{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,3,26]],"date-time":"2024-03-26T20:01:25Z","timestamp":1711483285119},"reference-count":72,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2016,7,8]],"date-time":"2016-07-08T00:00:00Z","timestamp":1467936000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Electron Commer Res"],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1007\/s10660-016-9230-y","type":"journal-article","created":{"date-parts":[[2016,7,8]],"date-time":"2016-07-08T05:06:48Z","timestamp":1467954408000},"page":"463-494","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["ESIV: an end-to-end secure internet voting system"],"prefix":"10.1007","volume":"17","author":[{"given":"Nafise Mohammadi","family":"Shakiba","sequence":"first","affiliation":[]},{"given":"Mohammad-Ali","family":"Doostari","sequence":"additional","affiliation":[]},{"given":"Mostafa","family":"Mohammadpourfard","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,7,8]]},"reference":[{"key":"9230_CR1","unstructured":"Al-Ameen, A., & Talab, S. A. (2012). E-voting systems vulnerabilities. In Information science and digital content technology (ICIDT), 2012 8th international conference on IEEE (Vol. 1, pp. 67\u201373):"},{"issue":"3","key":"9230_CR2","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1007\/s11761-012-0108-0","volume":"6","author":"R Cooke","year":"2012","unstructured":"Cooke, R., & Anane, R. (2012). A service-oriented architecture for robust e-voting. Service Oriented Computing and Applications, 6(3), 249\u2013266.","journal-title":"Service Oriented Computing and Applications"},{"issue":"2","key":"9230_CR3","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1007\/s10660-007-9002-9","volume":"7","author":"R Smith","year":"2007","unstructured":"Smith, R., & Shao, J. (2007). Privacy and e-commerce: A consumer-centric perspective. Electronic Commerce Research, 7(2), 89\u2013116.","journal-title":"Electronic Commerce Research"},{"issue":"1\u20132","key":"9230_CR4","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1023\/B:ELEC.0000009282.06809.c5","volume":"4","author":"S R\u00f6hrig","year":"2004","unstructured":"R\u00f6hrig, S., & Knorr, K. (2004). Security analysis of electronic business processes. Electronic Commerce Research, 4(1\u20132), 59\u201381.","journal-title":"Electronic Commerce Research"},{"key":"9230_CR5","doi-asserted-by":"crossref","first-page":"170","DOI":"10.1016\/j.cose.2012.10.001","volume":"32","author":"R Joaquim","year":"2013","unstructured":"Joaquim, R., Ferreira, P., & Ribeiro, C. (2013). EVIV: An end-to-end verifiable Internet voting system. Computers & Security, 32, 170\u2013191.","journal-title":"Computers & Security"},{"key":"9230_CR6","volume-title":"Elections electronic voting offers opportunities and presents challenges","author":"RC Hite","year":"2004","unstructured":"Hite, R. C. (2004). Elections electronic voting offers opportunities and presents challenges. Collingdale: Diane Publishing."},{"issue":"6","key":"9230_CR7","doi-asserted-by":"crossref","first-page":"725","DOI":"10.1016\/S0305-0483(00)00021-9","volume":"28","author":"D Gefen","year":"2000","unstructured":"Gefen, D. (2000). E-commerce: the role of familiarity and trust. Omega, 28(6), 725\u2013737.","journal-title":"Omega"},{"key":"9230_CR8","doi-asserted-by":"crossref","first-page":"319","DOI":"10.2307\/249008","volume":"13","author":"FD Davis","year":"1989","unstructured":"Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13, 319\u2013340.","journal-title":"MIS Quarterly"},{"issue":"1\u20132","key":"9230_CR9","doi-asserted-by":"crossref","first-page":"95","DOI":"10.3233\/IP-2005-0064","volume":"10","author":"S Coleman","year":"2005","unstructured":"Coleman, S. (2005). Just how risky is online voting? Information Polity, 10(1\u20132), 95\u2013104.","journal-title":"Information Polity"},{"issue":"5","key":"9230_CR10","doi-asserted-by":"crossref","first-page":"586","DOI":"10.1108\/17410390510624025","volume":"18","author":"L