{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T00:20:11Z","timestamp":1773879611874,"version":"3.50.1"},"reference-count":29,"publisher":"Elsevier BV","issue":"6","license":[{"start":{"date-parts":[[2002,10,1]],"date-time":"2002-10-01T00:00:00Z","timestamp":1033430400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers &amp; Security"],"published-print":{"date-parts":[[2002,10]]},"DOI":"10.1016\/s0167-4048(02)01014-3","type":"journal-article","created":{"date-parts":[[2002,10,16]],"date-time":"2002-10-16T10:33:39Z","timestamp":1034764419000},"page":"539-556","source":"Crossref","is-referenced-by-count":111,"title":["Principles and requirements for a secure e-voting system"],"prefix":"10.1016","volume":"21","author":[{"given":"Dimitris A","family":"Gritzalis","sequence":"first","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0167-4048(02)01014-3_BIB1","unstructured":"Internet Policy Institute, Report of the National Workshop on Internet Voting: Issues and Research Agenda, March 2001 (http:\/\/www.internetpolicy.org\/research\/e_voting_report.pdf)."},{"key":"10.1016\/S0167-4048(02)01014-3_BIB2","unstructured":"The Swedish Government, Internet Voting \u2014 Final Report from the Election Technique Commission, 2000 (http:\/\/www.justitie.regeringen.se\/propositionermm\/sou\/pdf\/sou2000_125.pdf)."},{"key":"10.1016\/S0167-4048(02)01014-3_BIB3","doi-asserted-by":"crossref","unstructured":"Cramer R., Franklin M., Schoenmakers B., Yung M., \u201cMulti-authority secret ballot elections with linear work\u201d, Lecture Notes in Computer Science, Vol. 1070, pp. 72\u201383, Springer-Verlag, Berlin, 1996.","DOI":"10.1007\/3-540-68339-9_7"},{"key":"10.1016\/S0167-4048(02)01014-3_BIB4","doi-asserted-by":"crossref","unstructured":"Schoenmakers B., \u201cA simple publicly verifiable secret sharing scheme and its application to electronic voting\u201d, in Lecture Notes in Computer Science, Vol. 1666, pp. 148\u2013164, Springer-Verlag, 1999.","DOI":"10.1007\/3-540-48405-1_10"},{"key":"10.1016\/S0167-4048(02)01014-3_BIB5","doi-asserted-by":"crossref","unstructured":"Buttler R., et al., \u201cA national-scale authentication infrastructure\u201d, Computer, Vol. 33, no. 2, pp. 60\u201365, February 2000.","DOI":"10.1109\/2.889094"},{"key":"10.1016\/S0167-4048(02)01014-3_BIB6","doi-asserted-by":"crossref","unstructured":"Hoffman L., Cranor L., \u201cInternet voting for public officials\u201d, in Com. of the ACM, Vol. 44, no. 1, pp. 69\u201371, January 2001.","DOI":"10.1145\/357489.357510"},{"key":"10.1016\/S0167-4048(02)01014-3_BIB7","unstructured":"Jones B., A report on the feasibility of Internet voting, Internet Voting Task Force, State of California, January 2000."},{"key":"10.1016\/S0167-4048(02)01014-3_BIB8","unstructured":"CyberVote (IST-1999-20338 project), Report on electronic democracy projects, legal issues of Internet voting and users requirements analysis, European Commission, IST Programme, 1999 (http:\/\/www.eucybervote.org)."},{"key":"10.1016\/S0167-4048(02)01014-3_BIB9","unstructured":"United Sates, State of California, A Report on the Feasibility of Internet Voting, January 2000 (http:\/\/www.ss.ca.gov\/executive\/ivote\/)"},{"key":"10.1016\/S0167-4048(02)01014-3_BIB10","unstructured":"European Commission, IST 2000 Programme, The Information Society for all, Final Report, Brussels 2000."},{"key":"10.1016\/S0167-4048(02)01014-3_BIB11","unstructured":"Tauss J., Kollbeck J., e-vote: Die elektronische Briefwahl als ein Beitrag zur Verbesserung der Partizipationsm\u00f6glichkeiten (www.tauss.de\/bn\/e-vote.html)."},{"key":"10.1016\/S0167-4048(02)01014-3_BIB12","unstructured":"Internet Policy Institute, Report of the National Workshop on Internet Voting: Issues and Research Agenda, March 2001."},{"key":"10.1016\/S0167-4048(02)01014-3_BIB13","unstructured":"California Institute of Technology \u2014 MIT, Voting: What is, what could be, Voting Technology Project, July 2001."},{"key":"10.1016\/S0167-4048(02)01014-3_BIB14","unstructured":"e-VOTE (IST-2000-29518 project), Legal and regulatory issues on e-voting and data protection in Europe, Deliverable D3.4, European Commission, IST Programme, January 2002."