{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,2]],"date-time":"2025-10-02T10:38:00Z","timestamp":1759401480389},"reference-count":11,"publisher":"Oxford University Press (OUP)","issue":"6","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Logic and Computation"],"published-print":{"date-parts":[[2010,12,1]]},"DOI":"10.1093\/logcom\/exq013","type":"journal-article","created":{"date-parts":[[2010,3,10]],"date-time":"2010-03-10T01:40:42Z","timestamp":1268185242000},"page":"1251-1288","source":"Crossref","is-referenced-by-count":7,"title":["Role Interchange for Anonymity and Privacy of Voting"],"prefix":"10.1093","volume":"20","author":[{"given":"K.","family":"Mano","sequence":"first","affiliation":[]},{"given":"Y.","family":"Kawabe","sequence":"additional","affiliation":[]},{"given":"H.","family":"Sakurada","sequence":"additional","affiliation":[]},{"given":"Y.","family":"Tsukada","sequence":"additional","affiliation":[]}],"member":"286","published-online":{"date-parts":[[2010,3,9]]},"reference":[{"key":"2_36761909","doi-asserted-by":"crossref","first-page":"427","DOI":"10.1016\/j.tcs.2003.12.023","volume":"322","year":"2004","journal-title":"THEORETICAL COMPUTER SCIENCE"},{"key":"3_30945463","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1007\/s00145-001-0014-7","volume":"15","year":"2002","journal-title":"JOURNAL OF CRYPTOLOGY"},{"key":"8_36761910","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","year":"1981","journal-title":"Communications of the ACM","ISSN":"http:\/\/id.crossref.org\/issn\/0001-0782","issn-type":"print"},{"key":"11_36761911","doi-asserted-by":"crossref","first-page":"191","DOI":"10.3233\/JCS-1999-72-304","volume":"7","year":"1999","journal-title":"JOURNAL OF COMPUTER SECURITY"},{"key":"14_38614321","first-page":"53","volume":"Vol. 5","year":"2005","journal-title":"ADVANCES IN MODAL LOGIC"},{"key":"17_36761913","doi-asserted-by":"crossref","first-page":"483","DOI":"10.3233\/JCS-2005-13305","volume":"13","year":"2005","journal-title":"JOURNAL OF COMPUTER SECURITY"},{"key":"19_36761914","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1145\/605434.605436","volume":"6","year":"2003","journal-title":"ACM TRANS INFORMATION AND SYSTEM SECURITY"},{"key":"20_26526863","doi-asserted-by":"crossref","first-page":"674","DOI":"10.1137\/S0097539797320906","volume":"33","year":"2004","journal-title":"SIAM JOURNAL ON COMPUTING"},{"key":"21_36761915","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1016\/j.tcs.2005.03.003","volume":"340","year":"2005","journal-title":"THEORETICAL COMPUTER SCIENCE"},{"key":"22_36761916","doi-asserted-by":"crossref","first-page":"3","DOI":"10.3233\/JCS-2004-12102","volume":"12","year":"2004","journal-title":"JOURNAL OF COMPUTER SECURITY"},{"key":"27_30945473","doi-asserted-by":"crossref","first-page":"99","DOI":"10.3233\/JCS-2004-12105","volume":"12","year":"2004","journal-title":"JOURNAL OF COMPUTER SECURITY"}],"container-title":["Journal of Logic and Computation"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/academic.oup.com\/logcom\/article-pdf\/20\/6\/1251\/2783746\/exq013.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,27]],"date-time":"2019-02-27T03:45:18Z","timestamp":1551239118000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/logcom\/article-lookup\/doi\/10.1093\/logcom\/exq013"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,3,9]]},"references-count":11,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2010,11,15]]},"published-print":{"date-parts":[[2010,12,1]]}},"URL":"https:\/\/doi.org\/10.1093\/logcom\/exq013","relation":{},"ISSN":["0955-792X","1465-363X"],"issn-type":[{"value":"0955-792X","type":"print"},{"value":"1465-363X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,3,9]]}}}