{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:28:48Z","timestamp":1750220928482,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":46,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,1,29]],"date-time":"2019-01-29T00:00:00Z","timestamp":1548720000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,1,29]]},"DOI":"10.1145\/3290688.3290696","type":"proceedings-article","created":{"date-parts":[[2019,1,14]],"date-time":"2019-01-14T13:15:25Z","timestamp":1547471725000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Receipt-Free, Universally and Individually Verifiable Poll Attendance"],"prefix":"10.1145","author":[{"given":"Nicholas","family":"Akinyokun","sequence":"first","affiliation":[{"name":"School of Computing and Information Systems, The University of Melbourne, Australia"}]},{"given":"Vanessa","family":"Teague","sequence":"additional","affiliation":[{"name":"School of Computing and Information Systems, The University of Melbourne, Australia"}]}],"member":"320","published-online":{"date-parts":[[2019,1,29]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proceedings of the 17th Conference on Security Symposium (SS '08)","author":"Adida B.","year":"2008","unstructured":"B. Adida . 2008 . Helios: web-based open-audit voting . In Proceedings of the 17th Conference on Security Symposium (SS '08) , San Jose, CA, USA , 28 July-1 August 2008. 335--348. B. Adida. 2008. Helios: web-based open-audit voting. In Proceedings of the 17th Conference on Security Symposium (SS '08), San Jose, CA, USA, 28 July-1 August 2008. 335--348."},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings of the 2009 International Conference on Electronic Voting Technology\/Workshop on Trustworthy Elections (EVT\/WOTE '09)","author":"Adida B.","year":"2009","unstructured":"B. Adida , O. De Marneffe , O. Pereira , and J. J. Quisquater . 2009. Electing a university president using open-audit voting: analysis of real-world use of Helios . In Proceedings of the 2009 International Conference on Electronic Voting Technology\/Workshop on Trustworthy Elections (EVT\/WOTE '09) , Montreal, Canada , 10-11 August 2009 . 1--10. B. Adida, O. De Marneffe, O. Pereira, and J. J. Quisquater. 2009. Electing a university president using open-audit voting: analysis of real-world use of Helios. In Proceedings of the 2009 International Conference on Electronic Voting Technology\/Workshop on Trustworthy Elections (EVT\/WOTE '09), Montreal, Canada, 10-11 August 2009. 1--10."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1080\/19331681.2011.559739"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04135-8_5"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00340"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/1526502.1526508"},{"key":"e_1_3_2_1_7_1","first-page":"18","article-title":"STAR-Vote: A secure, transparent, auditable, and reliable voting system","volume":"1","author":"Bell S.","year":"2013","unstructured":"S. Bell , J. Benaloh , M.D. Byrne , D. DeBeauvoir , B. Eakin , G. Fisher , P. Kortum , N. McBurnett , J. Montoya , M. Parker , 2013 . STAR-Vote: A secure, transparent, auditable, and reliable voting system . USENIX Journal of Election Technology and Systems (JETS) 1 , 1 (2013), 18 -- 37 . S. Bell, J. Benaloh, M.D. Byrne, D. DeBeauvoir, B. Eakin, G. Fisher, P. Kortum, N. McBurnett, J. Montoya, M. Parker, et al. 2013. STAR-Vote: A secure, transparent, auditable, and reliable voting system. USENIX Journal of Election Technology and Systems (JETS) 1, 1 (2013), 18--37.","journal-title":"USENIX Journal of Election Technology and Systems (JETS)"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251003.1251008"},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the 2007 USENIX\/ACCURATE Electronic Voting Technology Workshop (EVT '07)","author":"Benaloh J.","year":"2007","unstructured":"J. Benaloh . 2007 . Ballot casting assurance via voter-Initiated poll station auditing . In Proceedings of the 2007 USENIX\/ACCURATE Electronic Voting Technology Workshop (EVT '07) , Boston, MA, USA , 6 August 2007 1--8. J. Benaloh. 