{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,5]],"date-time":"2025-10-05T19:55:06Z","timestamp":1759694106027,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,10]]},"DOI":"10.1109\/redundancy48165.2019.9003336","type":"proceedings-article","created":{"date-parts":[[2020,2,21]],"date-time":"2020-02-21T00:43:17Z","timestamp":1582245797000},"page":"219-223","source":"Crossref","is-referenced-by-count":9,"title":["Transparent E-Voting dApp Based on Waves Blockchain and RIDE Language"],"prefix":"10.1109","author":[{"given":"Nazim","family":"Faour","sequence":"first","affiliation":[]}],"member":"263","reference":[{"article-title":"A Smart Contract for Boardroom Voting with Maximum Voter Privacy","year":"0","author":"mccorry","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2008.0127"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"key":"ref13","first-page":"354368","article-title":"Civitas: Toward a secure voting system","author":"clarkson","year":"2008","journal-title":"IEEE Symposium on Security and Privacy"},{"key":"ref14","article-title":"Every vote counts: Ensuring integrity in large-scale electronic voting","volume":"1","author":"hao","year":"2014","journal-title":"USENIX Journal of Election Technology and Systems"},{"key":"ref15","first-page":"165","article-title":"An internet voting system supporting user privacy","author":"kiayias","year":"2006","journal-title":"Computer Security Applications Conference 2006 ACSAC06 22nd Annual"},{"key":"ref16","article-title":"Electing a university president using open-audit voting: Analysis of real-world use of helios","author":"adida","year":"2009","journal-title":"Proceedings of the Electronic Voting Technology Workshop\/Workshop on Trustworthy Elections (EVT\/WOTE)"},{"journal-title":"Practical high certainty intent verification for encrypted votes","year":"2004","author":"andrew neff","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2009.2033233"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45741-3_12"},{"year":"0","key":"ref28"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301313"},{"year":"0","key":"ref27"},{"key":"ref3","article-title":"Secure electronic voting over the world wide web","author":"herschberg","year":"1997","journal-title":"Diss"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-4666-5820-2.ch002"},{"key":"ref29","article-title":"Votebook. A proposal for a blockchain-based electronic voting system","author":"kirby","year":"0","journal-title":"The Economist"},{"key":"ref5","first-page":"2535","article-title":"Receipt-free electronic voting schemes for large scale elections","author":"okamoto","year":"1998","journal-title":"Security Protocols 5th Int Workshop LNCS 1361"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1016\/j.cosrev.2013.08.002","article-title":"Privacy and verifiability in voting systems: Methods, developments and trends","volume":"10","author":"jonker","year":"2013","journal-title":"Computer Science Review"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"year":"0","key":"ref9"},{"key":"ref1","first-page":"171","article-title":"An Overview of End-to-End Verifiable Voting Systems","author":"ali","year":"2016","journal-title":"Real-World Electronic Voting Design Analysis and Deployment"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2004.1264852"},{"key":"ref22","first-page":"113","article-title":"Scantegrity II: End-to-End Verifiability for Optical Scan Election Systems using Invisible Ink Confirmation Codes. EVT","volume":"8","author":"chaum","year":"2008"},{"key":"ref21","first-page":"1837","article-title":"STAR-Vote: A secure, transparent, auditable, and reliable voting system","volume":"1","author":"bell","year":"2013","journal-title":"USENIX Journal of Election Technology and Systems"},{"key":"ref24","first-page":"141158","article-title":"Self-tallying elections and perfect ballot secrecy","author":"kiayias","year":"2002","journal-title":"Workshop on Public Key Cryptography"},{"key":"ref23","first-page":"90104","article-title":"Efficient maximal privacy in boardroom voting and anonymous broadcast","author":"groth","year":"2004","journal-title":"International Conference on Financial Cryptography"},{"year":"0","key":"ref26"},{"year":"0","key":"ref25"}],"event":{"name":"2019 XVI International Symposium \"Problems of Redundancy in Information and Control Systems\" (REDUNDANCY)","start":{"date-parts":[[2019,10,21]]},"location":"Moscow, Russia","end":{"date-parts":[[2019,10,25]]}},"container-title":["2019 XVI International Symposium \"Problems of Redundancy in Information and Control Systems\" (REDUNDANCY)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8985168\/9003308\/09003336.pdf?arnumber=9003336","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,17]],"date-time":"2022-07-17T17:53:34Z","timestamp":1658080414000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9003336\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/redundancy48165.2019.9003336","relation":{},"subject":[],"published":{"date-parts":[[2019,10]]}}}