{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T23:08:38Z","timestamp":1743030518474,"version":"3.40.3"},"publisher-location":"Dordrecht","reference-count":36,"publisher":"Springer Netherlands","isbn-type":[{"type":"print","value":"9789048188642"},{"type":"electronic","value":"9789048188659"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-90-481-8865-9_9","type":"book-chapter","created":{"date-parts":[[2010,8,2]],"date-time":"2010-08-02T13:12:18Z","timestamp":1280754738000},"page":"157-175","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Verifiability of Electronic Voting: Between Confidence and Trust"],"prefix":"10.1007","author":[{"given":"Wolter","family":"Pieters","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,8,3]]},"reference":[{"issue":"1","key":"9_CR1","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/TDSC.2004.2","volume":"1","author":"A. Avi\u017eienis","year":"2004","unstructured":"Avi\u017eienis, A., J.C. Laprie, B. Randell, and C. Landwehr. 2004. Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions on Dependable and Secure Computing 1 (1), 11\u201333.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"9_CR2","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1007\/978-3-540-37621-7_17","volume-title":"Software security: Theories and systems","author":"F. Baiardi","year":"2004","unstructured":"Baiardi F., A. Falleni, R. Granchi, F. Martinelli, M. Petrocchi, and A. Vaccarelli. 2004. SEAS: A secure e-voting applet system. In Software security: Theories and systems, eds. K. Futatsugi, F. Mizoguchi, and N. Yonezaki, 318\u2013329. LNCS, vol. 3233. Berlin: Springer."},{"key":"9_CR3","doi-asserted-by":"publisher","first-page":"642","DOI":"10.1016\/j.cose.2005.07.008","volume":"24","author":"F. Baiardi","year":"2005","unstructured":"Baiardi F., A. Falleni, R. Granchi, F. Martinelli, M. Petrocchi, and A. Vaccarelli. 2005. SEAS, a secure e-voting protocol: Design and implementation. Computers & Security 24, 642\u2013652.","journal-title":"Computers & Security"},{"key":"9_CR4","volume-title":"Proceedings 26th ACM symposium on the theory of computing (STOC)","author":"J.C. Benaloh","year":"1994","unstructured":"Benaloh, J.C., and D. Tuinstra. 1994. Receipt-free secret ballot elections (extended abstract). In Proceedings 26th ACM symposium on the theory of computing (STOC), eds. J.C. Benaloh and D. Tuinstra, 544\u2013553. New York: ACM."},{"key":"9_CR5","volume-title":"Four concepts of liberty","author":"I. Berlin","year":"1969","unstructured":"Berlin, I. 1969. Four concepts of liberty. Oxford: Oxford Univ. Press (1958)."},{"issue":"2","key":"9_CR6","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1353\/lar.2004.0022","volume":"39","author":"V. Brusco","year":"2004","unstructured":"Brusco, V., M. Nazareno, and S.C. Stokes. 2004. Vote buying in Argentina. Latin American Research Review 39 (2), 66\u201388.","journal-title":"Latin American Research Review"},{"issue":"1","key":"9_CR7","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/MSECP.2004.1264852","volume":"2","author":"D. Chaum","year":"2004","unstructured":"Chaum, D. 2004. Secret-ballot receipts: True voter-verifiable elections. IEEE Security & Privacy 2 (1), 38\u201347.","journal-title":"IEEE Security & Privacy"},{"key":"9_CR8","doi-asserted-by":"crossref","DOI":"10.4324\/9780203466247","volume-title":"Theories of democracy: A critical introduction","author":"F. Cunningham","year":"2002","unstructured":"Cunningham, F. 2002. Theories of democracy: A critical introduction. London: Routledge."},{"issue":"1","key":"9_CR9","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MSECP.2004.1264850","volume":"2","author":"D. Evans","year":"2004","unstructured":"Evans, D., and N. Paul. 2004. Election security: Perception and reality. IEEE Security & Privacy 2 (1), 24\u201331 (January\/February 2004).","journal-title":"IEEE Security & Privacy"},{"key":"9_CR10","unstructured":"Hermans, L.M.L.H.A., and M.J.W. van Twist. 2007. Stemmachines: Een verweesd dossier. Rapport van de Commissie Besluitvorming Stemmachines, April 2007. Also available online at http:\/\/www.minbzk.nl\/contents\/pages\/86914\/rapportstemmachineseenverweesddossier.pdf. Consulted April 19, 2007."},{"key":"9_CR11","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1007\/978-1-4020-6914-7_2","volume-title":"Profiling the European citizen: Cross-disciplinary perspectives","author":"M. Hildebrandt","year":"2008","unstructured":"Hildebrandt, M. 2008. Defining profiling: A new type of knowledge? In Profiling the European citizen: Cross-disciplinary perspectives, eds. M. Hildebrandt and S. Gutwirth, 17\u201345. Berlin: Springer."