{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:21:52Z","timestamp":1725556912740},"publisher-location":"Berlin, Heidelberg","reference-count":41,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642129797"},{"type":"electronic","value":"9783642129803"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-12980-3_19","type":"book-chapter","created":{"date-parts":[[2010,5,31]],"date-time":"2010-05-31T01:48:13Z","timestamp":1275270493000},"page":"310-329","source":"Crossref","is-referenced-by-count":8,"title":["Improving Remote Voting Security with CodeVoting"],"prefix":"10.1007","author":[{"given":"Rui","family":"Joaquim","sequence":"first","affiliation":[]},{"given":"Carlos","family":"Ribeiro","sequence":"additional","affiliation":[]},{"given":"Paulo","family":"Ferreira","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"19_CR1","unstructured":"CERT: Vulnerability remediation statistics (2007), http:\/\/www.cert.org\/stats\/vulnerability_remediation.html"},{"key":"19_CR2","unstructured":"USCERT: Cyber security bulletins (2007), http:\/\/www.us-cert.gov\/cas\/bulletins\/"},{"key":"19_CR3","unstructured":"Wikipedia: Pharming (2007), http:\/\/en.wikipedia.org\/wiki\/Pharming"},{"key":"19_CR4","doi-asserted-by":"crossref","unstructured":"Stamm, S., Ramzan, Z., Jakobsson, M.: Drive-by pharming (2006), http:\/\/www.symantec.com\/avcenter\/reference\/Driveby_Pharming.pdf","DOI":"10.1007\/978-3-540-77048-0_38"},{"key":"19_CR5","unstructured":"Gaudin, S.: Pharming attack slams 65 financial targets. InformationWeek (2007), http:\/\/www.informationweek.com\/showArticle.jhtml?articleID=197008230"},{"key":"19_CR6","unstructured":"Kirk, J.: Pharming attack hits 50 banks. IDG News Service, TechWorld (2007), http:\/\/www.techworld.com\/security\/news\/index.cfm?newsid=8102"},{"key":"19_CR7","unstructured":"Council of Europe: Family voting. Congress of Local and Regional Authorities of Europe session (2002), http:\/\/www.coe.int\/T\/E\/Com\/Files\/CLRAE-Sessions\/2002-06-Session\/family_voting.asp"},{"key":"19_CR8","unstructured":"Volkamer, M., Grimm, R.: Multiple casts in online voting: Analyzing chances. In: Robert Krimmer, R. (ed.) Electronic Voting 2006, Castle Hofen, Bregenz, Austria. LNI, vol.\u00a0P-86, pp. 97\u2013106. GI (2006)"},{"key":"19_CR9","unstructured":"California Internet Task Force: A report on the feasibility of internet voting (2000), http:\/\/www.ss.ca.gov\/executive\/ivote"},{"key":"19_CR10","unstructured":"Internet Policy Institute: Report of the national workshop on internet voting: Issues and research agenda (2001), http:\/\/www.diggov.org\/archive\/library\/dgo2000\/dir\/PDF\/vote.pdf"},{"key":"19_CR11","unstructured":"Jefferson, D., Rubin, A.D., Simons, B., Wagner, D.: A security analysis of the secure electronic registration and voting experiment (serve) (2004), http:\/\/www.servesecurityreport.org\/paper.pdf"},{"key":"19_CR12","unstructured":"Rivest, R.L.: Electronic voting. In: Syverson, P.F. (ed.) FC 2001. LNCS, vol.\u00a02339, p. 243. Springer, Heidelberg (2001)"},{"issue":"12","key":"19_CR13","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/585597.585599","volume":"45","author":"A.D. Rubin","year":"2002","unstructured":"Rubin, A.D.: Security considerations for remote electronic voting. Commun. ACM\u00a045(12), 39\u201344 (2002)","journal-title":"Commun. ACM"},{"key":"19_CR14","unstructured":"Joaquim, R., Ribeiro, C.: Codevoting: protecting against malicious vote manipulation at the voter\u2019s pc. In: Chaum, D., Kuty\u0142owski, M., Rivest, R.L., Ryan, P.Y.A. (eds.) Frontiers of Electronic Voting, no. 07311 in Dagstuhl, Germany. Dagstuhl Seminar Proceedings, Internationales Begegnungs- und Forschungszentrum f\u00fcr Informatik (IBFI), Schloss Dagstuhl, Germany (2007)"},{"key":"19_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1007\/978-3-540-77493-8_16","volume-title":"E-Voting and Identity","author":"R. Joaquim","year":"2007","unstructured":"Joaquim, R., Ribeiro, C.: CodeVoting protection against automatic vote manipulation in an uncontrolled environment. In: Alkassar, A., Volkamer, M. (eds.) VOTE-ID 2007. LNCS, vol.