{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:26:53Z","timestamp":1750307213601,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,3,26]],"date-time":"2012-03-26T00:00:00Z","timestamp":1332720000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,3,26]]},"DOI":"10.1145\/2245276.2232013","type":"proceedings-article","created":{"date-parts":[[2012,6,11]],"date-time":"2012-06-11T13:03:31Z","timestamp":1339419811000},"page":"1486-1493","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Integrity of electronic voting systems"],"prefix":"10.1145","author":[{"given":"Seda","family":"Davtyan","sequence":"first","affiliation":[{"name":"University of Connecticut, Storrs, CT"}]},{"given":"Aggelos","family":"Kiayias","sequence":"additional","affiliation":[{"name":"University of Connecticut, Storrs, CT"}]},{"given":"Laurent","family":"Michel","sequence":"additional","affiliation":[{"name":"University of Connecticut, Storrs, CT"}]},{"given":"Alexander","family":"Russell","sequence":"additional","affiliation":[{"name":"University of Connecticut, Storrs, CT"}]},{"given":"Alexander A.","family":"Shvartsman","sequence":"additional","affiliation":[{"name":"University of Connecticut, Storrs, CT"}]}],"member":"320","published-online":{"date-parts":[[2012,3,26]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Aes fips-197","author":"Processing Standards Federal Information","year":"2006","unstructured":"Federal Information Processing Standards Publication 197. Aes fips-197 . National Institute of Standards and Technology , 2006 . http:\/\/csrc.nist.gov\/publications\/fips\/fips197\/fips-197.pdf. Federal Information Processing Standards Publication 197. Aes fips-197. National Institute of Standards and Technology, 2006. http:\/\/csrc.nist.gov\/publications\/fips\/fips197\/fips-197.pdf."},{"key":"e_1_3_2_1_2_1","volume-title":"Dsa fips 186-3","author":"Processing Standards Federal Information","year":"2009","unstructured":"Federal Information Processing Standards Publication 197. Dsa fips 186-3 . National Institute of Standards and Technology , 2009 . http:\/\/csrc.nist.gov\/publications\/fips\/fips186-3\/fips_186-3.pdf. Federal Information Processing Standards Publication 197. Dsa fips 186-3. National Institute of Standards and Technology, 2009. http:\/\/csrc.nist.gov\/publications\/fips\/fips186-3\/fips_186-3.pdf."},{"key":"e_1_3_2_1_3_1","volume-title":"Fips pub 180-3","author":"Barker E. B.","year":"2008","unstructured":"E. B. Barker and Q. Dang . Fips pub 180-3 . National Institute of Standards and Technology , 2008 . http:\/\/www.nist.gov\/customcf\/get_pdf.cfm?pub_id=901372. E. B. Barker and Q. Dang. Fips pub 180-3. National Institute of Standards and Technology, 2008. http:\/\/www.nist.gov\/customcf\/get_pdf.cfm?pub_id=901372."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/11555827_8"},{"key":"e_1_3_2_1_5_1","volume-title":"USENIX\/ACCURATE Electronic Voting Technology Workshop (EVT'07)","author":"Feldman A. J.","year":"2007","unstructured":"A. J. Feldman , A. J. Halderman , and E. W. Felten . Security analysis of the Diebold AccuVote-TS voting machine . In USENIX\/ACCURATE Electronic Voting Technology Workshop (EVT'07) , 2007 . http:\/\/www.usenix.org\/events\/evt07\/tech\/fullpapers\/feldman\/feldman.pdf, also http:\/\/itpolicy.princeton.edu\/voting\/. A. J. Feldman, A. J. Halderman, and E. W. Felten. Security analysis of the Diebold AccuVote-TS voting machine. In USENIX\/ACCURATE Electronic Voting Technology Workshop (EVT'07), 2007. http:\/\/www.usenix.org\/events\/evt07\/tech\/fullpapers\/feldman\/feldman.pdf, also http:\/\/itpolicy.princeton.edu\/voting\/."},{"key":"e_1_3_2_1_6_1","volume-title":"BYTE","author":"Halfhill T. R.","year":"2005","unstructured":"T. R. Halfhill . An error in a lookup table created the infamous bug in Intel's latest processor . BYTE , 2005 . T. R. Halfhill. An error in a lookup table created the infamous bug in Intel's latest processor. BYTE, 2005."},{"key":"e_1_3_2_1_7_1","volume-title":"Diebold TSx evaluation, black box voting project","author":"Hursti H.","year":"2006","unstructured":"H. Hursti . Diebold TSx evaluation, black box voting project , 2006 . http:\/\/www.bbvdocs.org\/reports\/BBVreportIIunredacted.pdf. H. Hursti. Diebold TSx evaluation, black box voting project, 2006. http:\/\/www.bbvdocs.org\/reports\/BBVreportIIunredacted.pdf."},{"key":"e_1_3_2_1_8_1","volume-title":"July 4th","author":"Hursti Harri","year":"2005","unstructured":"Harri Hursti . Critical security issues with Diebold optical scan design , July 4th , 2005 . Harri Hursti. Critical security issues with Diebold optical scan design, July 4th, 2005."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301313"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2002.1038569"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.39"},{"key":"e_1_3_2_1_12_1","volume-title":"Security analysis of the Diebold AccuBasic interpreter. Voting Systems Technology Assessment Advisory Board","author":"Wagner D.","year":"2006","unstructured":"D. Wagner , D. Jefferson , and M. Bishop . Security analysis of the Diebold AccuBasic interpreter. Voting Systems Technology Assessment Advisory Board , University of California , Berkeley , 2006 . D. Wagner, D. Jefferson, and M. Bishop. Security analysis of the Diebold AccuBasic interpreter. Voting Systems Technology Assessment Advisory Board, University of California, Berkeley, 2006."}],"event":{"name":"SAC 2012: ACM Symposium on Applied Computing","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Trento Italy","acronym":"SAC 2012"},"container-title":["Proceedings of the 27th Annual ACM Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2245276.2232013","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2245276.2232013","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:06:43Z","timestamp":1750241203000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2245276.2232013"}},"subtitle":["fallacious use of cryptography"],"short-title":[],"issued":{"date-parts":[[2012,3,26]]},"references-count":12,"alternative-id":["10.1145\/2245276.2232013","10.1145\/2245276"],"URL":"https:\/\/doi.org\/10.1145\/2245276.2232013","relation":{},"subject":[],"published":{"date-parts":[[2012,3,26]]},"assertion":[{"value":"2012-03-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}