{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T11:06:39Z","timestamp":1725620799667},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,12]]},"DOI":"10.1109\/isias.2015.7492759","type":"proceedings-article","created":{"date-parts":[[2016,6,16]],"date-time":"2016-06-16T20:14:55Z","timestamp":1466108095000},"page":"140-145","source":"Crossref","is-referenced-by-count":7,"title":["An electronic voting system based on homomorphic encryption and prime numbers"],"prefix":"10.1109","author":[{"given":"Ali","family":"Azougaghe","sequence":"first","affiliation":[]},{"given":"Mustapha","family":"Hedabou","sequence":"additional","affiliation":[]},{"given":"Mostafa","family":"Belkasmi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","first-page":"469","article-title":"Taher ElGamal. A public key cryptosystem and a signature scheme based on discrete logarithms","year":"1985","journal-title":"IEEE Transactions on Information Theory"},{"key":"ref3","article-title":"Improving the Efficiency of Homomorphic Encryption Schemes","author":"hu","year":"2013","journal-title":"Th&#x00E8;se de doctorat Virginia Tech"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1145\/359340.359342"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1016\/j.comcom.2009.11.013"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/NSS.2009.57"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1016\/j.giq.2010.05.010"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1016\/j.jnca.2014.03.009"},{"key":"ref2","first-page":"1","article-title":"A hybrid approach to vector-based homomorphic tallying remote voting","author":"mateu","year":"2015","journal-title":"International Journal of Information Security"},{"year":"0","author":"rebecca","journal-title":"A Mathematical Approach to Fully Homomorphic Encryption A Major Qualifying Project Report Submitted to The Faculty of the Worcester Polytechnic Institute","key":"ref9"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/ICComm.2014.6866682"}],"event":{"name":"2015 11th International Conference on Information Assurance and Security (IAS)","start":{"date-parts":[[2015,12,14]]},"location":"Marrakech, Morocco","end":{"date-parts":[[2015,12,16]]}},"container-title":["2015 11th International Conference on Information Assurance and Security (IAS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7484378\/7492733\/07492759.pdf?arnumber=7492759","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,17]],"date-time":"2017-03-17T17:17:42Z","timestamp":1489771062000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7492759\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/isias.2015.7492759","relation":{},"subject":[],"published":{"date-parts":[[2015,12]]}}}