{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T05:38:19Z","timestamp":1773293899146,"version":"3.50.1"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2013,5,18]],"date-time":"2013-05-18T00:00:00Z","timestamp":1368835200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Electron Commer Res"],"published-print":{"date-parts":[[2013,9]]},"DOI":"10.1007\/s10660-013-9120-5","type":"journal-article","created":{"date-parts":[[2013,5,17]],"date-time":"2013-05-17T14:39:17Z","timestamp":1368801557000},"page":"257-272","source":"Crossref","is-referenced-by-count":20,"title":["Enhanced security in internet voting protocol using blind signature and dynamic ballots"],"prefix":"10.1007","volume":"13","author":[{"given":"Thi Ai Thao","family":"Nguyen","sequence":"first","affiliation":[]},{"given":"Tran Khanh","family":"Dang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,5,18]]},"reference":[{"key":"9120_CR1","unstructured":"Acquisti, A. (2004). Receipt-free homomorphic elections and write-in voter verified ballots (ISRI Technical report CMU-ISRI-04-116). Carnegie Mellon University, PA."},{"key":"9120_CR2","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"278","DOI":"10.1007\/978-3-642-17619-7_20","volume-title":"Cryptology and network security (CANS 2010)","author":"R. Ara\u00fajo","year":"2010","unstructured":"Ara\u00fajo, R., Rajeb, N.B., Robbana, R., Traor\u00e9, J., & Youssfi, S. (2010). Towards practical and secure coercion-resistant electronic election. In S. H. Heng, R. N. Wright, & B. M. Goi (Eds.), LNCS: Vol.\u00a06467. Cryptology and network security (CANS 2010) (pp. 278\u2013297). Heidelberg: Springer."},{"key":"9120_CR3","doi-asserted-by":"crossref","first-page":"274","DOI":"10.1145\/383962.384044","volume-title":"Proceedings of the twentieth annual ACM symposium on principles of distributed computing","author":"O. Baudron","year":"2001","unstructured":"Baudron, O., Fouque, P. A., Pointcheval, D., Stern, J., & Poupard, G. (2001). Practical multi-candidate election system. In Proceedings of the twentieth annual ACM symposium on principles of distributed computing (pp. 274\u2013283). New York: ACM."},{"issue":"1","key":"9120_CR4","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1007\/s10660-008-9013-1","volume":"8","author":"P. G. Bradford","year":"2008","unstructured":"Bradford, P. G., Park, S., Rothkopf, M. H., & Park, H. (2008). Protocol completion incentive problems in cryptographic Vickrey auctions. Electronic Commerce Research, 8(1), 57\u201377.","journal-title":"Electronic Commerce Research"},{"key":"9120_CR5","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1007\/978-1-4615-0239-5_5","volume-title":"Secure electronic voting","author":"M. Burmester","year":"2003","unstructured":"Burmester, M., & Magkos, E. (2003). Towards secure and practical e-elections in the new era. In Secure electronic voting (Vol.\u00a07, pp. 63\u201376)."},{"key":"9120_CR6","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1007\/11535218_11","volume-title":"Advances in cryptology\u2013CRYPTO 2005","author":"J. Camenisch","year":"2005","unstructured":"Camenisch, J., & Lysyanskaya, A. (2005). A formal treatment of onion routing. In Advances in cryptology\u2013CRYPTO 2005 (pp. 169\u2013187). Berlin: Springer."},{"key":"9120_CR7","volume-title":"Proceedings of the 2nd national cryptology symposium","author":"O. Cetinkaya","year":"2006","unstructured":"Cetinkaya, O., & Doganaksoy, A. (2006). A practical privacy preserving e-voting protocol using dynamic ballots. In Proceedings of the 2nd national cryptology symposium, Ankara, Turkey."},{"key":"9120_CR8","first-page":"432","volume-title":"Proceedings of availability, reliability and security 2007 (ARES 2007)","author":"O. Cetinkaya","year":"2007","unstructured":"Cetinkaya, O., & Doganaksoy, A. (2007). A practical verifiable e-voting protocol for large scale elections over a network. In Proceedings of availability, reliability and security 2007 (ARES 2007), Vienna (pp. 432\u2013442)."