{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,14]],"date-time":"2025-06-14T20:01:30Z","timestamp":1749931290682,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1109\/eee.2004.1287296","type":"proceedings-article","created":{"date-parts":[[2004,6,10]],"date-time":"2004-06-10T10:19:45Z","timestamp":1086862785000},"page":"113-116","source":"Crossref","is-referenced-by-count":2,"title":["An e-voting scheme against bribe and coercion"],"prefix":"10.1109","author":[{"family":"Wei-Chi Ku","sequence":"first","affiliation":[]},{"family":"Chun-Ming Ho","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","first-page":"393","article-title":"Receipt-free mix-type voting scheme - A practical solution to the implementation of a voting booth","volume":"921","author":"sako","year":"1995","journal-title":"EUROCRYPT'95 Vol 921 of LNCS"},{"year":"0","key":"18"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1007\/0-306-47009-8_50"},{"key":"16","article-title":"A practical large scale secret voting scheme based on non-anonymous channels","author":"okamoto","year":"1993","journal-title":"Proc of SCIS93 IC"},{"key":"13","first-page":"186","article-title":"How to prove yourself: Practical solutions to identification and signature problems","volume":"263","author":"fiat","year":"1986","journal-title":"CRYPTO'86 Vol 263 of LNCS"},{"key":"14","first-page":"539","article-title":"Efficient receipt-free voting based on homomorphic encryption","volume":"1807","author":"hirt","year":"2000","journal-title":"EUROCRYPT 2000 Vol 1807 of LNCS"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1985.1057074"},{"key":"12","first-page":"244","article-title":"A practical secret voting scheme for large scale elections","author":"fujioka","year":"1992","journal-title":"AUSCRYPT'92"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/195058.195407"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46885-4_58"},{"key":"1","first-page":"234","article-title":"Some applications of multiple key ci phers","author":"boyd","year":"1987","journal-title":"EUROCRYPT'88"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45961-8_15"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4460080506"},{"key":"6","first-page":"72","article-title":"Multi-authority secret-ballot elections with linear work","volume":"1070","author":"cramer","year":"1996","journal-title":"EUROCRYPT'96 Vol 1070 of LNCS"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1985.2"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/10590.10595"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"journal-title":"EUROCRYPT'97","year":"0","key":"8"}],"event":{"name":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","start":{"date-parts":[[2004,3,31]]},"location":"Taipei, Taiwan","end":{"date-parts":[[2004,3,31]]}},"container-title":["IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9045\/28698\/01287296.pdf?arnumber=1287296","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,13]],"date-time":"2017-03-13T15:00:54Z","timestamp":1489417254000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1287296\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/eee.2004.1287296","relation":{},"subject":[],"published":{"date-parts":[[2004]]}}}