{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:22:59Z","timestamp":1750306979272,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,9,10]],"date-time":"2018-09-10T00:00:00Z","timestamp":1536537600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Minobrnauka","award":["? 2.6264.2017\/8.9"],"award-info":[{"award-number":["? 2.6264.2017\/8.9"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,9,10]]},"DOI":"10.1145\/3264437.3264473","type":"proceedings-article","created":{"date-parts":[[2018,10,16]],"date-time":"2018-10-16T12:56:36Z","timestamp":1539694596000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Distributed E-Voting System Based On Blind Intermediaries Using Homomorphic Encryption"],"prefix":"10.1145","author":[{"given":"Liudmila","family":"Babenko","sequence":"first","affiliation":[{"name":"Department of Information Security, Southern Federal University, Taganrog, Russia"}]},{"given":"Ilya","family":"Pisarev","sequence":"additional","affiliation":[{"name":"Department of Information Security, Southern Federal University, Taganrog, Russia"}]}],"member":"320","published-online":{"date-parts":[[2018,9,10]]},"reference":[{"unstructured":"Electronic elections: fear of falsification of the results. - Kazakhstan today 2004  Electronic elections: fear of falsification of the results. - Kazakhstan today 2004","key":"e_1_3_2_1_1_1"},{"unstructured":"Lipen VY Voronetsky MA Lipen DV technology and results of testing electronic voting systems. - United Institute of Informatics Problems NASB 2002.  Lipen VY Voronetsky MA Lipen DV technology and results of testing electronic voting systems. - United Institute of Informatics Problems NASB 2002.","key":"e_1_3_2_1_2_1"},{"unstructured":"Ali S. T. Murray J. An Overview of End-to-End Verifiable Voting Systems \/\/ arXiv preprint arXiv: 1605.08554. - 2016.  Ali S. T. Murray J. An Overview of End-to-End Verifiable Voting Systems \/\/ arXiv preprint arXiv: 1605.08554. - 2016.","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","first-page":"187","volume":"201","author":"Smart M.","journal-title":"Springer Berlin Heidelberg"},{"doi-asserted-by":"crossref","unstructured":"Bruck S. Jefferson D. Rivest R. L. A modular voting architecture (\"frog voting\") \/\/ Toward trustworthy elections. - Springer Berlin Heidelberg 2010.   Bruck S. Jefferson D. Rivest R. L. A modular voting architecture (\"frog voting\") \/\/ Toward trustworthy elections. - Springer Berlin Heidelberg 2010.","key":"e_1_3_2_1_5_1","DOI":"10.1007\/978-3-642-12980-3_5"},{"doi-asserted-by":"crossref","unstructured":"Jonker H. Mauw S. Pang J. Privacy and verifiability in voting systems: Methods developments and trends \/\/ Computer Science Review. - 2013.  Jonker H. Mauw S. Pang J. Privacy and verifiability in voting systems: Methods developments and trends \/\/ Computer Science Review. - 2013.","key":"e_1_3_2_1_6_1","DOI":"10.1016\/j.cosrev.2013.08.002"},{"unstructured":"Shubhangi S. Shinde Sonali Shukla Prof. D. K. Chitre Secure E-voting Using Homomorphic Technology International Journal of Emerging Technology and Advanced Engineering (2013)  Shubhangi S. Shinde Sonali Shukla Prof. D. K. Chitre Secure E-voting Using Homomorphic Technology International Journal of Emerging Technology and Advanced Engineering (2013)","key":"e_1_3_2_1_7_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1109\/ARES.2012.75"},{"key":"e_1_3_2_1_9_1","first-page":"386","volume":"201","author":"Yi X.","journal-title":"Springer Berlin Heidelberg"},{"volume-title":"International Journal of Network Security & Its Applications (IJNSA)","year":"2017","author":"Ben Ayed A..","key":"e_1_3_2_1_10_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1145\/3136825.3136876"},{"key":"e_1_3_2_1_12_1","first-page":"223","volume-title":"Lecture Notes in Computer Science","volume":"1592","author":"Paillier P.","year":"1999"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1145\/359168.359176"},{"key":"e_1_3_2_1_14_1","first-page":"362","volume-title":"10th International Conference, ISC 2007, Valpara\u00edso, Chile, October 9-12, 2007, Proceedings. Lecture Notes in Computer Science","volume":"4779","author":"Castagnos G.","year":"2007"}],"event":{"sponsor":["Cardiff University Cardiff University"],"acronym":"SIN '18","name":"SIN '18: 11th International Conference On Security Of Information and Networks","location":"Cardiff United Kingdom"},"container-title":["Proceedings of the 11th International Conference on Security of Information and Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3264437.3264473","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3264437.3264473","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:39:35Z","timestamp":1750235975000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3264437.3264473"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9,10]]},"references-count":14,"alternative-id":["10.1145\/3264437.3264473","10.1145\/3264437"],"URL":"https:\/\/doi.org\/10.1145\/3264437.3264473","relation":{},"subject":[],"published":{"date-parts":[[2018,9,10]]},"assertion":[{"value":"2018-09-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}