{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:09:58Z","timestamp":1759133398665,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,1]]},"DOI":"10.1109\/nsyss.2017.7885795","type":"proceedings-article","created":{"date-parts":[[2017,3,28]],"date-time":"2017-03-28T02:57:57Z","timestamp":1490669877000},"page":"12-20","source":"Crossref","is-referenced-by-count":7,"title":["A new e-voting scheme based on revised simplified verifiable re-encryption mixnet"],"prefix":"10.1109","author":[{"given":"Nazmul","family":"Islam","sequence":"first","affiliation":[]},{"given":"Kazi Md. Rokibul","family":"Alam","sequence":"additional","affiliation":[]},{"given":"Shinsuke","family":"Tamura","sequence":"additional","affiliation":[]},{"given":"Yasuhiko","family":"Morimoto","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2015.1107154"},{"key":"ref11","first-page":"32","article-title":"An Incoercible E-Voting Scheme based on Revised Simplified Verifiable Re-encryption Mix-nets","volume":"3","author":"tamura","year":"2015","journal-title":"Information Security and Computer Fraud Science and Education Publishing"},{"key":"ref12","first-page":"10","article-title":"Enhancement of Anonymous Tag based Credentials","volume":"2","author":"tamura","year":"2014","journal-title":"Information Security and Computer Fraud Science and Education Publishing"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1145\/2728816.2728823","article-title":"Formal verification of e-voting: solutions and challenges","volume":"2","author":"cortier","year":"2015","journal-title":"ACM SIGLOG News"},{"key":"ref14","first-page":"229","article-title":"The Security and the Credibility Challenges in e-Voting Systems","author":"rana","year":"2015","journal-title":"Proc of the 14th European Conference on Cyber Warfare and Security ECCWS 2015"},{"key":"ref15","first-page":"98","article-title":"Challenges of Electronic Voting-A Survey","volume":"4","author":"elewa","year":"2015","journal-title":"Advances in Computer Science An International Journal"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45539-6_38"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-74725-5"},{"key":"ref6","first-page":"1","article-title":"Simplified Verifiable Re-encryption Mixnets","volume":"1","author":"tamura","year":"2013","journal-title":"Inform Security Comput Fraud"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1504\/IJWMC.2014.063083"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2005.11.003"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"435","DOI":"10.1016\/j.compeleceng.2009.11.001","article-title":"An efficient anonymous authentication mechanism for delay tolerant networks","volume":"36","author":"renwang","year":"2010","journal-title":"Computers & Electrical Engineering"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"2065","DOI":"10.1541\/ieejeiss.130.2065","article-title":"An anonymous voting scheme based on confirmation numbers","volume":"130","author":"rokibul","year":"2010","journal-title":"IEEE Trans EI"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(13)70111-8"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2014.6911807"}],"event":{"name":"2017 International Conference on Networking, Systems and Security (NSysS)","start":{"date-parts":[[2017,1,5]]},"location":"Dhaka, Bangladesh","end":{"date-parts":[[2017,1,8]]}},"container-title":["2017 International Conference on Networking, Systems and Security (NSysS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7879538\/7885667\/07885795.pdf?arnumber=7885795","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,4]],"date-time":"2020-10-04T12:53:30Z","timestamp":1601816010000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7885795\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,1]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/nsyss.2017.7885795","relation":{},"subject":[],"published":{"date-parts":[[2017,1]]}}}