},{"issue":"2","key":"9120_CR9","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"D. Chaum","year":"1981","unstructured":"Chaum, D. (1981). Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24(2), 84\u201388.","journal-title":"Communications of the ACM"},{"key":"9120_CR10","first-page":"199","volume-title":"Advances in cryptology: proceedings of crypto","author":"D. Chaum","year":"1982","unstructured":"Chaum, D. (1982). Blind signatures for untraceable payments. In Advances in cryptology: proceedings of crypto (Vol.\u00a082, pp. 199\u2013203)."},{"issue":"5","key":"9120_CR11","doi-asserted-by":"crossref","first-page":"481","DOI":"10.1002\/ett.4460080506","volume":"8","author":"R. Cramer","year":"1997","unstructured":"Cramer, R., Gennaro, R., & Schoenmakers, B. (1997). A secure and optimally efficient multi-authority election scheme. European Transactions on Telecommunications, 8(5), 481\u2013490.","journal-title":"European Transactions on Telecommunications"},{"key":"9120_CR12","doi-asserted-by":"crossref","first-page":"244","DOI":"10.1007\/3-540-57220-1_66","volume-title":"Advances in cryptology\u2014AUSCRYPT\u201992","author":"A. Fujioka","year":"1993","unstructured":"Fujioka, A., Okamoto, T., & Ohta, K. (1993). A practical secret voting scheme for large scale elections. In Advances in cryptology\u2014AUSCRYPT\u201992 (pp. 244\u2013251). Berlin: Springer."},{"issue":"2","key":"9120_CR13","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1145\/293411.293443","volume":"42","author":"D. Goldschlag","year":"1999","unstructured":"Goldschlag, D., Reed, M., & Syverson, P. (1999). Onion routing for anonymous and private communications. Communications of the ACM, 42(2), 39\u201341.","journal-title":"Communications of the ACM"},{"key":"9120_CR14","volume-title":"International conference on business and information","author":"M. S. Hasan","year":"2008","unstructured":"Hasan, M. S. (2008). E-voting scheme over Internet. In International conference on business and information, Seoul, South Korea."},{"key":"9120_CR15","first-page":"162","volume-title":"Proceedings of the 6th international conference on the theory and application of cryptography and information security: advances in cryptography","author":"M. Jakobsson","year":"2000","unstructured":"Jakobsson, M., & Juels, A. (2000). Mix and match: secure function evaluation via ciphertexts. In Proceedings of the 6th international conference on the theory and application of cryptography and information security: advances in cryptography (pp. 162\u2013177). London: Springer."},{"issue":"6","key":"9120_CR16","doi-asserted-by":"crossref","first-page":"672","DOI":"10.1093\/comjnl\/45.6.672","volume":"45","author":"W. S. Juang","year":"2002","unstructured":"Juang, W. S., Lei, C. L., & Liaw, H. T. (2002). A verifiable multi-authority secret election allowing abstention from voting. Computer Journal, 45(6), 672\u2013682.","journal-title":"Computer Journal"},{"key":"9120_CR17","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1145\/1102199.1102213","volume-title":"Proceedings of the 2005 ACM workshop on privacy in the electronic society","author":"A. Juels","year":"2005","unstructured":"Juels, A., Catalano, D., & Jakobsson, M. (2005). Coercion-resistant electronic elections. In Proceedings of the 2005 ACM workshop on privacy in the electronic society (pp. 61\u201370). New York: ACM."},{"key":"9120_CR18","first-page":"67","volume-title":"Cryptography","author":"R. D. Kohel","year":"2010","unstructured":"Kohel, R. D. (2010). Public key cryptography. In Cryptography (pp.\u00a067\u201374)."