Blockchain: A Security Analysis of Voatz, the First Internet Voting Application Used in US Federal Elections (2020)"},{"key":"23_CR29","doi-asserted-by":"crossref","unstructured":"Thiel, D.: iOS Application Security: The Definitive Guide for Hackers and Developers. No Starch Press (2016). https:\/\/nostarch.com\/iossecurity","DOI":"10.1016\/S1353-4858(16)30015-0"},{"key":"23_CR30","first-page":"593","volume":"27","author":"K Yoshida","year":"2019","unstructured":"Yoshida, K., Imai, H., Serizawa, N., Mori, T., Kanaoka, A.: Understanding the origins of weak cryptographic algorithms used for signing android apps. J. Inf. Process. 27, 593\u2013602 (2019)","journal-title":"J. Inf. Process."}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security. FC 2021 International Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-63958-0_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,16]],"date-time":"2021-09-16T14:09:45Z","timestamp":1631801385000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-662-63958-0_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783662639573","9783662639580"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-63958-0_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"17 September 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Financial Cryptography and Data Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 March 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 March 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fc2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/fc21.ifca.ai\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}