Christian Schaupp","year":"2005","unstructured":"Christian Schaupp, L., & Carter, L. (2005). E-voting: From apathy to adoption. Journal of Enterprise Information Management, 18(5), 586\u2013601.","journal-title":"Journal of Enterprise Information Management"},{"issue":"3","key":"9230_CR11","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1177\/0894439305275851","volume":"23","author":"K Kenski","year":"2005","unstructured":"Kenski, K. (2005). To i-vote or not to i-vote? Opinions about internet voting from Arizona voters. Social Science Computer Review, 23(3), 293\u2013303.","journal-title":"Social Science Computer Review"},{"issue":"8","key":"9230_CR12","doi-asserted-by":"crossref","first-page":"642","DOI":"10.1016\/j.cose.2005.07.008","volume":"24","author":"F Baiardi","year":"2005","unstructured":"Baiardi, F., Falleni, A., Granchi, R., Martinelli, F., Petrocchi, M., & Vaccarelli, A. (2005). SEAS, a secure e-voting protocol: Design and implementation. Computers & Security, 24(8), 642\u2013652.","journal-title":"Computers & Security"},{"key":"9230_CR13","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1016\/j.cose.2012.09.003","volume":"33","author":"R Haenni","year":"2013","unstructured":"Haenni, R., & Koenig, R. E. (2013). A generic approach to prevent board flooding attacks in coercion-resistant electronic voting schemes. Computers & Security, 33, 59\u201369.","journal-title":"Computers & Security"},{"key":"9230_CR14","doi-asserted-by":"crossref","first-page":"261","DOI":"10.1002\/sec.978","volume":"8","author":"M Mohammadpourfard","year":"2014","unstructured":"Mohammadpourfard, M., Doostari, M. A., Ghaznavi Ghoushchi, M. B., & Shakiba, N. (2014). A new secure Internet voting protocol using Java Card 3 technology and Java information flow concept. Security and Communication Networks, 8, 261.","journal-title":"Security and Communication Networks"},{"key":"9230_CR15","doi-asserted-by":"crossref","first-page":"519","DOI":"10.1007\/978-1-4614-3558-7_44","volume-title":"Emerging trends in computing, informatics, systems sciences, and engineering","author":"MA Based","year":"2013","unstructured":"Based, M. A., & Mj\u00f8lsnes, S. F. (2013). Security requirements for internet voting systems. In T. Sobh & K. Elleithy (Eds.), Emerging trends in computing, informatics, systems sciences, and engineering (pp. 519\u2013530). New York: Springer."},{"issue":"4","key":"9230_CR16","doi-asserted-by":"crossref","first-page":"330","DOI":"10.1016\/j.cose.2004.01.015","volume":"23","author":"Y-Y Chen","year":"2004","unstructured":"Chen, Y.-Y., Jan, J.-K., & Chen, C.-L. (2004). The design of a secure anonymous Internet voting system. Computers & Security, 23(4), 330\u2013337.","journal-title":"Computers & Security"},{"issue":"9","key":"9230_CR17","doi-asserted-by":"crossref","first-page":"1611","DOI":"10.1016\/j.mcm.2008.05.039","volume":"48","author":"C-I Fan","year":"2008","unstructured":"Fan, C.-I., & Sun, W.-Z. (2008). An efficient multi-receipt mechanism for uncoercible anonymous electronic voting. Mathematical and Computer Modelling, 48(9), 1611\u20131627.","journal-title":"Mathematical and Computer Modelling"},{"issue":"3","key":"9230_CR18","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1007\/s10660-013-9120-5","volume":"13","author":"TAT Nguyen","year":"2013","unstructured":"Nguyen, T. A. T., & Dang, T. K. (2013). Enhanced security in internet voting protocol using blind signature and dynamic ballots. Electronic Commerce Research, 13(3), 257\u2013272.","journal-title":"Electronic Commerce Research"},{"issue":"2","key":"9230_CR19","first-page":"1786","volume":"2","author":"MA Walake","year":"2015","unstructured":"Walake, M. A., & Chavan, M. P. (2015). Receipt-free multi-authority voting system with (2, 2) secret sharing based authentication. International Journal of Emerging Trends in Science and Technology, 2(2), 1786\u20131791.","journal-title":"International Journal of Emerging Trends in Science and Technology"},{"key":"9230_CR20","volume-title":"Information security and privacy","author":"JK Liu","year":"2004","unstructured":"Liu, J. K., Wei, V. K., & Wong, D. S. (2004). Linkable spontaneous anonymous group signature for ad hoc groups. In H. Wang, J. Pieprzyk, & V. Varadharajan (Eds.), Information security and privacy. Berlin: Springer."