{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T17:40:58Z","timestamp":1776102058951,"version":"3.50.1"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,10]]},"DOI":"10.1109\/evote.2014.7001135","type":"proceedings-article","created":{"date-parts":[[2015,1,13]],"date-time":"2015-01-13T21:35:10Z","timestamp":1421184910000},"page":"1-8","source":"Crossref","is-referenced-by-count":45,"title":["Verifiable internet voting in Estonia"],"prefix":"10.1109","author":[{"given":"Sven","family":"Heiberg","sequence":"first","affiliation":[]},{"given":"Jan","family":"Willemson","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"1837","article-title":"Classifying privacy and verifiability requirements for electronic voting","author":"langer","year":"2009","journal-title":"GI Jahrestagung"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04135-8_7"},{"key":"18","first-page":"33","article-title":"The use of E-voting in the austrian federation of students elections 2009","author":"krimmer","year":"2010","journal-title":"4th International Conference on Electronic Voting 2010 Lecture Notes in Informatics"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2005.132"},{"key":"16","author":"jefferson","year":"2004","journal-title":"A Security Analysis of the Secure Electronic Registration and Voting Experiment (SERVE"},{"key":"13","first-page":"208","article-title":"The application of i-voting for estonian parliamentary elections of 2011","author":"heiberg","year":"2011","journal-title":"VotelD 2011 Volume 7187 of LNCS"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-4666-5820-2.ch007"},{"key":"11","author":"gj\ufffdsteen","year":"2010","journal-title":"Analysis of An Internet Voting Protocol Cryptology EPrint Archive Report 2010\/380"},{"key":"12","author":"halderman","year":"2014","journal-title":"Security Analysis of the Estonian Internet Voting System"},{"key":"21","author":"neff","year":"2003","journal-title":"Election Confidence"},{"key":"20","first-page":"15","article-title":"E-voting in Estoniapy1 2005. The first practice of country-wide binding Internet voting in the world","author":"madise","year":"2006","journal-title":"Electronic Voting 2006 Proceedings of the 2nd International Workshop LNI GI Series"},{"key":"22","year":"2011","journal-title":"OSCE\/ODIHR Election Assessment Mission Report"},{"key":"23","article-title":"Performance requirements for end-to-end verifiable elections","author":"popoveniuc","year":"2010","journal-title":"Proceedings of the 2010 International Conference on Electronic Voting Technology\/workshop on Trustworthy Elections EVT\/WOTE'10"},{"key":"24","year":"2001","journal-title":"Voting What Is What Could Be Technical Report Caltech\/MIT"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2009.2033233"},{"key":"26","first-page":"107","article-title":"How to create trust in electronic voting over an untrusted platform","author":"skagestein","year":"2006","journal-title":"Electronic Voting Volume 86 of LNI"},{"key":"27","first-page":"21","article-title":"When reality comes knocking. Norwegian experiences with verifiable electronic voting","author":"stenerud","year":"2012","journal-title":"5th International Conference on Electronic Voting 2012 Lecture Notes in Informatics"},{"key":"3","year":"2004","journal-title":"Legal Operational and Technical Standards for e-Voting"},{"key":"2","year":"2014","journal-title":"Report of the National Workshop on Internet Voting Issues and Research Agenda Internet Policy Institute"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22961-9_5"},{"key":"1","year":"2000","journal-title":"Zweiter Zwis-chenbericht Zum Projekt Strategische Initia-tive Wahlenim internet'Nach Abschlussder Wahlenzum Studierenden-parlament der Universitat Osnabriick Am 2"},{"key":"7","first-page":"35","article-title":"Internet voting and individual verifiability: The norwegian return codes","author":"barrat","year":"2012","journal-title":"5th International Conference on Electronic Voting 2012 (EVOTE2012) Volume 205 of LNI - Lecture Notes in Informatics"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1179601.1179607"},{"key":"5","first-page":"335","article-title":"Helios: Web-based open-audit voting","author":"adida","year":"2008","journal-title":"Proceedings of The 17th Conference on Security Symposium"},{"key":"4","year":"2014","journal-title":"The Geneva Internet Voting System"},{"key":"9","article-title":"Scantegrity II: End-to-end verifiability for optical scan election systems using invisible ink confirmation codes","author":"chaum","year":"2008","journal-title":"Proceedings Ofthe Conference on Electronic Voting Technology EVT'08"},{"key":"8","author":"bull","year":"2013","journal-title":"Problems Encountered Seminar on Internet Voting"}],"event":{"name":"2014 6th International Conference on Electronic Voting: Verifying the Vote (EVOTE)","location":"Lochau \/ Bregenz, Austria","start":{"date-parts":[[2014,10,29]]},"end":{"date-parts":[[2014,10,31]]}},"container-title":["2014 6th International Conference on Electronic Voting: Verifying the Vote (EVOTE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6994956\/7001108\/07001135.pdf?arnumber=7001135","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T05:18:12Z","timestamp":1490332692000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7001135\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/evote.2014.7001135","relation":{},"subject":[],"published":{"date-parts":[[2014,10]]}}}