{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T18:27:13Z","timestamp":1742927233666,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662639573"},{"type":"electronic","value":"9783662639580"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-662-63958-0_24","type":"book-chapter","created":{"date-parts":[[2021,9,16]],"date-time":"2021-09-16T14:04:04Z","timestamp":1631801044000},"page":"279-289","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["New Standards for E-Voting Systems: Reflections on Source Code Examinations"],"prefix":"10.1007","author":[{"given":"Thomas","family":"Haines","sequence":"first","affiliation":[]},{"given":"Peter","family":"Roenne","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,17]]},"reference":[{"key":"24_CR1","unstructured":"Adida, B.: Helios: web-based open-audit voting. In: van Oorschot, P.C., (ed.) USENIX Security Symposium, pp. 335\u2013348. USENIX Association (2008)"},{"key":"24_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1007\/978-3-030-51280-4_3","volume-title":"Financial Cryptography and Data Security","author":"P Gaudry","year":"2020","unstructured":"Gaudry, P., Golovnev, A.: Breaking the encryption scheme of the Moscow internet voting system. In: Bonneau, J., Heninger, N. (eds.) FC 2020. LNCS, vol. 12059, pp. 32\u201349. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-51280-4_3"},{"key":"24_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/978-3-030-60347-2_7","volume-title":"Electronic Voting","author":"R Haenni","year":"2020","unstructured":"Haenni, R., Dubuis, E., Koenig, R.E., Locher, P.: CHVote: sixteen best practices and\u00a0lessons learned. In: Krimmer, R., et al. (eds.) E-Vote-ID 2020. LNCS, vol. 12455, pp. 95\u2013111. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-60347-2_7"},{"key":"24_CR4","doi-asserted-by":"crossref","unstructured":"Haines, T., Gor\u00e9, R., Sharma, B.: Did you mix me? Formally verifying verifiable mix nets in voting. In: 2021 IEEE Symposium on Security and Privacy, SP 2021, San Jose, CA, USA, 23\u201327 May 2021. IEEE (2021)","DOI":"10.1109\/SP40001.2021.00033"},{"key":"24_CR5","doi-asserted-by":"crossref","unstructured":"Haines, T., Gor\u00e9, R., Tiwari, M.: Verified verifiers for verifying elections. In: ACM Conference on Computer and Communications Security, pp. 685\u2013702. ACM (2019)","DOI":"10.1145\/3319535.3354247"},{"key":"24_CR6","doi-asserted-by":"crossref","unstructured":"Haines, T., Jamie Lewis, S., Pereira, O., Teague, V.: How not to prove your election outcome. In: Oprea, A., Shacham, H. (eds.) 2020 IEEE Symposium on Security and Privacy, SP 2020, San Jose, CA, USA, 17\u201321 May 2020, pp. 784\u2013800. IEEE (2020)","DOI":"10.1109\/SP40000.2020.00048"},{"key":"24_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/978-3-319-22270-7_3","volume-title":"E-Voting and Identity","author":"JA Halderman","year":"2015","unstructured":"Halderman, J.A., Teague, V.: The New South Wales iVote system: security failures and verification flaws in a live online election. In: Haenni, R., Koenig, R.E., Wikstr\u00f6m, D. (eds.) VOTELID 2015. LNCS, vol. 9269, pp. 35\u201353. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-22270-7_3"},{"key":"24_CR8","doi-asserted-by":"crossref","unstructured":"Rivest, R.L.: On the notion of \u2019software independence\u2019 in voting systems. Philos. Trans. R. Soc. A Math. Phys. Eng. Sci. 366(1881), 3759\u20133767 (2008)","DOI":"10.1098\/rsta.2008.0149"},{"key":"24_CR9","doi-asserted-by":"crossref","unstructured":"Springall, D., et al.: Security analysis of the Estonian internet voting system. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 703\u2013715. ACM (2014)","DOI":"10.1145\/2660267.2660315"},{"key":"24_CR10","unstructured":"Specter, M., Halderman, J.: Security analysis of the democracy live online voting system (2020)"},{"key":"24_CR11","unstructured":"Specter, M.A., Koppel, J., Weitzner, D.J.: The ballot is busted before the blockchain: a security analysis of voatz, the first internet voting application used in U.S. federal elections. In: USENIX Security Symposium, pp. 1535\u20131553. USENIX Association (2020)"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security. FC 2021 International Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-63958-0_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,16]],"date-time":"2021-09-16T14:12:01Z","timestamp":1631801521000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-662-63958-0_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783662639573","9783662639580"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-63958-0_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"17 September 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"This paper contains praises and critiques of the actions taken by a number of different e-voting vendors. Our evaluations are given for the purpose of clarifying what ought to be done; these examples are not intended to single out any particular vendor nor to suggest that all vendors exhibit all the issues discussed.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclaimer"}},{"value":"FC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Financial Cryptography and Data Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 March 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 March 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fc2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/fc21.ifca.ai\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}