{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:56:37Z","timestamp":1750308997081,"version":"3.41.0"},"reference-count":6,"publisher":"Association for Computing Machinery (ACM)","issue":"10","license":[{"start":{"date-parts":[[2004,10,1]],"date-time":"2004-10-01T00:00:00Z","timestamp":1096588800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Commun. ACM"],"published-print":{"date-parts":[[2004,10]]},"abstract":"<jats:p>An extensive assessment of a proposed Internet-based voting system.<\/jats:p>","DOI":"10.1145\/1022594.1022624","type":"journal-article","created":{"date-parts":[[2004,10,7]],"date-time":"2004-10-07T17:38:56Z","timestamp":1097170736000},"page":"59-64","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":64,"title":["Analyzing internet voting security"],"prefix":"10.1145","volume":"47","author":[{"given":"David","family":"Jefferson","sequence":"first","affiliation":[{"name":"Lawrence Livermore National Laboratory"}]},{"given":"Aviel D.","family":"Rubin","sequence":"additional","affiliation":[{"name":"Johns Hopkins University"}]},{"given":"Barbara","family":"Simons","sequence":"additional","affiliation":[]},{"given":"David","family":"Wagner","sequence":"additional","affiliation":[{"name":"University of California at Berkeley"}]}],"member":"320","published-online":{"date-parts":[[2004,10]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"California Secretary of State Ad Hoc Touchscreen Voting Task Force Report; www.ss.ca.gov\/elections\/taskforce_report.htm.  California Secretary of State Ad Hoc Touchscreen Voting Task Force Report; www.ss.ca.gov\/elections\/taskforce_report.htm."},{"key":"e_1_2_1_3_1","unstructured":"Jefferson D.R. Rubin A.D. Simons B. and Wagner D. A Security Analysis of the Secure Electronic Registration and Voting Experiment (SERVE); www.servesecurityreport.org\/.  Jefferson D.R. Rubin A.D. Simons B. and Wagner D. A Security Analysis of the Secure Electronic Registration and Voting Experiment (SERVE); www.servesecurityreport.org\/."},{"key":"e_1_2_1_4_1","volume-title":"Analysis of an electronic voting system","author":"Kohno T.","year":"2004","unstructured":"Kohno , T. , Stubblefield , A. , Rubin , A.D. , Wallach , D.S. Analysis of an electronic voting system . IEEE Security and Privacy ( 2004 ). Kohno, T., Stubblefield, A., Rubin, A.D., Wallach, D.S. Analysis of an electronic voting system. IEEE Security and Privacy (2004)."},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1219056"},{"key":"e_1_2_1_6_1","doi-asserted-by":"crossref","DOI":"10.21236\/ADA400003","volume-title":"Inferring Internet denial-of-service activity. Usenix Security","author":"Moore D.","year":"2001","unstructured":"Moore , D. , Voelker , G.M. , and Savage , S . Inferring Internet denial-of-service activity. Usenix Security ( 2001 ). Moore, D., Voelker, G.M., and Savage, S. Inferring Internet denial-of-service activity. Usenix Security (2001)."},{"key":"e_1_2_1_7_1","volume-title":"How to own the Internet in your spare time. Usenix Security","author":"Staniford S.","year":"2002","unstructured":"Staniford , S. , Paxson , V. , and Weaver , N . How to own the Internet in your spare time. Usenix Security ( 2002 ). Staniford, S., Paxson, V., and Weaver, N. How to own the Internet in your spare time. Usenix Security (2002)."}],"container-title":["Communications of the ACM"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1022594.1022624","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1022594.1022624","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T21:41:25Z","timestamp":1750282885000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1022594.1022624"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,10]]},"references-count":6,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2004,10]]}},"alternative-id":["10.1145\/1022594.1022624"],"URL":"https:\/\/doi.org\/10.1145\/1022594.1022624","relation":{},"ISSN":["0001-0782","1557-7317"],"issn-type":[{"type":"print","value":"0001-0782"},{"type":"electronic","value":"1557-7317"}],"subject":[],"published":{"date-parts":[[2004,10]]},"assertion":[{"value":"2004-10-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}