{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T12:45:06Z","timestamp":1776084306716,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,9,26]],"date-time":"2011-09-26T00:00:00Z","timestamp":1316995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,9,26]]},"DOI":"10.1145\/2072069.2072071","type":"proceedings-article","created":{"date-parts":[[2012,10,15]],"date-time":"2012-10-15T17:13:12Z","timestamp":1350321192000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":23,"title":["Measures to establish trust in internet voting"],"prefix":"10.1145","author":[{"given":"Melanie","family":"Volkamer","sequence":"first","affiliation":[{"name":"Technische Universit\u00e4t Darmstadt, Darmstadt, Germany"}]},{"given":"Oliver","family":"Spycher","sequence":"additional","affiliation":[{"name":"Bern University of Applied Sciences, H\u00f6heweg, Biel"}]},{"given":"Eric","family":"Dubuis","sequence":"additional","affiliation":[{"name":"Bern University of Applied Sciences, H\u00f6heweg, Biel"}]}],"member":"320","published-online":{"date-parts":[[2011,9,26]]},"reference":[{"key":"e_1_3_2_1_2_1","volume-title":"Zertifizierung. In Proceedings of the Informatik 2009: Im Focus das Leben, Beitr\u00e4ge der 39","author":"Volkamer M.","year":"2009","unstructured":"Volkamer , M. , Schryen , G. , Langer , L. , Schmidt , A. and Buchmann , J . 2009. Elektronische Wahlen: Verifizierung vs . Zertifizierung. In Proceedings of the Informatik 2009: Im Focus das Leben, Beitr\u00e4ge der 39 . Jahrestagung der Gesellschaft f\u00fcr Informatik e.V. (GI) (Bonn, Germany , 2009 ). Gesellschaft f\u00fcr Informatik, LNI 154, pp. 1827--1836. Volkamer, M., Schryen, G., Langer, L., Schmidt, A. and Buchmann, J. 2009. Elektronische Wahlen: Verifizierung vs. Zertifizierung. In Proceedings of the Informatik 2009: Im Focus das Leben, Beitr\u00e4ge der 39. Jahrestagung der Gesellschaft f\u00fcr Informatik e.V. (GI) (Bonn, Germany, 2009). Gesellschaft f\u00fcr Informatik, LNI 154, pp. 1827--1836."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/RE-VOTE.2009.2"},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of the 23rd Bled eConference","author":"Volkamer M.","year":"2010","unstructured":"Volkamer , M. and Schryen , G . 2010. Measuring eTrust in distributed systems - General Concept and Application to Internet Voting . In Proceedings of the 23rd Bled eConference ( Bled, Slovenia, June 20--23 , 2010 , forthcoming) Volkamer, M. and Schryen, G. 2010. Measuring eTrust in distributed systems - General Concept and Application to Internet Voting. In Proceedings of the 23rd Bled eConference (Bled, Slovenia, June 20--23, 2010, forthcoming)"},{"key":"e_1_3_2_1_5_1","series-title":"LNBIP","volume-title":"Evaluation of Electronic Voting - Requirements and Evaluation Procedures to Support Responsible Election Authorities","author":"Volkamer M.","unstructured":"Volkamer , M. 2009. Evaluation of Electronic Voting - Requirements and Evaluation Procedures to Support Responsible Election Authorities . Volume 30 of LNBIP , Springer . Volkamer, M. 2009. Evaluation of Electronic Voting - Requirements and Evaluation Procedures to Support Responsible Election Authorities. Volume 30 of LNBIP, Springer."},{"key":"e_1_3_2_1_6_1","unstructured":"National Electoral Committee (NEC). 2005. E-Voting System -- Overview. Online available http:\/\/www.vvk.ee\/public\/dok\/Yldkirjeldus-eng.pdf  National Electoral Committee (NEC). 2005. E-Voting System -- Overview . Online available http:\/\/www.vvk.ee\/public\/dok\/Yldkirjeldus-eng.pdf"},{"key":"e_1_3_2_1_7_1","unstructured":"National Electoral Committee (NEC). 2007. Parliamentary Elections 2007: Statistics of E-Voting Estonian. Online available http:\/\/www.vvk.ee\/english\/Ivoting_stat_eng.pdf  National Electoral Committee (NEC). 