},{"key":"10.1016\/S0167-4048(02)01014-3_BIB15","unstructured":"Kim A., \u201cTen things I want people to know about voting technology\u201d, Democracy Online Project\u2019s National Task Force, California Voter Foundation, January 2001."},{"key":"10.1016\/S0167-4048(02)01014-3_BIB16","unstructured":"Adler J., Internet Voting Primer (www.votehere.net\/adacompliant\/whitepapers\/primer)."},{"key":"10.1016\/S0167-4048(02)01014-3_BIB17","unstructured":"R\u00fc\u00df O., Wahlen im Internet, quelle multimedia und recht (http:\/\/www.Internetwahlen.de\/project\/ruess.html)."},{"key":"10.1016\/S0167-4048(02)01014-3_BIB18","doi-asserted-by":"crossref","unstructured":"Phillips D., von Spakovsky H., \u201cGauging the risks of Internet elections\u201d, in Com. of the ACM, Vol. 44, no. 1, pp. 73\u201385, January 2001.","DOI":"10.1145\/357489.357512"},{"key":"10.1016\/S0167-4048(02)01014-3_BIB19","unstructured":"Burkert H., \u201cElektronische Demokratie: Einige staats und verfassungsrechtliche Anmerkungen\u201c (http:\/\/www.gmd.de\/People\/Herbert.Burkert\/ARCHIV)."},{"key":"10.1016\/S0167-4048(02)01014-3_BIB20","unstructured":"International Working Group for Data Protection in Telecommunications, Common Position on the Use of the Internet in the Conduct of Elections, Berlin, September 2001."},{"key":"10.1016\/S0167-4048(02)01014-3_BIB21","unstructured":"Schoenmakers B., Compensating for a lack of transparency. (http:\/\/citeseer.nj.nec.com\/schoenmakers00compensating.html)."},{"key":"10.1016\/S0167-4048(02)01014-3_BIB22","unstructured":"Jacobson I., Booch G., Rumbaugh J., The Unified Software Development Process, Addison-Wesley, 1999."},{"key":"10.1016\/S0167-4048(02)01014-3_BIB23","unstructured":"Rational Corporation, The Rational Unified Process. (http:\/\/www.rational.com\/products\/rup\/index.jsp)"},{"key":"10.1016\/S0167-4048(02)01014-3_BIB24","unstructured":"Jacobson I., Object-oriented software engineering \u2014 a use case driven approach, Addison-Wesley, 1993."},{"key":"10.1016\/S0167-4048(02)01014-3_BIB25","unstructured":"Simons A., Graham I., 37 things that don\u2019t work in object-oriented modelling with UML, Technical Report TUM-I9813, Technical University of Munich, 1998."},{"key":"10.1016\/S0167-4048(02)01014-3_BIB26","unstructured":"Larman G., Applying UML and patterns, Prentice-Hall, 1998."},{"key":"10.1016\/S0167-4048(02)01014-3_BIB27","doi-asserted-by":"crossref","unstructured":"Ikonomopoulos S., Gritzalis D., Lambrinoudakis C., Kokolakis S., Vassiliou C., \u201cFunctional requirements for a secure electronic voting system\u201d, in Proc. of the 17th IFIP International Information Security Conference, M. Hadidi, et al. (Eds.), pp. 507\u2013520, Kluwer Academics, May 2002.","DOI":"10.1007\/978-0-387-35586-3_40"},{"key":"10.1016\/S0167-4048(02)01014-3_BIB28","doi-asserted-by":"crossref","unstructured":"Mitrou L., Gritzalis D., Katsikas S., \u201cRevisiting legal and regulatory requirements for secure e-voting\u201d, in Proc. of the 17th IFIP International Information Security Conference, M. Hadidi, et al. (Eds.), pp. 469\u2013480, Kluwer Academics, May 2002.","DOI":"10.1007\/978-0-387-35586-3_37"},{"key":"10.1016\/S0167-4048(02)01014-3_BIB29","doi-asserted-by":"crossref","unstructured":"Mercuri R., \u201cVoting automation?\u201d, in Com. of the ACM, Vol. 43, no. 2, pp. 176, February 2000.","DOI":"10.1145\/353360.353378"}],"container-title":["Computers &amp; Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404802010143?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404802010143?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,3,10]],"date-time":"2020-03-10T13:04:12Z","timestamp":1583845452000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167404802010143"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002,10]]},"references-count":29,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2002,10]]}},"alternative-id":["S0167404802010143"],"URL":"https:\/\/doi.org\/10.1016\/s0167-4048(02)01014-3","relation":{},"ISSN":["0167-4048"],"issn-type":[{"value":"0167-4048","type":"print"}],"subject":[],"published":{"date-parts":[[2002,10]]}}}