},{"issue":"2","key":"9120_CR19","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1016\/j.cose.2004.01.007","volume":"23","author":"H. T. Liaw","year":"2004","unstructured":"Liaw, H. T. (2004). A secure electronic voting protocol for general elections. Computers & Security, 23(2), 107\u2013119.","journal-title":"Computers & Security"},{"key":"9120_CR20","doi-asserted-by":"crossref","first-page":"934","DOI":"10.3923\/itj.2009.934.964","volume":"8(7)","author":"B. Meng","year":"2009","unstructured":"Meng, B. (2009). A critical review of receipt-freeness and coercion-resistance. Information Technology Journal, 8(7), 934\u2013964. ISSN 1812-5638","journal-title":"Information Technology Journal"},{"key":"9120_CR21","first-page":"46","volume-title":"Proceedings of the 4th regional conference on information and communication technology","author":"T. A. T. Nguyen","year":"2011","unstructured":"Nguyen, T. A. T., & Dang, T. K. (2011). Preserving privacy in electronic voting. In Proceedings of the 4th regional conference on information and communication technology, Ho Chi Minh City, Vietnam (pp. 46\u201355)."},{"issue":"3","key":"9120_CR22","doi-asserted-by":"crossref","first-page":"363","DOI":"10.1007\/s10660-010-9060-2","volume":"10","author":"A. Pagnoni","year":"2010","unstructured":"Pagnoni, A., & Visconti, A. (2010). Secure electronic bills of lading: blind counts and digital signatures. Electronic Commerce Research, 10(3), 363\u2013388.","journal-title":"Electronic Commerce Research"},{"key":"9120_CR23","series-title":"LNCS","first-page":"248","volume-title":"Advances in cryptology EUROCRYPT\u201993","author":"C. Park","year":"1994","unstructured":"Park, C., Itoh, K., & Kurosawa, K. (1994). Efficient anonymous channel and all\/nothing election scheme. In T. Helleseth (Ed.), LNCS: Vol.\u00a0765. Advances in cryptology EUROCRYPT\u201993 (pp. 248\u2013259). Heidelberg: Springer."},{"issue":"1","key":"9120_CR24","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1023\/B:ELEC.0000009282.06809.c5","volume":"4","author":"S. R\u00f6hrig","year":"2004","unstructured":"R\u00f6hrig, S., & Knorr, K. (2004). Security analysis of electronic business processes. Electronic Commerce Research, 4(1), 59\u201381.","journal-title":"Electronic Commerce Research"},{"issue":"2","key":"9120_CR25","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1007\/s10660-007-9002-9","volume":"7","author":"R. Smith","year":"2007","unstructured":"Smith, R., & Shao, J. (2007). Privacy and e-commerce: a consumer-centric perspective. Electronic Commerce Research, 7(2), 89\u2013116.","journal-title":"Electronic Commerce Research"},{"key":"9120_CR26","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"182","DOI":"10.1007\/978-3-642-27576-0_15","volume-title":"Financial cryptography and data security (FC 2011)","author":"O. Spycher","year":"2012","unstructured":"Spycher, O., Koenig, R., Haenni, R., & Schl\u00e4pfer, M. (2012). A new approach towards coercion-resistant remote e-voting in linear time. In G. Danezis (Ed.), LNCS: Vol.\u00a07035. Financial cryptography and data security (FC 2011) (pp.\u00a0182\u2013189). Heidelberg: Springer."},{"issue":"4","key":"9120_CR27","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1007\/s10660-011-9082-4","volume":"11","author":"A. Srivastava","year":"2011","unstructured":"Srivastava, A. (2011). Resistance to change: six reasons why businesses don\u2019t use e-signatures. Electronic Commerce Research, 11(4), 357\u2013382.","journal-title":"Electronic Commerce Research"}],"container-title":["Electronic Commerce Research"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10660-013-9120-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10660-013-9120-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10660-013-9120-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,13]],"date-time":"2019-07-13T22:48:11Z","timestamp":1563058091000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10660-013-9120-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,5,18]]},"references-count":27,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2013,9]]}},"alternative-id":["9120"],"URL":"https:\/\/doi.org\/10.1007\/s10660-013-9120-5","relation":{},"ISSN":["1389-5753","1572-9362"],"issn-type":[{"value":"1389-5753","type":"print"},{"value":"1572-9362","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,5,18]]}}}