},{"issue":"2","key":"9230_CR21","first-page":"47","volume":"1","author":"R Joaquim","year":"2003","unstructured":"Joaquim, R., Z\u00faquete, A., & Ferreira, P. (2003). REVS\u2014A robust electronic voting system. IADIS International Journal of WWW\/Internet, 1(2), 47\u201363.","journal-title":"IADIS International Journal of WWW\/Internet"},{"key":"9230_CR22","volume-title":"Election verifiability in electronic voting protocols","author":"S Kremer","year":"2010","unstructured":"Kremer, S., Ryan, M., & Smyth, B. (2010). Election verifiability in electronic voting protocols. Berlin: Springer."},{"key":"9230_CR23","doi-asserted-by":"crossref","first-page":"244","DOI":"10.1007\/3-540-57220-1_66","volume-title":"Advances in cryptology\u2014AUSCRYPT\u201992","author":"A Fujioka","year":"1993","unstructured":"Fujioka, A., Okamoto, T., & Ohta, K. (1993). A practical secret voting scheme for large scale elections. In J. Seberry & Y. Zheng (Eds.), Advances in cryptology\u2014AUSCRYPT\u201992 (pp. 244\u2013251). Berlin: Springer."},{"key":"9230_CR24","unstructured":"Popoveniuc, S., & Hosp, B. (2006). An introduction to punchscan. In IAVoSS workshop on trustworthy elections (WOTE 2006) (pp. 28\u201330). Robinson College United Kingdom"},{"key":"9230_CR25","doi-asserted-by":"crossref","first-page":"242","DOI":"10.1007\/978-3-642-12980-3_15","volume-title":"Towards trustworthy elections","author":"S Popoveniuc","year":"2010","unstructured":"Popoveniuc, S., & Hosp, B. (2010). An introduction to punchscan. In D. Chaum, M. Jakobsson, R. L. Rivest, P. Y. A. Ryan, & J. Benaloh (Eds.), Towards trustworthy elections (pp. 242\u2013259). Berlin: Springer."},{"key":"9230_CR26","unstructured":"Rivest, R. L., & Smith, W. D. (2007). Three voting protocols: ThreeBallot, VAV, and Twin. In Proceedings of the USENIX workshop on accurate electronic voting technology, 2007 (Vol. 16): USENIX Association"},{"key":"9230_CR27","doi-asserted-by":"crossref","unstructured":"Benaloh, J., & Tuinstra, D. (1994). Receipt-free secret-ballot elections. In Proceedings of the twenty-sixth annual ACM symposium on theory of computing, 1994 (pp. 544\u2013553). ACM","DOI":"10.1145\/195058.195407"},{"key":"9230_CR28","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1007\/978-3-540-24691-6_19","volume-title":"Information security and cryptology-ICISC 2003","author":"B Lee","year":"2004","unstructured":"Lee, B., Boyd, C., Dawson, E., Kim, K., Yang, J., & Yoo, S. (2004). Providing receipt-freeness in mixnet-based voting protocols. In J.-I. Lim & D.-H. Lee (Eds.), Information security and cryptology-ICISC 2003 (pp. 245\u2013258). Berlin: Springer."},{"key":"9230_CR29","doi-asserted-by":"crossref","unstructured":"Juels, A., Catalano, D., & Jakobsson, M. (2005). Coercion-resistant electronic elections. In Proceedings of the 2005 ACM workshop on Privacy in the electronic society, 2005 (pp. 61\u201370). ACM","DOI":"10.1145\/1102199.1102213"},{"issue":"12","key":"9230_CR30","doi-asserted-by":"crossref","first-page":"2081","DOI":"10.1016\/j.jss.2009.07.023","volume":"82","author":"Y-F Chung","year":"2009","unstructured":"Chung, Y.-F., & Wu, Z.-Y. (2009). Approach to designing bribery-free and coercion-free electronic voting scheme. Journal of Systems and Software, 82(12), 2081\u20132090.","journal-title":"Journal of Systems and Software"},{"key":"9230_CR31","unstructured":"Clarkson, M. R., Chong, S., & Myers, A. C. (2007). Civitas: A secure voting system. Cornell University."