},{"key":"9_CR12","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1007\/3-540-45539-6_38","volume-title":"Advances in cryptology EUROCRYPT 2000","author":"M. Hirt","year":"2000","unstructured":"Hirt, M., and K. Sako. 2000. Efficient receipt-free voting based on homomorphic encryption. In Advances in cryptology EUROCRYPT 2000, ed. B. Preneel, 539\u2013556. LNCS, vol. 1807. Berlin: Springer."},{"key":"9_CR13","first-page":"241","volume-title":"Algebraic methodology and software technology (AMAST\u201904)","author":"E. Hubbers","year":"2004","unstructured":"Hubbers, E., B. Jacobs, J. Kiniry, and M. Oostdijk. 2004. Counting votes with formal methods. In Algebraic methodology and software technology (AMAST\u201904), eds. C. Rattray, S. Maharaj, and C. Shankland, 241\u2013257. LNCS, vol. 3116. Berlin: Springer."},{"key":"9_CR14","unstructured":"Hubbers, E., B. Jacobs, and W. Pieters. 2005. RIES\u2014Internet voting in action. In Proceedings 29th annual international computer software and applications conference, COMPSAC\u201905, ed. R. Bilof, 417\u2013424. IEEE Computer Society, July 2005. ISBN 0-7695-2413-3."},{"key":"9_CR15","volume-title":"Technology and the lifeworld.","author":"D. Ihde","year":"1990","unstructured":"Ihde, D. 1990. Technology and the lifeworld. Bloomington: Indiana Univ. Press."},{"issue":"10","key":"9_CR16","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1145\/1022594.1022624","volume":"47","author":"D. Jefferson","year":"2004","unstructured":"Jefferson, D., A.D. Rubin, B. Simons, and D. Wagner. 2004. Analyzing internet voting security. Communications of the ACM 47 (10), 59\u201364.","journal-title":"Communications of the ACM"},{"issue":"2","key":"9_CR17","first-page":"47","volume":"1","author":"R. Joaquim","year":"2003","unstructured":"Joaquim, R., A. Z\u00faquete, and P. Ferreira. 2003. REVS: A robust electronic voting system. IADIS International Journal of WWW\/Internet 1 (2), 47\u201363.","journal-title":"IADIS International Journal of WWW\/Internet"},{"key":"9_CR18","doi-asserted-by":"crossref","unstructured":"Juels, A., D. Catalano, and M. Jakobsson. 2005. Coercion-resistant electronic elections. In Proceedings WPES\u201905. Alexandria: ACM.","DOI":"10.1145\/1102199.1102213"},{"key":"9_CR19","first-page":"337","volume-title":"AWCC 2002","author":"S. Kim","year":"2004","unstructured":"Kim, S., and H. Oh. 2004. A new universally verifiable and receipt-free electronic voting scheme using one-way unwappable channels. In AWCC 2002, eds. C.-H. Chi and K.-Y. Lam, 337\u2013345. LNCS, vol. 3309. Berlin: Springer."},{"key":"9_CR20","volume-title":"Trust and power: Two works by Niklas Luhmann","author":"N. Luhmann","year":"1979","unstructured":"Luhmann, N. 1979. Trust and power: Two works by Niklas Luhmann. Chichester: Wiley."},{"key":"9_CR21","volume-title":"Trust: Making and breaking of cooperative relations","author":"N. Luhmann","year":"1988","unstructured":"Luhmann, N. 1988. Familiarity, confidence, trust: Problems and alternatives. In Trust: Making and breaking of cooperative relations, ed. D. Gambetta. Oxford: Basil Blackwell."},{"key":"9_CR22","doi-asserted-by":"crossref","unstructured":"Malkhi, D., O. Margo, and E. Pavlov. 2002. E-voting without \u2018cryptography\u2019. In Financial cryptography\u201902, 1\u201315. Berlin: Springer.","DOI":"10.1007\/3-540-36504-4_1"},{"issue":"10","key":"9_CR23","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MSPEC.2002.1038569","volume":"39","author":"R.T. Mercuri","year":"2002","unstructured":"Mercuri, R.T. 2002. A better ballot box? IEEE Spectrum 39 (10), 26\u201350.","journal-title":"IEEE Spectrum"},{"key":"9_CR24","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1145\/501983.502000","volume-title":"Proceedings of the 8th ACM conference on computer and communications security","author":"C.A. Neff","year":"2001","unstructured":"Neff, C.A. 2001. A verifiable secret shuffle and its application to e-voting. In Proceedings of the 8th ACM conference on computer and communications security, ed. P. Samarati, 116\u2013125. New York: ACM."},{"key":"9_CR25","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1007\/3-540-44810-1_6","volume-title":"Security protocols: 8th international workshop, Cambridge, UK, April 3\u20135, 2000, revised papers","author":"P. Nikander","year":"2001","unstructured":"Nikander, P. 2001. Users and trust in cyberspace (transcript of discussion). In Security protocols: 8th international workshop, Cambridge, UK, April 3\u20135, 2000, revised papers, eds. B. Christianson, B. Crispo, J.A. Malcolm, and M. Roe, 36\u201342. LNCS, vol. 2133. Berlin: Springer."