2007. Parliamentary Elections 2007: Statistics of E-Voting Estonian . Online available http:\/\/www.vvk.ee\/english\/Ivoting_stat_eng.pdf"},{"key":"e_1_3_2_1_8_1","unstructured":"OSCE\/ODIHR Election Assessment Mission Report. 2007. Parliamentary Elections in Estonia OSCE. Online available http:\/\/www.osce.org\/odihr\/elections\/estonia\/25925  OSCE\/ODIHR Election Assessment Mission Report. 2007. Parliamentary Elections in Estonia OSCE . Online available http:\/\/www.osce.org\/odihr\/elections\/estonia\/25925"},{"key":"e_1_3_2_1_9_1","volume-title":"Report for the Council of Europe: Internet Voting in the","author":"European Union Democracy Observatory","year":"2007","unstructured":"European Union Democracy Observatory . 2007. Report for the Council of Europe: Internet Voting in the March 2007 Parliamentary Elections in Estonia. Online available http:\/\/www.vvk.ee\/english\/CoE_and_NEC_Report_E-Voting2007.pdf European Union Democracy Observatory. 2007. Report for the Council of Europe: Internet Voting in the March 2007 Parliamentary Elections in Estonia. Online available http:\/\/www.vvk.ee\/english\/CoE_and_NEC_Report_E-Voting2007.pdf"},{"key":"e_1_3_2_1_10_1","unstructured":"E-vote 2011--project webpage; Online available http:\/\/www.regjeringen.no\/en\/dep\/krd\/prosjekter\/e-vote-2011-project.html  E-vote 2011--project webpage; Online available http:\/\/www.regjeringen.no\/en\/dep\/krd\/prosjekter\/e-vote-2011-project.html"},{"key":"e_1_3_2_1_12_1","volume-title":"Report","author":"Vote","unstructured":"e- Vote 2011 Security Objectives. Report ; Online available http:\/\/www.regjeringen.no\/upload\/KRD\/Kampanjer\/valgportal\/e-valg\/tekniskdok\/Security_Objectives_v2.pdf e-Vote 2011 Security Objectives. Report; Online available http:\/\/www.regjeringen.no\/upload\/KRD\/Kampanjer\/valgportal\/e-valg\/tekniskdok\/Security_Objectives_v2.pdf"},{"key":"e_1_3_2_1_13_1","first-page":"335","volume-title":"Proceedings of the 17th Symposium on Security","author":"Adida B.","year":"2008","unstructured":"Adida , B. 2008 . Helios: Web-based open-audit voting . In Proceedings of the 17th Symposium on Security ( Berkeley, CA, USA , 2008), Usenix Association, pp. 335 -- 348 . Adida, B. 2008. Helios: Web-based open-audit voting. In Proceedings of the 17th Symposium on Security (Berkeley, CA, USA, 2008), Usenix Association, pp. 335--348."},{"key":"e_1_3_2_1_14_1","unstructured":"Helios Voting System webpage; Online available http:\/\/heliosvoting.org\/  Helios Voting System webpage; Online available http:\/\/heliosvoting.org\/"},{"key":"e_1_3_2_1_15_1","unstructured":"Documentation site for the Helios Voting System; Online available http:\/\/documentation.heliosvoting.org\/  Documentation site for the Helios Voting System; Online available http:\/\/documentation.heliosvoting.org\/"},{"key":"e_1_3_2_1_16_1","unstructured":"Helios video; Online available http:\/\/usg.princeton.edu\/%20index.php?option=com_content&view=article&id=230:guide-to-helios&catid=78:elections&Itemid=115  Helios video; Online available http:\/\/usg.princeton.edu\/%20index.php?option=com_content&view=article&id=230:guide-to-helios&catid=78:elections&Itemid=115"},{"key":"e_1_3_2_1_17_1","volume-title":"Guide to Helios","author":"Yaroshefsky M.","unstructured":"Yaroshefsky , M. 2009. Guide to Helios . Princeton University . Online available http:\/\/usg.princeton.edu\/usg-senate\/elections-center\/guide-to-helios.html Yaroshefsky, M. 2009. Guide to Helios. Princeton University. Online available http:\/\/usg.princeton.edu\/usg-senate\/elections-center\/guide-to-helios.html"},{"key":"e_1_3_2_1_18_1","volume-title":"Electronic Voting Technology\/Workshop on Trustworthy Elections (EVT\/WOTE","author":"Adida B.","year":"2009","unstructured":"Adida , B. , Pereira , O. , Marneffe , O. D. and Jacques Quisquater , J. 2009. Electing a university president using open-audit voting: Analysis of real-world use of helios . In Electronic Voting Technology\/Workshop on Trustworthy Elections (EVT\/WOTE ( 2009 ). Adida, B., Pereira, O., Marneffe, O. D. and Jacques Quisquater, J. 2009. Electing a university president using open-audit voting: Analysis of real-world use of helios. In Electronic Voting Technology\/Workshop on Trustworthy Elections (EVT\/WOTE (2009)."