\u00a04896, pp. 178\u2013188. Springer, Heidelberg (2007)"},{"key":"19_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"244","DOI":"10.1007\/3-540-57220-1_66","volume-title":"Advances in Cryptology - AUSCRYPT \u201992","author":"A. Fujioka","year":"1993","unstructured":"Fujioka, A., Okamoto, T., Ohta, K.: A practical secret voting scheme for large scale elections. In: Zheng, Y., Seberry, J. (eds.) AUSCRYPT 1992. LNCS, vol.\u00a0718, pp. 244\u2013251. Springer, Heidelberg (1993)"},{"issue":"2","key":"19_CR17","first-page":"47","volume":"1","author":"R. Joaquim","year":"2003","unstructured":"Joaquim, R., Z\u00faquete, A., Ferreira, P.: Revs - a robust electronic voting system (extended). IADIS International Journal of WWW\/Internet\u00a01(2), 47\u201363 (2003)","journal-title":"IADIS International Journal of WWW\/Internet"},{"key":"19_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1007\/3-540-47790-X_19","volume-title":"Information Security","author":"M. Ohkubo","year":"1999","unstructured":"Ohkubo, M., Miura, F., Abe, M., Fujioka, A., Okamoto, T.: An improvement on a practical secret voting scheme. In: Zheng, Y., Mambo, M. (eds.) ISW 1999. LNCS, vol.\u00a01729, pp. 225\u2013234. Springer, Heidelberg (1999)"},{"key":"19_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/BFb0028157","volume-title":"Security Protocols","author":"T. Okamoto","year":"1998","unstructured":"Okamoto, T.: Receipt-free electronic voting schemes for large scale elections. In: Christianson, B., Crispo, B., Lomas, M., Roe, M. (eds.) Security Protocols 1997. LNCS, vol.\u00a01361, pp. 25\u201335. Springer, Heidelberg (1998)"},{"issue":"2","key":"19_CR20","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"D. Chaum","year":"1981","unstructured":"Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM\u00a024(2), 84\u201388 (1981)","journal-title":"Commun. ACM"},{"key":"19_CR21","unstructured":"Clarkson, M., Chong, S., Myers, A.: Civitas: A secure remote voting system. In: Chaum, D., Kutylowski, M., Rivest, R.L., Ryan, P.Y.A. (eds.) Frontiers of Electronic Voting, Dagstuhl, Germany. Dagstuhl no. 07311 in Seminar Proceedings, Internationales Begegnungs- und Forschungszentrum f\u00fcr Informatik (IBFI), Schloss Dagstuhl, Germany (2007)"},{"key":"19_CR22","unstructured":"Neff, C.A.: Verifiable mixing (shuffling) of elgamal pairs (2004), http:\/\/votehere.com\/vhti\/documentation\/egshuf-2.0.3638.pdf"},{"key":"19_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"248","DOI":"10.1007\/3-540-48285-7_21","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"C.-s. Park","year":"1994","unstructured":"Park, C.-s., Itoh, K., Kurosawa, K.: Efficient anonymous channel and all\/Nothing election scheme. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol.\u00a0765, pp. 248\u2013259. Springer, Heidelberg (1994)"},{"key":"19_CR24","unstructured":"Benaloh, J.C.: Verifiable Secret-Ballot Elections. PhD thesis, Yale University (1987)"},{"key":"19_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1007\/3-540-69053-0_9","volume-title":"Advances in Cryptology - EUROCRYPT \u201997","author":"R. Cramer","year":"1997","unstructured":"Cramer, R., Gennaro, R., Schoenmakers, B.: A secure and optimally efficient multi-authority election scheme. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol.\u00a01233, pp. 103\u2013118. Springer, Heidelberg (1997)"},{"key":"19_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/3-540-44586-2_9","volume-title":"Public Key Cryptography","author":"I. Damg\u00e5rd","year":"2001","unstructured":"Damg\u00e5rd, I., Jurik, M.: A generalisation, a simplification and some applications of paillier\u2019s probabilistic public-key system. In: Kim, K.-c. (ed.) PKC 2001. LNCS, vol.\u00a01992, pp. 119\u2013136. Springer, Heidelberg (2001)"},{"key":"19_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1007\/3-540-45539-6_38","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"M. Hirt","year":"2000","unstructured":"Hirt, M., Sako, K.: Efficient receipt-free voting based on homomorphic encryption. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807, pp. 539\u2013556. Springer, Heidelberg (2000)"},{"key":"19_CR28","unstructured":"Estonian National Electoral Commitee: Internet voting in estonia (2007), http:\/\/www.vvk.ee\/engindex.html"},{"key":"19_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1007\/3-540-36552-4_27","volume-title":"Information Security and Cryptology - ICISC 2002","author":"B. Lee","year":"2003","unstructured":"Lee, B., Kim, K.: Receipt-free electronic voting scheme with a tamper-resistant randomizer. In: Lee, P.J., Lim, C.H. (eds.) ICISC 2002. LNCS, vol.