{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T15:56:47Z","timestamp":1743091007123,"version":"3.40.3"},"publisher-location":"Dordrecht","reference-count":17,"publisher":"Springer Netherlands","isbn-type":[{"type":"print","value":"9789048188642"},{"type":"electronic","value":"9789048188659"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-90-481-8865-9_10","type":"book-chapter","created":{"date-parts":[[2010,8,2]],"date-time":"2010-08-02T13:12:18Z","timestamp":1280754738000},"page":"177-189","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Electronic Voting in Germany"],"prefix":"10.1007","author":[{"given":"Melanie","family":"Volkamer","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,8,3]]},"reference":[{"key":"10_CR1","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1007\/978-3-540-77493-8_8","volume-title":"E-Voting and identity: First international conference","author":"J. Arzt-Mergemeier","year":"2007","unstructured":"Arzt-Mergemeier, J., W. Beiss, and T. Steffens. 2007. The digital voting pen at the hamburg elections 2008: Electronic voting closest to conventional voting. In E-Voting and identity: First international conference, 88\u201398, VOTE-ID 2007. LNCS, vol. 4896. Berlin: Springer."},{"key":"10_CR2","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1007\/978-3-540-77493-8_10","volume-title":"E-Voting and identity: First international conference","author":"J.-M. Bohli","year":"2007","unstructured":"Bohli, J.-M., J. M\u00fcller-Quade, and S. R\u00f6hrich. 2007. Bingo voting: Secure and coercion-free voting using a trusted random number generator. In E-Voting and identity: First international conference, 111\u2013124, VOTE-ID 2007. LNCS, vol. 4896. Berlin: Springer."},{"key":"10_CR3","unstructured":"Bundesverfassungsgerichts. 2009. Zweiter Senat des Bundesverfassungsgerichts: Urteil in den Verfahren \u00fcber die Wahlpr\u00fcfungsbeschwerden. http:\/\/www.bundesverfassungsgericht.de\/entscheidungen\/cs20090303_2bvc000307.html."},{"key":"10_CR4","unstructured":"Bundesverfassungsgerichts: Press. 2009. Zweiter Senat des Bundesverfassungsgerichts: Press Office: Federal Constitutional Court. http:\/\/www.bundesverfassungsgericht.de\/pressemitteilungen\/bvg09-019en.html."},{"key":"10_CR5","unstructured":"Bundeswahlger\u00e4teverordnung. 1999. Verordnung \u00fcber den Einsatz von Wahlger\u00e4ten bei Wahlen zum Deutschen Bundestag und der Abgeordneten des Europ\u00e4ischen Parlaments aus der Bundesrepublik Deutschland (Bundeswahlger\u00e4teverordnung), 1975. BGBl I 1975, 2459, Zuletzt ge\u00e4ndert durch Art. 1\u00a0V v. 20. 4.1999 I 749."},{"key":"10_CR6","unstructured":"Common Criteria. 2006. Common criteria for information technology security evaluation. Version 3.1. http:\/\/www.commoncriteriaportal.org\/thecc.html."},{"key":"10_CR7","unstructured":"Deutsche Bundestag. 2006. Wahlpr\u00fcfungsausschuss des Deutsche Bundestag: Dritte Beschlussempfehlung des Wahlpr\u00fcfungsausschusses zu 44 gegen die G\u00fcltigkeit der Wahl zum 16. Deutschen Bundestag eingegangenen Wahleinspr\u00fcchen; Drucksache 16\/3600. http:\/\/dip21.bundestag.de\/dip21\/btd\/16\/036\/1603600.pdf."},{"key":"10_CR8","unstructured":"Gesellschaft f\u00fcr Informatik. 2005. Online-Wahlen Expertengruppe der Gesellschaft f\u00fcr Informatik. GI-Anforderungen an Internetbasierte Vereinswahlen. http:\/\/www.gi-ev.de\/fileadmin\/redaktion\/Wahlen\/GI-Anforderungen_Vereinswahlen.pdf."},{"key":"10_CR9","unstructured":"Hartmann, V., N. Meissner, and D. Richter. 2004. Online voting systems for non-parliamentary elections: Catalogue of requirements. Laborbericht PTB-8.5-2004-1, Physikalisch-Technische Bundesanstalt Braunscheig und Berlin (Fachbereich Metrologische Informationstechnik). http:\/\/ib.ptb.de\/8\/85\/LB8_5_2004_1AnfKat.pdf."},{"key":"10_CR10","unstructured":"Langer, L., and A. Schmidt. 2009. Abschlussbericht zum Projekt voteremote: Online-Wahlen au\u00dferhalb von Wahllokalen (Teilvorhaben Sicherheitsanalyse); F\u00f6rderkennzeichen 01 MS 06 002."},{"key":"10_CR11","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1007\/978-3-540-77493-8_6","volume-title":"E-voting and identity: First international conference","author":"K. Reinhard","year":"2007","unstructured":"Reinhard, K., and W. Jung. 2007. Compliance of POLYAS with the BSI protection profile: Basic requirements for remote electronic voting systems. In E-voting and identity: First international conference, 62\u201375, VOTE-ID 2007. LNCS, vol. 4896. Berlin: Springer."},{"key":"10_CR12","unstructured":"Unabh\u00e4ngigen Landeszentrum f\u00fcr Datenschutz. 2002. Unabh\u00e4ngigen Landeszentrum f\u00fcr Datenschutz Schleswig-Holstein: Seal of privacy for IT-products and privacy protection audit for public authorities. https:\/\/www.datenschutzzentrum.de\/download\/audsieen.pdf."},{"key":"10_CR13","unstructured":"Volkamer, M., and R. Vogt. 2006a. Digitales Wahlstift-System. Common Criteria Protection Profile BSI-PP-0031. http:\/\/www.bsi.de\/zertifiz\/zert\/reporte\/PP0031b.pdf."},{"key":"10_CR14","unstructured":"Volkamer, M., and R. Vogt. 2006b. New generation of voting machines in Germany The Hamburg way to verify correctness. In Proceedings of the frontiers in electronic elections workshop\u2014FEE\u201906. http:\/\/fee.iavoss.org\/2006\/papers\/fee-2006-iavoss-New-Generation-of-Voting-Machines-in-Germany.pdf."},{"key":"10_CR15","unstructured":"Volkamer, M., and R. Vogt. 2008. Basis set of security requirements for Online Voting Products. Commom Criteria Protection Profile BSI-CC-PP-0037. http:\/\/www.bsi.de\/zertifiz\/zert\/reporte\/pp0037b_engl.pdf."},{"key":"10_CR16","unstructured":"Volkamer, M., G. Schryen, L. Langer, A. Schmidt, and J. Buchmann. 2009. Elektronische Wahlen Verifizierung vs. Zertifizierung. In proceedings of Informatik 2009, volume 154 of LNI, pages 1827\u20131836."},{"key":"10_CR17","unstructured":"Wahlgvo. 2006. Richtlinien f\u00fcr den Einsatz des Digitalen Wahlstift-Systems bei Wahlen zur Hamburgischen B\u00fcrgerschaft und Wahlen zu den Bezirksversammlungen. http:\/\/www.hamburg.de\/contentblob\/260056\/data\/richtlinie.pdf."}],"container-title":["Data Protection in a Profiled World"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-90-481-8865-9_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,11]],"date-time":"2024-07-11T10:48:13Z","timestamp":1720694893000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-90-481-8865-9_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9789048188642","9789048188659"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-90-481-8865-9_10","relation":{},"subject":[],"published":{"date-parts":[[2010]]},"assertion":[{"value":"3 August 2010","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}