},{"key":"e_1_3_2_1_19_1","first-page":"62","volume-title":"Compliance of polyas with the BSI Protection Profile - Basic Requirements for Remote Electronic Voting Systems,\" in Proceedings of the 1st international conference on E-voting and identity, ser. LNCS","author":"Reinhard K.","year":"2007","unstructured":"Reinhard K. and Jung W. , \" Compliance of polyas with the BSI Protection Profile - Basic Requirements for Remote Electronic Voting Systems,\" in Proceedings of the 1st international conference on E-voting and identity, ser. LNCS . Springer , 2007 , pp. 62 -- 75 . Reinhard K. and Jung W., \"Compliance of polyas with the BSI Protection Profile - Basic Requirements for Remote Electronic Voting Systems,\" in Proceedings of the 1st international conference on E-voting and identity, ser. LNCS. Springer, 2007, pp. 62--75."},{"key":"e_1_3_2_1_20_1","first-page":"109","volume-title":"Compliance of POLYAS with the Common Criteria Protection Profile - A 2010 outlook on Certified Remote Electronic Voting,\" in Proceedings of the 4th International Conference on Electronic Voting","author":"Menke N.","year":"2010","unstructured":"Menke N. and Reinhard K. , \" Compliance of POLYAS with the Common Criteria Protection Profile - A 2010 outlook on Certified Remote Electronic Voting,\" in Proceedings of the 4th International Conference on Electronic Voting 2010 , ser. LNI. Springer , 2010, pp. 109 -- 118 . Menke N. and Reinhard K., \"Compliance of POLYAS with the Common Criteria Protection Profile - A 2010 outlook on Certified Remote Electronic Voting,\" in Proceedings of the 4th International Conference on Electronic Voting 2010, ser. LNI. Springer, 2010, pp. 109--118."},{"key":"e_1_3_2_1_21_1","unstructured":"Polyas webpage; Online available http:\/\/www.polyas.de  Polyas webpage; Online available http:\/\/www.polyas.de"},{"key":"e_1_3_2_1_22_1","first-page":"62","article-title":"-02) Investigating the relationship between internet privacy concerns and online purchase behavior","volume":"5","author":"Brown M.","year":"2004","unstructured":"Brown M. and Rose M. ( 2004 -02) Investigating the relationship between internet privacy concerns and online purchase behavior . Journal of Electronic Commerce Research , 5 1: 62 -- 70 . Brown M. and Rose M. (2004-02) Investigating the relationship between internet privacy concerns and online purchase behavior. Journal of Electronic Commerce Research, 5 1: 62--70.","journal-title":"Journal of Electronic Commerce Research"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"e_1_3_2_1_24_1","first-page":"151","article-title":"Verifiability in Electronic Voting - Explanations for non security expert. In Proceeding of the Electronic Voting 2010 - 4th International Conference (Bonn, Germany, 2010). Gesellschaft f\u00fcr Informatik","volume":"167","author":"Gharadaghy R.","year":"2010","unstructured":"Gharadaghy , R. and Volkamer , M. 2010 . Verifiability in Electronic Voting - Explanations for non security expert. In Proceeding of the Electronic Voting 2010 - 4th International Conference (Bonn, Germany, 2010). Gesellschaft f\u00fcr Informatik , LNI 167 , pp. 151 -- 162 . Gharadaghy, R. and Volkamer, M. 2010. Verifiability in Electronic Voting - Explanations for non security expert. In Proceeding of the Electronic Voting 2010 - 4th International Conference (Bonn, Germany, 2010). Gesellschaft f\u00fcr Informatik, LNI 167, pp. 151--162.","journal-title":"LNI"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/1888881.1888912"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102199.1102213"},{"key":"e_1_3_2_1_27_1","first-page":"97","volume-title":"2nd International Workshop","volume":"86","author":"Volkamer M.","year":"2006","unstructured":"Volkamer M. and Grimm R . 