{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,3]],"date-time":"2022-04-03T01:21:31Z","timestamp":1648948891443},"reference-count":9,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2014,2,1]],"date-time":"2014-02-01T00:00:00Z","timestamp":1391212800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2014,2]]},"DOI":"10.1007\/s11623-014-0037-5","type":"journal-article","created":{"date-parts":[[2014,4,3]],"date-time":"2014-04-03T09:31:57Z","timestamp":1396517517000},"page":"82-85","source":"Crossref","is-referenced-by-count":1,"title":["Sozialwahlen via Internet mit Polyas"],"prefix":"10.1007","volume":"38","author":[{"given":"Katharina","family":"Br\u00e4unlich","sequence":"first","affiliation":[]},{"given":"R\u00fcdiger","family":"Grimm","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,4,4]]},"reference":[{"key":"37_CR1","volume-title":"Verifiable secret-ballot elections","author":"J D C Benaloh","year":"1987","unstructured":"Benaloh, J. D. C. (1987): Verifiable secret-ballot elections, Dissertation, Yale University, Department of Computer Science, Technical Report number 561."},{"issue":"2","key":"37_CR2","first-page":"1","volume":"7","author":"K Br\u00e4unlich","year":"2013","unstructured":"Br\u00e4unlich, K.; Grimm, R. (2013): Development of a Formal Security Model for Electronic Voting Systems. In: International Journal of Information Security and Privacy (IJISP), April\u2013June 2013, Vol 7 No. 2, pp. 1\u201328. IGI Global, Hershey, PA, USA.","journal-title":"International Journal of Information Security and Privacy (IJISP), April\u2013June 2013"},{"key":"37_CR3","volume-title":"Evaluierung konkreter Wahlanwendungen bzw. -produkte hinsichtlich \u00dcbereinstimmung mit dem ModIWa-Referenzmodell","author":"R Bindra","year":"2013","unstructured":"Bindarra, R. (2013): Evaluierung konkreter Wahlanwendungen bzw. -produkte hinsichtlich \u00dcbereinstimmung mit dem ModIWa-Referenzmodell, Bachelorarbeit, Universit\u00e4t Koblenz-Landau."},{"key":"37_CR4","unstructured":"BVerfG, 2 BvC 3\/07 vom 3.3.2009, Absatz-Nr. (1 - 163), Online einsehbar unter \n                    http:\/\/www.bverfg.de\/entscheidungen\/cs20090303_2bvc000307.html\n                    \n                   [20.10.2013]."},{"key":"37_CR5","unstructured":"Common Criteria for Information Technnology Security Evaluation, and Common Methodology for Information Security Evaluation, Version 3.1, 2006."},{"key":"37_CR6","first-page":"109","volume-title":"Electronic Voting","author":"N Menke","year":"2010","unstructured":"Menke, N.; Reinhard, K. (2010): Compliance of POLYAS with the Common Criteria Protection Profile - A 2010 Outlook on Certified Remote Electronic Voting. Electronic Voting 2010, Seiten 109\u2013118."},{"key":"37_CR7","first-page":"127","volume-title":"ARES","author":"M Olembo","year":"2011","unstructured":"Olembo, M.; Schmidt, P.; Volkamer, M. (2011): Introducing Verifiability in the POLYAS Remote Electronic Voting System. ARES 2011, Seiten 127\u2013134."},{"key":"37_CR8","doi-asserted-by":"publisher","DOI":"10.5771\/9783845243450","volume-title":"Wahlen im Internet rechtsgem\u00e4\u00df gestalten","author":"P Richter","year":"2012","unstructured":"Richter, P. (2012): Wahlen im Internet rechtsgem\u00e4\u00df gestalten, Dissertation, Universit\u00e4t Kassel, Nomos Verlag."},{"key":"37_CR9","first-page":"1827","volume-title":"Proceedings of Informatik","author":"M Volkamer","year":"2009","unstructured":"Volkamer, M., Schryen, G., Langer, L., Schmidt, A., Buchmann, J. (2009): Elektronische Wahlen: Verifizierung vs. Zertifizierung. Proceedings of Informatik 2009, Seiten 1827\u20131836."}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-014-0037-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-014-0037-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-014-0037-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-014-0037-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T18:22:40Z","timestamp":1559413360000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-014-0037-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,2]]},"references-count":9,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2014,2]]}},"alternative-id":["37"],"URL":"https:\/\/doi.org\/10.1007\/s11623-014-0037-5","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,2]]}}}