2007. Ballot casting assurance via voter-Initiated poll station auditing. In Proceedings of the 2007 USENIX\/ACCURATE Electronic Voting Technology Workshop (EVT '07), Boston, MA, USA, 6 August 2007 1--8."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.37"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098954.3098990"},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the 2nd International Joint Conference on Electronic Voting","author":"Bernhard M.","year":"2017","unstructured":"M. Bernhard , J. Benaloh , J. A. Halderman , R. L. Rivest , P. Y. A. Ryan , P. B. Stark , V. Teague , P. L. Vora , and D. S. Wallach . 2017. Public evidence from secret ballots . In Proceedings of the 2nd International Joint Conference on Electronic Voting , Bregenz, Austria , 24-27 October 2017 84--109. M. Bernhard, J. Benaloh, J. A. Halderman, R. L. Rivest, P. Y. A. Ryan, P. B. Stark, V. Teague, P. L. Vora, and D. S. Wallach. 2017. Public evidence from secret ballots. In Proceedings of the 2nd International Joint Conference on Electronic Voting, Bregenz, Austria, 24-27 October 2017 84--109."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"D. Boneh. 1998. The decision Diffie-Hellman problem. In Algorithmic Number Theory. 48--63.   D. Boneh. 1998. The decision Diffie-Hellman problem. In Algorithmic Number Theory. 48--63.","DOI":"10.1007\/BFb0054851"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/11734727_5"},{"key":"e_1_3_2_1_15_1","unstructured":"I. Briscoe and D. Goff. 2016. Protecting politics: deterring the influence of organized crime on elections. Clingendael Institute & International IDEA The Hague Netherlands & Stockholm Sweden 1--74.  I. Briscoe and D. Goff. 2016. Protecting politics: deterring the influence of organized crime on elections. Clingendael Institute & International IDEA The Hague Netherlands & Stockholm Sweden 1--74."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.4236\/ojps.2013.34023"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4460080506"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2014.20"},{"key":"e_1_3_2_1_19_1","volume-title":"Sicherheit","volume":"77","author":"Cock D. De","year":"2006","unstructured":"D. De Cock , C. Wolf , and B. Preneel . 2006. The Belgian Electronic Identity Card (Overview) . In Sicherheit 2006 , Vol. 77 . 298--301. D. De Cock, C. Wolf, and B. Preneel. 2006. The Belgian Electronic Identity Card (Overview). In Sicherheit 2006, Vol. 77. 298--301."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1985.1057074"},{"key":"e_1_3_2_1_21_1","volume-title":"Retrieved","author":"Fieser E.","year":"2016","unstructured":"E. Fieser . 2016 . People openly sell votes for $20 in the Dominican Republic . Retrieved October 21, 2018 from https:\/\/tinyurl.com\/y7bkqqfz. E. Fieser. 2016. People openly sell votes for $20 in the Dominican Republic. Retrieved October 21, 2018 from https:\/\/tinyurl.com\/y7bkqqfz."},{"key":"e_1_3_2_1_22_1","volume-title":"Proceedings of the 2011 Electronic Voting Technology Workshop\/ Workshop on Trustworthy Elections (EVT\/WOTE '11)","author":"Haenni R.","year":"2011","unstructured":"R. Haenni and O. Spycher . 2011. Secure Internet voting on limited devices with anonymized DSA public keys .. In Proceedings of the 2011 Electronic Voting Technology Workshop\/ Workshop on Trustworthy Elections (EVT\/WOTE '11) , San Francisco, CA, USA , 8-9 August 2011 . 1--13. R. Haenni and O. Spycher. 2011. Secure Internet voting on limited devices with anonymized DSA public keys.. In Proceedings of the 2011 Electronic Voting Technology Workshop\/ Workshop on Trustworthy Elections (EVT\/WOTE '11), San Francisco, CA, USA, 8-9 August 2011. 1--13."},{"key":"e_1_3_2_1_23_1","volume-title":"Proceedings of the 1st International Joint Conference on Electronic Voting (E-Vote-ID 2017","author":"Hapsara M.","year":"2016","unstructured":"M. Hapsara , A. Imran , and T. Turner . 2016. E-Voting in developing countries: current landscape and future research agenda . In Proceedings of the 1st International Joint Conference on Electronic Voting (E-Vote-ID 2017 ), Bregenz, Austria , 18-21 October 2016 . 36--55. M. Hapsara, A. Imran, and T. Turner. 