},{"issue":"10","key":"9230_CR32","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1145\/2347736.2347754","volume":"55","author":"B Simons","year":"2012","unstructured":"Simons, B., & Jones, D. W. (2012). Internet voting in the US. Communications of the ACM, 55(10), 68\u201377.","journal-title":"Communications of the ACM"},{"issue":"1","key":"9230_CR33","doi-asserted-by":"crossref","first-page":"39","DOI":"10.4018\/ijsse.2014010103","volume":"5","author":"S Cobourne","year":"2014","unstructured":"Cobourne, S., Kyrillidis, L., Mayes, K., & Markantonakis, K. (2014). Remote e-voting using the smart card web server. International Journal of Secure Software Engineering (IJSSE), 5(1), 39\u201360.","journal-title":"International Journal of Secure Software Engineering (IJSSE)"},{"key":"9230_CR34","unstructured":"Cozzolino, S. (2014). How to Combine NFC Services and ID Leveraging on SIM Technology. Paper presented at the Cartes America 2014"},{"issue":"3","key":"9230_CR35","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1016\/S1361-3723(07)70033-7","volume":"2007","author":"A Pasquinucci","year":"2007","unstructured":"Pasquinucci, A. (2007). Web voting, security and cryptography. Computer Fraud & Security, 2007(3), 5\u20138.","journal-title":"Computer Fraud & Security"},{"key":"9230_CR36","unstructured":"Adida, B. (2008). Helios: Web-based Open-Audit Voting. In USENIX security symposium, 2008 (Vol. 17, pp. 335\u2013348)"},{"key":"9230_CR37","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1007\/978-3-642-04135-8_7","volume-title":"E-voting and identity","author":"R Joaquim","year":"2009","unstructured":"Joaquim, R., Ribeiro, C., & Ferreira, P. (2009). Veryvote: A voter verifiable code voting system. In P. Y. Ryan & B. Schoenmakers (Eds.), E-voting and identity (pp. 106\u2013121). Berlin: Springer."},{"key":"9230_CR38","doi-asserted-by":"crossref","first-page":"310","DOI":"10.1007\/978-3-642-12980-3_19","volume-title":"Towards trustworthy elections","author":"R Joaquim","year":"2010","unstructured":"Joaquim, R., Ribeiro, C., & Ferreira, P. (2010). Improving remote voting security with codevoting. In D. Chaum, M. Jakobsson, R. Rivest, P. Y. A. Ryan, J. Benaloh, M. Kutykoswski, & B. Adida (Eds.), Towards trustworthy elections (pp. 310\u2013329). Berlin: Springer."},{"key":"9230_CR39","doi-asserted-by":"crossref","first-page":"373","DOI":"10.1007\/978-3-642-15497-3_23","volume-title":"Computer security\u2013ESORICS 2010","author":"S Heiberg","year":"2010","unstructured":"Heiberg, S., Lipmaa, H., & Van Laenen, F. (2010). On e-vote integrity in the case of malicious voter computers. In D. Gritzalis & B. Preneel (Eds.), Computer security\u2013ESORICS 2010 (pp. 373\u2013388). Berlin: Springer."},{"key":"9230_CR40","unstructured":"Z\u00faquete, A., Costa, C., & Romao, M. (2007). An intrusion-tolerant e-voting client system. In WRAITS 2007"},{"key":"9230_CR41","unstructured":"Dichou, K., Tourtchine V., & Rahmoune F. (2014). An improved electronic voting machine using a microcontroller and a smart card. In 9th international design and test symposium (IDT), 2014 (pp. 219\u2013224). IEEE."},{"key":"9230_CR42","unstructured":"Almeshekah, M. & Kerr S. (2015) Electronic voting. Technical Report available at https:\/\/www.meshekah.com\/research\/publications_files\/secure_e_voting_design.pdf ."},{"issue":"8","key":"9230_CR43","doi-asserted-by":"crossref","first-page":"161","DOI":"10.14257\/ijhit.2015.8.8.15","volume":"8","author":"I Sharma","year":"2015","unstructured":"Sharma, I., & Dubey, S. K. (2015). E-voting system with physical verification using OTP algorithm. International Journal of Hybrid Information Technology, 8(8), 161\u2013166.","journal-title":"International Journal of Hybrid Information Technology"},{"key":"9230_CR44","unstructured":"Laanes, L. (2011). Building an inclusive information society at the local level in Estonia. Values and Freedoms in Modern Information Law and Ethics (pp. 1160\u20131174)."},{"key":"9230_CR45","unstructured":"Sachdeva, K., H. K. Lu, & Krishna K. (2009) A browser-based approach to smart card connectivity. In IEEE Workshop on Web. Citeseer."