{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T12:41:37Z","timestamp":1770727297683,"version":"3.49.0"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,2,23]],"date-time":"2022-02-23T00:00:00Z","timestamp":1645574400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,2,23]],"date-time":"2022-02-23T00:00:00Z","timestamp":1645574400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,2,23]]},"DOI":"10.1109\/csicc55295.2022.9780507","type":"proceedings-article","created":{"date-parts":[[2022,5,27]],"date-time":"2022-05-27T21:49:58Z","timestamp":1653688198000},"page":"1-7","source":"Crossref","is-referenced-by-count":9,"title":["A decentralized and trustless e-voting system based on blockchain technology"],"prefix":"10.1109","author":[{"given":"Daria","family":"Golnarian","sequence":"first","affiliation":[{"name":"University of Tehran,School of Electrical and Computer Engineering, College of Engineering,Tehran,Iran"}]},{"given":"Kimia","family":"Saedi","sequence":"additional","affiliation":[{"name":"University of Tehran,School of Electrical and Computer Engineering, College of Engineering,Tehran,Iran"}]},{"given":"Behnam","family":"Bahrak","sequence":"additional","affiliation":[{"name":"University of Tehran,School of Electrical and Computer Engineering, College of Engineering,Tehran,Iran"}]}],"member":"263","reference":[{"key":"ref10","article-title":"Verify-YourVote: A Verifiable Blockchain-Based Online Voting Protocol","author":"chaieb","year":"2018","journal-title":"EMCIS"},{"key":"ref11","article-title":"Decentralized EVoting Systems Based on the Blockchain Technology","author":"hsiao","year":"2017","journal-title":"CSA\/CUTE"},{"key":"ref12","article-title":"Voting Process with Blockchain Technology: Auditable Blockchain Voting System","author":"pawlak","year":"2018","journal-title":"INCoS"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2018.00151"},{"key":"ref14","article-title":"An e-voting system based on blockchain and ring signature","author":"wu","year":"2017","journal-title":"Master University of Birmingham"},{"key":"ref15","first-page":"1","article-title":"The future of democracy: Blockchain voting","author":"osgood","year":"2016","journal-title":"COMP116 Information Security"},{"key":"ref16","article-title":"Helios: Web-based Open-Audit Voting","author":"adida","year":"2008","journal-title":"USENIX Security Symposium"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107234"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2090236.2090263"},{"key":"ref19","first-page":"31","article-title":"A review of contemporary e-voting: Requirements, technology, systems and usability","volume":"1","author":"wang","year":"2017","journal-title":"Data Science and Pattern Recognition"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/IMCET.2018.8603050"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2018.8554652"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ISDFS.2018.8355340"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.5121\/ijnsa.2017.9301"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3345035.3345080"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2895670"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70972-7_20"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-99136-8_20"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/WorldS4.2018.8611593"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-019-00465-8"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.11.005"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICCMC48092.2020.ICCMC-00046"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-49264-X_32"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.3390\/sym12081328"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-018-0461-x"},{"key":"ref25","article-title":"How to prove yourself: Practical solutions to identification and signature problems","author":"fiat","year":"1986","journal-title":"Conference on the Theory and Application of Cryptographic Techniques"}],"event":{"name":"2022 27th International Computer Conference, Computer Society of Iran (CSICC)","location":"Tehran, Iran, Islamic Republic of","start":{"date-parts":[[2022,2,23]]},"end":{"date-parts":[[2022,2,24]]}},"container-title":["2022 27th International Computer Conference, Computer Society of Iran (CSICC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9780464\/9780394\/09780507.pdf?arnumber=9780507","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T20:48:17Z","timestamp":1658177297000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9780507\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,23]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/csicc55295.2022.9780507","relation":{},"subject":[],"published":{"date-parts":[[2022,2,23]]}}}