2016. E-Voting in developing countries: current landscape and future research agenda. In Proceedings of the 1st International Joint Conference on Electronic Voting (E-Vote-ID 2017), Bregenz, Austria, 18-21 October 2016. 36--55."},{"key":"e_1_3_2_1_24_1","volume-title":"Proceedings of the 5th International Conference on Electronic Voting (EVOTE)","author":"Neumann Budurushi J., S.","year":"2012","unstructured":"Budurushi J., S. Neumann , and M. Volkamer . 2012. Smart cards in electronic voting: lessons learned from applications in legally-binding elections and approaches proposed in scientific papers . In Proceedings of the 5th International Conference on Electronic Voting (EVOTE) , Lochau, Austria , 11-14 July 2012 . 257--270. Budurushi J., S. Neumann, and M. Volkamer. 2012. Smart cards in electronic voting: lessons learned from applications in legally-binding elections and approaches proposed in scientific papers. In Proceedings of the 5th International Conference on Electronic Voting (EVOTE), Lochau, Austria, 11-14 July 2012. 257--270."},{"key":"e_1_3_2_1_25_1","volume-title":"Proceedings of the 2014 6th International Conference on Electronic Voting (EVOTE)","author":"Levin Pomares J., I.","year":"2014","unstructured":"Pomares J., I. Levin , R.M. Alvarez , G.L. Mirau , and T. Ovejero . 2014. From piloting to roll-out: voting experience and trust in the first full e-election in Argentina . In Proceedings of the 2014 6th International Conference on Electronic Voting (EVOTE) , Lochau, Austria , 29-31 October 2014 . 1--10. Pomares J., I. Levin, R.M. Alvarez, G.L. Mirau, and T. Ovejero. 2014. From piloting to roll-out: voting experience and trust in the first full e-election in Argentina. In Proceedings of the 2014 6th International Conference on Electronic Voting (EVOTE), Lochau, Austria, 29-31 October 2014. 1--10."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102199.1102213"},{"key":"e_1_3_2_1_27_1","volume-title":"Signaling games of election fraud. Social Science Research Network","author":"Kalinin K.","year":"2016","unstructured":"K. Kalinin . 2016. Signaling games of election fraud. Social Science Research Network ( 2016 ), 1--64. K. Kalinin. 2016. Signaling games of election fraud. Social Science Research Network (2016), 1--64."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1210722109"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-22270-7_4"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1017\/S1047198700014297"},{"key":"e_1_3_2_1_31_1","volume-title":"Proceedings of the 2016 International Conference on Financial Cryptography and Data Security (FC '16)","author":"Locher P.","year":"2016","unstructured":"P. Locher , R. Haenni , and R. E. Koenig . 2016. Coercion-resistant Internet voting with everlasting privacy . In Proceedings of the 2016 International Conference on Financial Cryptography and Data Security (FC '16) , Christ Church, Barbados , 22-26 February 2016 . 161--175. P. Locher, R. Haenni, and R. E. Koenig. 2016. Coercion-resistant Internet voting with everlasting privacy. In Proceedings of the 2016 International Conference on Financial Cryptography and Data Security (FC '16), Christ Church, Barbados, 22-26 February 2016. 161--175."},{"key":"e_1_3_2_1_32_1","volume-title":"Proceedings of the 2012 Electronic Voting Technology Workshop\/ Workshop on Trustworthy Elections (EVT\/WOTE '12)","author":"Stark Lindeman M., P. B.","year":"2012","unstructured":"Lindeman M., P. B. Stark , and V.S. Yates . 2012. BRAVO: ballot-polling risk-limiting audits to verify outcomes . In Proceedings of the 2012 Electronic Voting Technology Workshop\/ Workshop on Trustworthy Elections (EVT\/WOTE '12) , Bellevue, WA, USA , 6-7 August 2012 . 1--12. Lindeman M., P. B. Stark, and V.S. Yates. 2012. BRAVO: ballot-polling risk-limiting audits to verify outcomes. In Proceedings of the 2012 Electronic Voting Technology Workshop\/ Workshop on Trustworthy Elections (EVT\/WOTE '12), Bellevue, WA, USA, 6-7 August 2012. 1--12."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2014.35"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"T. P. Pedersen. 1991. A threshold cryptosystem without a trusted party. In Advances in Cryptology -- EUROCRYPT '91. 