\u00a02587, pp. 389\u2013406. Springer, Heidelberg (2003)"},{"key":"19_CR30","unstructured":"Oppliger, R.: How to address the secure platform problem for remote internet voting. In: Erasim, E., Karagiannis, D. (eds.) 5th Conference on \u201cSicherheit in Informationssystemen\u201d (SIS 2002), Vienna, Austria, pp. 153\u2013173. vdf Hochschulverlag (2002)"},{"key":"19_CR31","unstructured":"Z\u00faquete, A., Costa, C., Rom\u00a0ao, M.: An intrusion-tolerant e-voting client system. In: 1st Workshop on Recent Advances on Intrusion-Tolerant Systems (WRAITS 2007), Lisbon, Portugal (2007)"},{"key":"19_CR32","unstructured":"TGC: Trusted computing group (2007), https:\/\/www.trustedcomputinggroup.org\/home"},{"key":"19_CR33","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1145\/1179474.1179487","volume-title":"STC 2006: Proceedings of the first ACM workshop on Scalable trusted computing","author":"A.R. Sadeghi","year":"2006","unstructured":"Sadeghi, A.R., Selhorst, M., St\u00fcble, C., Wachsmann, C., Winandy, M.: Tcg inside?: a note on tpm specification compliance. In: STC 2006: Proceedings of the first ACM workshop on Scalable trusted computing, Alexandria, Virginia, USA, pp. 47\u201356. ACM, New York (2006)"},{"key":"19_CR34","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1145\/1030083.1030103","volume-title":"CCS 2004: Proceedings of the 11th ACM conference on Computer and Communications Security","author":"E. Brickell","year":"2004","unstructured":"Brickell, E., Camenisch, J., Chen, L.: Direct anonymous attestation. In: Pftzmann, B., Liu, P. (eds.) CCS 2004: Proceedings of the 11th ACM conference on Computer and Communications Security, Washington DC, USA, pp. 132\u2013145. ACM, New York (2004)"},{"key":"19_CR35","unstructured":"Volkamer, M., Alkassar, A., Sadeghi, A.R., Schulz, S.: Enabling the application of the open systems like pcs for online voting. In: Frontiers in Electronic Elections Workshop (FEE 2006), Hamburg, Germany (2006)"},{"key":"19_CR36","unstructured":"Chaum, D.: Surevote (2001) International patent WO 01\/55940 A1, http:\/\/www.surevote.com\/home.html"},{"key":"19_CR37","unstructured":"UK\u2019s Electoral Commission: Technical report on the may 2003 pilots (2003), http:\/\/www.electoralcommission.org.uk\/about-us\/03pilotscheme.cfm"},{"key":"19_CR38","unstructured":"UK\u2019s National Technical Authority for Information Assurance: e-voting security study (2002), http:\/\/www.ictparliament.org\/CDTunisi\/ict_compendium\/paesi\/uk\/uk54.pdf"},{"key":"19_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1007\/978-3-540-77493-8_15","volume-title":"E-Voting and Identity","author":"J. Helbach","year":"2007","unstructured":"Helbach, J., Schwenk, J.: Secure internet voting with code sheets. In: Alkassar, A., Volkamer, M. (eds.) VOTE-ID 2007. LNCS, vol.\u00a04896, pp. 166\u2013177. Springer, Heidelberg (2007)"},{"key":"19_CR40","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1007\/978-3-540-75651-4_14","volume-title":"Advances in Information and Computer Security","author":"M. Kuty\u0142owski","year":"2007","unstructured":"Kuty\u0142owski, M., Zag\u00f3rski, F.: Verifiable internet voting solving secure platform problem. In: Miyaji, A., Kikuchi, H., Rannenberg, K. (eds.) IWSEC 2007. LNCS, vol.\u00a04752, pp. 199\u2013213. Springer, Heidelberg (2007)"},{"key":"19_CR41","unstructured":"Skagestein, G., Haug, A.V., N\u00f8dtvedt, E., Rosseb\u00f8, J.E.Y.: How to create trust in electronic voting over an untrusted platform. In: Krimmer, R. (ed.) Electronic Voting 2006, Castle Hofen, Bregenz, Austria. LNI, vol.\u00a0P-86, pp. 107\u2013116. GI (2006)"}],"container-title":["Lecture Notes in Computer Science","Towards Trustworthy Elections"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-12980-3_19.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:59:24Z","timestamp":1606186764000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-12980-3_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642129797","9783642129803"],"references-count":41,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-12980-3_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}