{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:58:12Z","timestamp":1729619892868,"version":"3.28.0"},"reference-count":38,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1109\/hicss.2004.1265297","type":"proceedings-article","created":{"date-parts":[[2004,6,10]],"date-time":"2004-06-10T10:19:45Z","timestamp":1086862785000},"page":"7 pp.","source":"Crossref","is-referenced-by-count":1,"title":["The role of digital signature cards in electronic voting"],"prefix":"10.1109","author":[{"given":"R.","family":"Kofler","sequence":"first","affiliation":[]},{"given":"R.","family":"Krimmer","sequence":"additional","affiliation":[]},{"given":"A.","family":"Prosser","sequence":"additional","affiliation":[]},{"given":"M.-K.","family":"Unger","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Grundri? des &#x00F6;sterreichischen Bundesverfassungsrechts","year":"2000","author":"walter","key":"ref38"},{"key":"ref33","first-page":"393","author":"sako","year":"1995","journal-title":"Receipt-Free Mix-Type Voting Scheme In Lecture Notes in Computer Science 921 Advances in Cryptology Eurocrypt 95"},{"key":"ref32","first-page":"2001?11?19","article-title":"Cryptography and Information Security Group Research Project","author":"rivest","year":"0"},{"key":"ref31","first-page":"545","volume":"44","author":"prosser","year":"2002","journal-title":"M&#x00FC;ller-T&#x00F6;r&#x00F6;k R E-Democracy Eine neue Qualit&#x00E4;t im demokratischen Entscheidungsprozess In Wirtschaftsinformatik"},{"journal-title":"M&#x00FC;ller-T&#x00F6;r&#x00F6;k R Ein Algorithmus zur sicheren elektronischen Stimmabgabe &#x00FC;ber das Internet Proceedings of the International Conference on Operations Research OR 2002","year":"2002","author":"prosser","key":"ref30"},{"year":"2000","author":"tilborg van","key":"ref37"},{"journal-title":"Applied Cryptography Addison-Wesley Boston","year":"1996","author":"schneier","key":"ref36"},{"journal-title":"Soundcode VoteHere Inc Compaq Computer Corp Cisco Systems Inc Entrust Inc VoteHere Gold Soundcode Inc Bellevue 2001","first-page":"7","year":"2001","key":"ref35"},{"key":"ref34","first-page":"283","author":"salomaa","year":"1991","journal-title":"Verifying and Recasting Secret Ballots in Computer Networks"},{"key":"ref10","first-page":"103","author":"cramer","year":"1997","journal-title":"A Secure and Optimally Efficient Multi-Authority Election Scheme In Advances in Cryptology-EUROCRYPT'97 Lecture Notes in Computer Science 1233"},{"journal-title":"European Union Directive 1999\/93\/EC","first-page":"12","year":"2002","key":"ref11"},{"journal-title":"Digital Certificates - Applied Internet Security Addison-Wesley Reading 1999","year":"0","author":"feghhi","key":"ref12"},{"journal-title":"Gemeinde Fellbach Jugendgemeinderat Fellbach","first-page":"11","year":"2001","key":"ref13"},{"key":"ref14","first-page":"244","author":"fujioka","year":"1993","journal-title":"A Practical Secret Voting Scheme for Large Scale Elections-advances in Cryptology"},{"key":"ref15","first-page":"154","author":"hassler","year":"1995","journal-title":"R A LAN voting protocol In IFIP\/SEC 95 Capetown"},{"key":"ref16","first-page":"149","article-title":"Blind Multisignatures and their relevance for Electronic Voting. In: IEEE-Press","author":"horster","year":"1995","journal-title":"11th Annual Computer Security Applications Conference"},{"key":"ref17","first-page":"125","author":"horster","year":"1996","journal-title":"Some Remarks on a Receipt-Free and Universally Verifiable Mix-Type Voting Scheme In Asiacrypt'96 LNCS 163"},{"journal-title":"Internet Policy Institute Report on the National Workshop on Internet Voting Issues and Research