},{"key":"9230_CR46","first-page":"1001","volume":"21","author":"S Canard","year":"2001","unstructured":"Canard, S., & Sibert, H. (2001). How to fit cryptographic e-voting into smart cards. Fundamenta Informaticae, 21, 1001\u20131012.","journal-title":"Fundamenta Informaticae"},{"key":"9230_CR47","doi-asserted-by":"crossref","unstructured":"Yang, C.-H., Tu, S.-Y., & Yen, P.-H. (2009). Implementation of an electronic voting system with contactless IC cards for small-scale voting. In Information assurance and security, 2009. IAS\u201909. fifth international conference on IEEE (Vol. 2, pp. 122\u2013125).","DOI":"10.1109\/IAS.2009.337"},{"key":"9230_CR48","volume-title":"Java card technology for smart cards: Architecture and programmer\u2019s guide","author":"Z Chen","year":"2000","unstructured":"Chen, Z. (2000). Java card technology for smart cards: Architecture and programmer\u2019s guide. Boston: Addison-Wesley Professional."},{"key":"9230_CR49","unstructured":"Vassilev, A., & Hutchinson, M. (2003). Authentication framework for smart cards. In BIOSIG (pp. 51\u201359)"},{"key":"9230_CR50","unstructured":"G\u00f3mez Oliva, A., S\u00e1nchez Garc\u00eda, S., & P\u00e9rez Belleboni, E. (2006). Contributions to traditional electronic voting systems in order to reinforce citizen confidence (pp. 39\u201349)."},{"key":"9230_CR51","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1007\/978-0-387-35528-3_11","volume-title":"Smart card research and advanced applications","author":"J Rees","year":"2000","unstructured":"Rees, J., & Honeyman, P. (2000). Webcard: A Java Card web server. In J. Rees & P. Honeyman (Eds.), Smart card research and advanced applications (pp. 197\u2013207). Berlin: Springer."},{"key":"9230_CR52","unstructured":"Muller, C., & Deschamps, E. (2002). Smart cards as first-class network citizens. In 4th Gemplus developer conference, Singapore. Citeseer"},{"issue":"17","key":"9230_CR53","doi-asserted-by":"crossref","first-page":"1655","DOI":"10.1016\/S0140-3664(00)00252-8","volume":"23","author":"P Urien","year":"2000","unstructured":"Urien, P. (2000). Internet card, a smart card as a true Internet node. Computer Communications, 23(17), 1655\u20131666.","journal-title":"Computer Communications"},{"key":"9230_CR54","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1007\/978-0-387-35528-3_12","volume-title":"Smart card research and advanced applications","author":"S Guthery","year":"2000","unstructured":"Guthery, S., Kehr, R., & Posegga, J. (2000). How to turn a GSM SIM into a web server. In J. Domingo-Ferrer, D. Chan, & A. Watson (Eds.), Smart card research and advanced applications (pp. 209\u2013222). Berlin: Springer."},{"key":"9230_CR55","doi-asserted-by":"crossref","unstructured":"Sterckx, M., Gierlichs, B., Preneel, B., & Verbauwhede, I. (2009). Efficient implementation of anonymous credentials on Java Card smart cards. In Information Forensics and Security, 2009. WIFS 2009. First IEEE International Workshop on IEEE (pp. 106\u2013110)","DOI":"10.1109\/WIFS.2009.5386474"},{"key":"9230_CR56","unstructured":"SUN Microsystem Inc (2006). Release Notes Java Card 3.0.1 Platform Specification,. http:\/\/www.oracle.com\/technetwork\/java\/javacard\/releasenotes-jsp-137685.html ."},{"key":"9230_CR57","unstructured":"SUN Microsystem Inc (2008). The Java Card 3 Platform. http:\/\/www.oracle.com\/technetwork\/\u2026\/javase\/javacard3-whitepaper-149761.pdf ."},{"key":"9230_CR58","unstructured":"Allenbach, P. O. (2009). Java Card 3: Classic functionality gets a connectivity boost. http:\/\/www.oracle.com\/technetwork\/articles\/javase\/javacard3-142122.html ."},{"key":"9230_CR59","unstructured":"Hopkins, B. (2010). Deploying servlets on Smart Cards: Portable web servers with Java Card 3.0. http:\/\/www.oracle.com\/technetwork\/articles\/java\/javacard-servlets-136657.html ."},{"key":"9230_CR60","doi-asserted-by":"crossref","unstructured":"Ghaleh, H. R., & Doustari, M. (2008). A new approach for secure and portable OS. In Emerging Security Information, Systems and Technologies, 2008. SECURWARE\u201908. Second International Conference on IEEE (pp. 28\u201333)","DOI":"10.1109\/SECURWARE.2008.34"},{"key":"9230_CR61","unstructured":"Alkassar, A., Sadeghi, A.