{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T16:05:07Z","timestamp":1742918707866,"version":"3.40.3"},"publisher-location":"Dordrecht","reference-count":18,"publisher":"Springer Netherlands","isbn-type":[{"type":"print","value":"9789048136612"},{"type":"electronic","value":"9789048136629"}],"license":[{"start":{"date-parts":[[2009,12,12]],"date-time":"2009-12-12T00:00:00Z","timestamp":1260576000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2009,12,12]],"date-time":"2009-12-12T00:00:00Z","timestamp":1260576000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-90-481-3662-9_56","type":"book-chapter","created":{"date-parts":[[2010,1,30]],"date-time":"2010-01-30T11:23:45Z","timestamp":1264850625000},"page":"329-332","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Security Aspects of Internet based Voting"],"prefix":"10.1007","author":[{"given":"Abdul","family":"Based","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,12,12]]},"reference":[{"key":"56_CR1","unstructured":"T. Tj\u00f8stheim, T. Peacock, and P.Y. A. Ryan, \u2018\u2019A case study in system-based analysis: The Threeballot voting system and Pret a voter\u2019\u2019, VoComp, 2007."},{"key":"56_CR2","unstructured":"T. Tj\u00f8stheim, T. Peacock, and P.Y. A. Ryan, \u2018\u2019A model for system-based analysis of voting systems\u2019\u2019, Fifteenth International Workshop on Security Protocols, 2007."},{"key":"56_CR3","unstructured":"T. Tj\u00f8stheim and G. R\u00f8sland, \u2018\u2019Remote electronic voting using verifiable chain encryption\u2019\u2019, Frontiers in Electronic Elections, 2006."},{"key":"56_CR4","unstructured":"Web: http:\/\/www.gnu.org\/software\/free\/#TOCintroduction, January 20, 2007."},{"key":"56_CR5","unstructured":"Web: http:\/\/www.adderpit.com\/~sjaveed\/coding\/votebot.html, January 20, 2007."},{"key":"56_CR6","unstructured":"Web: http:\/\/www.electoralcommission.org.uk\/elections\/pilotsmay2006.cfm, February 05, 2007."},{"key":"56_CR7","unstructured":"Web: http:\/\/www.sos.cs.ru.nl\/research\/society\/voting\/, February 05, 2007."},{"key":"56_CR8","unstructured":"Web: http:\/\/www.foruminternet.org\/telechargement\/documents\/reco-evote-en-20030926.pdf, February 10, 2007."},{"key":"56_CR9","unstructured":"European University Institute, Robert Schuman center for Advanced Studies, Report for the Council of Europe: \u201cInternet Voting in the March 2007 Parliamentary Elections in Estonia\u201d, July 31, 2007."},{"key":"56_CR10","unstructured":"Norwegian Ministry of Local Government and regional Development, \u2018\u2019Report: Electronic voting- challenges and opportunities\u2019\u2019, February, 2006."},{"key":"56_CR11","unstructured":"Alessandro Acquisti, \u2018\u2019Receipt-free homomorphic elections and write-in ballots\u2019\u2019, Cryptology ePrint Archive, Report 2004\/105. http:\/\/eprint.iacr.org\/."},{"key":"56_CR12","doi-asserted-by":"crossref","unstructured":"Riza Aditya, Byoungcheon Lee, Colin Boyd, and Ed Dawson, \u2018\u2019An efficient mixnet-based voting scheme providing receipt-freeness\u2019\u2019. In Sokratis K. Katsikas, Javier Lopez, and Gunther Pernul, editors, TrustBus, volume 3184 of Lecture Notes in Computer Science, pages 152\u2013161. Springer, 2004.","DOI":"10.1007\/978-3-540-30079-3_16"},{"key":"56_CR13","doi-asserted-by":"crossref","unstructured":"Tatsuaki Okamoto,\u2019\u2019Receipt-free electronic voting schemes for large scale elections\u2019\u2019. In Bruce Christianson, Bruno Crispo, T. Mark A. Lomas, and Michael Roe, editors, Security Protocols Workshop, volume 1361 of Lecture Notes in Computer Science, pages 25\u201335. Springer 1997.","DOI":"10.1007\/BFb0028157"},{"key":"56_CR14","doi-asserted-by":"crossref","unstructured":"Berry Schoenmakers, \u2018\u2019A simple publicly verifiable secret sharing scheme and its application to electronic voting\u2019\u2019. In Michael J. Wiener, editor, CRYPTO, volume 1666 of Lecture Notes in Computer Science, pages 148\u2013164. Springer, 1999.","DOI":"10.1007\/3-540-48405-1_10"},{"key":"56_CR15","unstructured":"David Chaum, Jeron van de Graaf, Peter Y. A. Ryan, Poorvi L. Vora, \u201cHigh Integrity Elections\u201d. Cryptology ePrint Archive, Report 2007\/270. http:\/\/eprint.iacr.org\/."},{"key":"56_CR16","unstructured":"Jens-Matthias Bohli, Jorn Muller-Quade, and Stefan Rohrich, \u201cBingo Voting: Secure and coercion-free voting using a trusted random number generator\u201d. Cryptology ePrint Archive, Report 2007\/162. http:\/\/eprint.iacr.org\/."},{"key":"56_CR17","doi-asserted-by":"crossref","unstructured":"Jeroen van de Graaf, Universidade Federal de Minas Gerais, \u201cMerging Pret-a-Voter and PunchScan\u201d. Cryptology ePrint Archive, Report 2007\/269. http:\/\/eprint.iacr.org\/.","DOI":"10.5753\/sbseg.2007.20934"},{"key":"56_CR18","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1016\/S0736-5853(03)00017-0","volume":"20","author":"C. Bouras","year":"2003","unstructured":"C. Bouras, N. Katris, V. Triantafillou, \u2019\u2019An electronic voting service to support decision-making in local government\u2019\u2019, Telematics and Informatics 20 (2003) 255\u2013274, February 12, 2003.","journal-title":"Telematics and Informatics"}],"container-title":["Novel Algorithms and Techniques in Telecommunications and Networking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-90-481-3662-9_56","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,18]],"date-time":"2023-02-18T03:02:23Z","timestamp":1676689343000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-90-481-3662-9_56"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,12,12]]},"ISBN":["9789048136612","9789048136629"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-90-481-3662-9_56","relation":{},"subject":[],"published":{"date-parts":[[2009,12,12]]},"assertion":[{"value":"12 December 2009","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}