Agenda","first-page":"2001?11?20","year":"2001","key":"ref18"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"448","DOI":"10.1007\/BFb0054145","author":"jakobsson","year":"1998","journal-title":"A Practical Mix In Advances in Cryptology - EUROCRYPT '98"},{"key":"ref28","first-page":"248","author":"park","year":"1994","journal-title":"All\/Nothing Election Scheme and Anonymous Channel"},{"journal-title":"A Practical Electronic Voting Protocol Using Threshold Schemes","year":"1994","author":"baraani-dastjerdi","key":"ref4"},{"key":"ref27","first-page":"373","author":"pfitzmann","year":"1989","journal-title":"How to Break the Direct RS A-Implementation of Mixes"},{"key":"ref3","first-page":"234","author":"brassard","year":"1987","journal-title":"All-or-Nothing Disclosure of Secrets In Lecture Notes in Computer Science 263 Advances in Cryptology Crypto 86"},{"journal-title":"Chancellerie d'Etat de Gen&#x00E8;ve Cahier des charges e-voting","first-page":"3","year":"2003","key":"ref6"},{"key":"ref29","first-page":"1061","author":"prosser","year":"2001","journal-title":"M&#x00FC;ller-T&#x00F6;r&#x00F6;k R Electronic Voting via The Internet In 3rd International Conference on Enterprise Information Systems ICEIS-2001"},{"journal-title":"Practical Approach to Anonymity in Large Scale Electronic Voting Schemes In Universitat Aut&#x00F3;noma de Barcelona","year":"1999","author":"borrell","key":"ref5"},{"key":"ref8","first-page":"227","article-title":"Blinding for Unanticipated Signatures","author":"chaum","year":"1987","journal-title":"Advances in Cryptology - Eurocrypt"},{"key":"ref7","first-page":"84","volume":"24","author":"chaum","year":"1981","journal-title":"Untraceable Electronic Mail Return Address and Digital Pseudonyms"},{"journal-title":"a-trust Certificate Policy f&#x00FC;r qualifizierte a sign Premium Zertifikate f&#x00FC;r sichere Signaturen Version 1 0 Vienna 2003","year":"0","key":"ref2"},{"journal-title":"Sensus A Security-Conscious Electronic Polling System for the Internet In Proceedings of the Hawai International Conference on System Sciences (HICSS-97)","year":"2001","author":"cranor","key":"ref9"},{"key":"ref1","first-page":"437","author":"abe","year":"1998","journal-title":"Universally Verifiable Mix-net with Verification Work Independent of the Number of Mix Servers Advances in Cryptology-EUROCRYPT'98"},{"key":"ref20","first-page":"11","author":"jakobsson","year":"2002","journal-title":"Flash Mixing"},{"key":"ref22","first-page":"307","author":"niemi","year":"1994","journal-title":"Cryptographic protocols and voting"},{"year":"2002","author":"krimmer","key":"ref21"},{"key":"ref24","first-page":"553","volume":"36","author":"nurmi","year":"1991","journal-title":"Secret Ballot Elections in Computer Networks"},{"key":"ref23","first-page":"164","author":"niemi","year":"1995","journal-title":"How to Prevent the Buying of Votes"},{"key":"ref26","first-page":"21","author":"okamoto","year":"1996","journal-title":"An Electronic Voting Scheme IFIP'96 Advanced IT Tools"},{"journal-title":"OCG Austrian Computer Society Membership Card Vienna","first-page":"12","year":"2002","key":"ref25"}],"event":{"name":"37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the","start":{"date-parts":[[2004,1,8]]},"location":"Big Island, HI, USA","end":{"date-parts":[[2004,1,8]]}},"container-title":["37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8934\/28293\/01265297.pdf?arnumber=1265297","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T03:56:16Z","timestamp":1497585376000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1265297\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/hicss.2004.1265297","relation":{},"subject":[],"published":{"date-parts":[[2004]]}}}