-R., Schultz, S., & Volkamer, M. (2006)Towards trustworthy online voting. In Proceedings of the 1st Benelux Workshop on Information and System Security\u2013WISSec (Vol. 6)"},{"issue":"3","key":"9230_CR62","doi-asserted-by":"crossref","first-page":"27","DOI":"10.5120\/11944-7752","volume":"70","author":"N MohamadiShakiba","year":"2013","unstructured":"MohamadiShakiba, N., Doostari, M.-A., & Norouzi, S. (2013). I-FOO: An Enhancement to FOO Protocol. International Journal of Computer Applications, 70(3), 27\u201336.","journal-title":"International Journal of Computer Applications"},{"key":"9230_CR63","doi-asserted-by":"crossref","DOI":"10.1007\/b135818","volume-title":"Security and privacy in the age of ubiquitous computing","author":"R Sasaki","year":"2005","unstructured":"Sasaki, R., Qing, S., Okamoto, E., & Yoshiura, H. (2005). Security and privacy in the age of ubiquitous computing. Boston: Springer."},{"key":"9230_CR64","unstructured":"Javary, B., & Recape, F. (2014). Secure element access from a web browser. In W3C workshop on authentication, hardware tokens and beyond, Sept 10\u201311 2014"},{"key":"9230_CR65","unstructured":"Giesecke & Devrient SIM Applications as Smartcard Web Server. http:\/\/www.gi-de.com\/en\/products_and_solutions\/products\/mobile_communication\/SIM-Applications-as-Smartcard-Web-Server-5444.jsp ."},{"key":"9230_CR66","unstructured":"Herschberg, M. A. (1997). Secure electronic voting over the world wide web. Massachusetts Institute of Technology"},{"key":"9230_CR67","unstructured":"DuRette, B. W. (1999). Multiple administrators for electronic voting. Bachelor thesis, Massachusetts Institute of Technology, Boston."},{"key":"9230_CR68","unstructured":"Cetinkaya, O., & Doganaksoy, A. (2006) A practical privacy preserving e-voting protocol using dynamic ballots. In 2nd National Cryptology Symposium 2006"},{"key":"9230_CR69","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1007\/978-3-662-46666-7_16","volume-title":"Principles of security and trust","author":"V Cortier","year":"2015","unstructured":"Cortier, V., et al. (2015). Type-based verification of electronic voting protocols. In R. Focardi & A. Myers (Eds.), Principles of security and trust (pp. 303\u2013323). Berlin: Springer."},{"key":"9230_CR70","doi-asserted-by":"crossref","unstructured":"Chen, G., Wu, C., Han, W., Chen, X., Lee, H., & Kim, K. (2008) A new receipt-free voting scheme based on linkable ring signature for designated verifiers. In Embedded software and systems symposia, 2008. ICESS Symposia\u201908. International conference on IEEE (pp. 18\u201323).","DOI":"10.1109\/ICESS.Symposia.2008.54"},{"key":"9230_CR71","unstructured":"Security, H.(2007). Antivirus protection worse than a year ago. http:\/\/www.honline.com\/security\/news\/item\/Antivirus-protection-worse-than-a-year-ago-735697.html ."},{"key":"9230_CR72","unstructured":"Bakker, B. (1999). Mutual authentication with smart cards. In Proceedings of USENIX workshop on smart card technology."}],"container-title":["Electronic Commerce Research"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10660-016-9230-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10660-016-9230-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10660-016-9230-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10660-016-9230-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,19]],"date-time":"2023-08-19T04:47:40Z","timestamp":1692420460000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10660-016-9230-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,7,8]]},"references-count":72,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2017,9]]}},"alternative-id":["9230"],"URL":"https:\/\/doi.org\/10.1007\/s10660-016-9230-y","relation":{},"ISSN":["1389-5753","1572-9362"],"issn-type":[{"value":"1389-5753","type":"print"},{"value":"1572-9362","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,7,8]]}}}