522--526.   T. P. Pedersen. 1991. A threshold cryptosystem without a trusted party. In Advances in Cryptology -- EUROCRYPT '91. 522--526.","DOI":"10.1007\/3-540-46416-6_47"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.7146\/dpb.v21i388.6621"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","unstructured":"T. P. Pedersen. 1992. Non-interactive and information-theoretic secure verifiable secret sharing. In Advances in Cryptology --- CRYPTO '91. 129--140.   T. P. Pedersen. 1992. Non-interactive and information-theoretic secure verifiable secret sharing. In Advances in Cryptology --- CRYPTO '91. 129--140.","DOI":"10.1007\/3-540-46766-1_9"},{"key":"e_1_3_2_1_37_1","first-page":"1","article-title":"Do voters and poll workers differ in their attitudes toward e-voting? evidence from the first e-election in Salta, Argentina","volume":"2","author":"Pomares J.","year":"2014","unstructured":"J. Pomares , I. Levin , and R.M. Alvarez . 2014 . Do voters and poll workers differ in their attitudes toward e-voting? evidence from the first e-election in Salta, Argentina . USENIX Journal of Election Technology and Systems 2 , 2 (2014), 1 -- 10 . J. Pomares, I. Levin, and R.M. Alvarez. 2014. Do voters and poll workers differ in their attitudes toward e-voting? evidence from the first e-election in Salta, Argentina. USENIX Journal of Election Technology and Systems 2, 2 (2014), 1--10.","journal-title":"USENIX Journal of Election Technology and Systems"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-89339-6_18"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2009.2033233"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1071596.1071602"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660315"},{"volume-title":"International Workshop on Public Key Cryptography. 117--134","author":"Tsiounis Y.","key":"e_1_3_2_1_42_1","unstructured":"Y. Tsiounis and M. Yung . 1998. On the security of El Gamal based encryption . In International Workshop on Public Key Cryptography. 117--134 . Y. Tsiounis and M. Yung. 1998. On the security of El Gamal based encryption. In International Workshop on Public Key Cryptography. 117--134."},{"key":"e_1_3_2_1_43_1","volume-title":"Retrieved","author":"Union European","year":"2015","unstructured":"European Union . 2015 . Final Report: Federal Republic of Nigeria 2015 General Elections (28 March 2015, 11 April 2015) . Retrieved October 21, 2018 from https:\/\/tinyurl.com\/ycy9vyjz. European Union. 2015. Final Report: Federal Republic of Nigeria 2015 General Elections (28 March 2015, 11 April 2015). Retrieved October 21, 2018 from https:\/\/tinyurl.com\/ycy9vyjz."},{"key":"e_1_3_2_1_44_1","unstructured":"C. Vickery and E. Shein. 2012. Assessing electoral fraud in new democracies: refining the vocabulary. International Foundation for Electoral Systems Washington DC USA 1--14.  C. Vickery and E. Shein. 2012. Assessing electoral fraud in new democracies: refining the vocabulary. International Foundation for Electoral Systems Washington DC USA 1--14."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866309"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38980-1_28"}],"event":{"name":"ACSW 2019: Australasian Computer Science Week 2019","sponsor":["CORE - Computing Research and Education","Macquarie University-Sydney"],"location":"Sydney NSW Australia","acronym":"ACSW 2019"},"container-title":["Proceedings of the Australasian Computer Science Week Multiconference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3290688.3290696","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3290688.3290696","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:53:17Z","timestamp":1750204397000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3290688.3290696"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1,29]]},"references-count":46,"alternative-id":["10.1145\/3290688.3290696","10.1145\/3290688"],"URL":"https:\/\/doi.org\/10.1145\/3290688.3290696","relation":{},"subject":[],"published":{"date-parts":[[2019,1,29]]},"assertion":[{"value":"2019-01-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}