2006. Multiple Cast in Online Voting - Analyzing Chances. In Electronic Voting 2006 . 2nd International Workshop , volume 86 of LNI, pages 97 -- 106 , Bonn , 2006 . Gesellschaft f\u00fcr Informatik. Volkamer M. and Grimm R. 2006. Multiple Cast in Online Voting - Analyzing Chances. In Electronic Voting 2006. 2nd International Workshop, volume 86 of LNI, pages 97--106, Bonn, 2006. Gesellschaft f\u00fcr Informatik."},{"key":"e_1_3_2_1_28_1","unstructured":"ISO 15408-- Common Criteria for Information Technology Security Evaluation (CC) Online available at http:\/\/www.commoncriteriaportal.org\/  ISO 15408-- Common Criteria for Information Technology Security Evaluation (CC) Online available at http:\/\/www.commoncriteriaportal.org\/"},{"key":"e_1_3_2_1_29_1","unstructured":"Volkamer M. and Vogt R. 2008. Basic set of security requirements for online voting products. Common Criteria Protection Profile BSI-PP-0037 2008. Online available http:\/\/www.bsi.de\/zertifiz\/zert\/reporte\/pp0037b.pdf  Volkamer M. and Vogt R. 2008. Basic set of security requirements for online voting products . Common Criteria Protection Profile BSI-PP-0037 2008. Online available http:\/\/www.bsi.de\/zertifiz\/zert\/reporte\/pp0037b.pdf"},{"key":"e_1_3_2_1_30_1","unstructured":"ISO\/IEC 27001: Information technology -- Security techniques -- Information security management systems -- Requirements. Online available http:\/\/www.27001-online.com  ISO\/IEC 27001: Information technology -- Security techniques -- Information security management systems -- Requirements . Online available http:\/\/www.27001-online.com"},{"key":"e_1_3_2_1_31_1","volume-title":"ISO. Ergonomics of human-system interaction -- Part 210: Human-centred design for interactive systems","year":"2011","unstructured":"ISO2 : ISO. Ergonomics of human-system interaction -- Part 210: Human-centred design for interactive systems , 2011 . ISO2: ISO. Ergonomics of human-system interaction -- Part 210: Human-centred design for interactive systems, 2011."},{"key":"e_1_3_2_1_32_1","volume-title":"2009","author":"Weber J.","unstructured":"Weber ; J. and Hengartner , U . 2009 ; Usability study of the open audit voting system helios. Online available http:\/\/www.jannaweber.com\/wp-content\/uploads\/2009\/09\/858Helios.pdf Weber; J. and Hengartner, U. 2009; Usability study of the open audit voting system helios. Online available http:\/\/www.jannaweber.com\/wp-content\/uploads\/2009\/09\/858Helios.pdf"}],"event":{"name":"ICEGOV '11: 5th International Conference on Theory and Practice of Electronic Governance","location":"Tallinn Estonia","acronym":"ICEGOV '11"},"container-title":["Proceedings of the 5th International Conference on Theory and Practice of Electronic Governance"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2072069.2072071","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2072069.2072071","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:05:56Z","timestamp":1750241156000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2072069.2072071"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,9,26]]},"references-count":30,"alternative-id":["10.1145\/2072069.2072071","10.1145\/2072069"],"URL":"https:\/\/doi.org\/10.1145\/2072069.2072071","relation":{},"subject":[],"published":{"date-parts":[[2011,9,26]]},"assertion":[{"value":"2011-09-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}