{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,28]],"date-time":"2025-06-28T06:23:16Z","timestamp":1751091796968},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1109\/glocom.2013.6831182","type":"proceedings-article","created":{"date-parts":[[2014,6,20]],"date-time":"2014-06-20T22:05:38Z","timestamp":1403301938000},"page":"867-871","source":"Crossref","is-referenced-by-count":7,"title":["RE-NOTE: An E-voting scheme based on ring signature and clash attack protection"],"prefix":"10.1109","author":[{"family":"Haijun Pan","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Edwin","family":"Hou","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Nirwan","family":"Ansari","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/ICESS.Symposia.2008.54"},{"key":"22","first-page":"346","author":"konheim","year":"1981","journal-title":"Cryptography A Primer"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2012.6364331"},{"key":"18","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1007\/978-3-540-31979-5_5","article-title":"Short linkable ring signatures for e-voting, e-cash and attestation?","author":"tsang","year":"2005","journal-title":"Proc First International Conference on Information Security Practice and Experience (ISPEC 2005)"},{"key":"15","first-page":"552","article-title":"How to leak a secret","author":"rivest","year":"2001","journal-title":"Proc of Advances in Cryptology-Asiacrypt"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/SARNOF.2011.5876452"},{"key":"13","article-title":"DIMACS workshop on electronic voting theory and practice","author":"jakobsson","year":"2004","journal-title":"DIMACS Center"},{"key":"14","first-page":"261","article-title":"Internet voting: Concerns and solutions","author":"wu","year":"2002","journal-title":"Proceedings of First International Symposium on Cyber Worlds"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2008.62"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301313"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/WECWIS.2001.933922"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2009.0189"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240653"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.32"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/ITRE.2005.1503133"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.1997.661700"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-0602-4_18"},{"key":"5","article-title":"An introduction to punchscan","author":"popovenuic","year":"2006","journal-title":"Proc of Workshop on Trustworthy Elections"},{"year":"2006","author":"chaum","key":"4"},{"key":"9","first-page":"251","article-title":"Secret Sharing Homomorphisms: Keeping shares of a secret secret","author":"benaloh","year":"1987","journal-title":"Proc 1986 Advances in Cryptology (CRYPTO'86)"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/ICPADS.2001.934844"}],"event":{"name":"2013 IEEE Global Communications Conference (GLOBECOM 2013)","start":{"date-parts":[[2013,12,9]]},"location":"Atlanta, GA","end":{"date-parts":[[2013,12,13]]}},"container-title":["2013 IEEE Global Communications Conference (GLOBECOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6821297\/6831034\/06831182.pdf?arnumber=6831182","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T11:20:13Z","timestamp":1498130413000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6831182\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/glocom.2013.6831182","relation":{},"subject":[],"published":{"date-parts":[[2013,12]]}}}