},{"key":"9_CR26","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1007\/3-540-44810-1_5","volume-title":"Security protocols: 8th international workshop, Cambridge, UK, April 3\u20135, 2000, revised papers","author":"P. Nikander","year":"2001","unstructured":"Nikander, P., and K. Karvonen. 2001. Users and trust in cyberspace. In Security protocols: 8th international workshop, Cambridge, UK, April 3\u20135, 2000, revised papers, eds. B. Christianson, B. Crispo, J.A. Malcolm, and M. Roe, 24\u201335. LNCS, vol. 2133. Berlin: Springer."},{"key":"9_CR27","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1007\/11755593_21","volume-title":"Trust management: 4th international conference (iTrust 2006), proceedings","author":"W. Pieters","year":"2006a","unstructured":"Pieters, W. 2006a. Acceptance of voting technology: Between confidence and trust. In Trust management: 4th international conference (iTrust 2006), proceedings, eds. K. St\u00f8len, W.H. Winsborough, F. Martinelli, and F. Massacci, 283\u2013297. LNCS, vol. 3986. Berlin: Springer."},{"key":"9_CR28","first-page":"33","volume-title":"Workshop on e-Voting and e-Government in the UK","author":"W. Pieters","year":"2006b","unstructured":"Pieters, W. 2006b. What proof do we prefer? Variants of verifiability in voting. In Workshop on e-Voting and e-Government in the UK, eds. P. Ryan, S. Anderson, T. Storer, I. Duncan, and J. Bryans, 33\u201339. Edinburgh: e-Science Institute, Univ. of St. Andrews (February 27\u201328)."},{"key":"9_CR29","unstructured":"Pieters, W. 2008. La volont\u00e9 machinale: Understanding the electronic voting controversy. PhD thesis, Radboud University Nijmegen, January 2008."},{"key":"9_CR30","first-page":"307","volume-title":"Ethics of new information technology: Proceedings sixth international conference on computer ethics: Philosophical enquiry (CEPE\u201905)","author":"W. Pieters","year":"2005","unstructured":"Pieters, W., and M. Becker. 2005. Ethics of e-voting: An essay on requirements and values in Internet elections. In Ethics of new information technology: Proceedings sixth international conference on computer ethics: Philosophical enquiry (CEPE\u201905), eds. P. Brey, F. Grodzinsky, and L. Introna, 307\u2013318. Enschede: Center for Telematics and Information Technology."},{"issue":"5","key":"9_CR31","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/MSP.2006.140","volume":"4","author":"B. Randell","year":"2006","unstructured":"Randell, B., and P.Y.A. Ryan. 2006. Voting technologies and trust. IEEE Security & Privacy 4 (5), 50\u201356.","journal-title":"IEEE Security & Privacy"},{"key":"9_CR32","doi-asserted-by":"publisher","DOI":"10.1057\/9781403977212","volume-title":"The history and politics of voting technology","author":"R.G. Saltman","year":"2006","unstructured":"Saltman, R.G. 2006. The history and politics of voting technology. New York: Palgrave Macmillan."},{"key":"9_CR33","unstructured":"Selker, T., and J. Goler. 2004. Security vulnerabilities and problems with VVPT. Caltech\/MIT Voting Technology Project, Working Paper 16, 2004. Also available online at http:\/\/www.vote.caltech.edu\/media\/documents\/wps\/vtp_wp16.pdf. Consulted February 10, 2006."},{"key":"9_CR34","first-page":"41","volume-title":"Proceedings of the second annual conference on privacy, security and trust","author":"T. Storer","year":"2004","unstructured":"Storer, T., and I. Duncan. 2004. Practical remote electronic elections for the UK. In Proceedings of the second annual conference on privacy, security and trust, ed. S. Marsh., 41\u201345. Canada: National Research Council Canada."},{"key":"9_CR35","volume-title":"What things do: Philosophical reflections on technology, agency, and design","author":"P.P.C.C. Verbeek","year":"2005","unstructured":"Verbeek, P.P.C.C. 2005. What things do: Philosophical reflections on technology, agency, and design. Pennsylvania: Pennsylvania State Univ. Press."},{"issue":"1","key":"9_CR36","first-page":"121","volume":"109","author":"L. Winner","year":"1980","unstructured":"Winner, L. 1980. Do artifacts have politics? Daedalus 109 (1), 121\u2013136.","journal-title":"Daedalus"}],"container-title":["Data Protection in a Profiled World"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-90-481-8865-9_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,11]],"date-time":"2024-07-11T10:47:23Z","timestamp":1720694843000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-90-481-8865-9_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9789048188642","9789048188659"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-90-481-8865-9_9","relation":{},"subject":[],"published":{"date-parts":[[2010]]},"assertion":[{"value":"3 August 2010","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}