{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,19]],"date-time":"2025-12-19T09:41:59Z","timestamp":1766137319732,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,10,23]],"date-time":"2019-10-23T00:00:00Z","timestamp":1571788800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,10,23]]},"DOI":"10.1145\/3372938.3372969","type":"proceedings-article","created":{"date-parts":[[2020,1,8]],"date-time":"2020-01-08T03:54:01Z","timestamp":1578455641000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Proof of Concept Blockchain-based Voting System"],"prefix":"10.1145","author":[{"given":"Aicha","family":"Fatrah","sequence":"first","affiliation":[{"name":"Computer, Networks, Mobility and Modeling laboratory FST, Hassan Ist University, Settat, Morocco"}]},{"given":"Said","family":"El Kafhali","sequence":"additional","affiliation":[{"name":"Computer, Networks, Mobility and Modeling laboratory FST, Hassan Ist University, Settat, Morocco"}]},{"given":"Abdelkrim","family":"Haqiq","sequence":"additional","affiliation":[{"name":"Computer, Networks, Mobility and Modeling laboratory FST, Hassan Ist University, Settat, Morocco"}]},{"given":"Khaled","family":"Salah","sequence":"additional","affiliation":[{"name":"Electrical and Computer Engineering Department, Khalifa University of Science and Technology, Abu Dhabi, UAE"}]}],"member":"320","published-online":{"date-parts":[[2020,1,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5121\/ijnsa.2017.9301"},{"key":"e_1_3_2_1_2_1","first-page":"1","article-title":"Optimally efficient multi authority secret Ballot e-election scheme","volume":"5","author":"Anjan Babau G.","year":"2006","unstructured":"G. Anjan Babau and Dr. M. Padmavathamma . 2006 . Optimally efficient multi authority secret Ballot e-election scheme . Journal of Theoretical and Applied Information Technology 5 , 2 (2006), 1 -- 4 . G. Anjan Babau and Dr. M. Padmavathamma. 2006. Optimally efficient multi authority secret Ballot e-election scheme. Journal of Theoretical and Applied Information Technology 5, 2 (2006), 1--4.","journal-title":"Journal of Theoretical and Applied Information Technology"},{"key":"e_1_3_2_1_3_1","unstructured":"Trueb Baltic. 2013. Estonian Electronic ID Card Application Specification Prerequisites to the Smart Card Differentiation to previous Version of EstEID Card Application. (2013). https:\/\/www.id.ee\/public\/TB-SPEC-EstEID-Chip-App-v3_5-20140327.pdf  Trueb Baltic. 2013. Estonian Electronic ID Card Application Specification Prerequisites to the Smart Card Differentiation to previous Version of EstEID Card Application. (2013). https:\/\/www.id.ee\/public\/TB-SPEC-EstEID-Chip-App-v3_5-20140327.pdf"},{"key":"e_1_3_2_1_4_1","unstructured":"Ethereum Blog. 2015. On Public and Private Blockchains - Ethereum Blog. (2015). https:\/\/blog.ethereum.org\/2015\/08\/07\/on-public-and-private-blockchains\/  Ethereum Blog. 2015. On Public and Private Blockchains - Ethereum Blog. (2015). https:\/\/blog.ethereum.org\/2015\/08\/07\/on-public-and-private-blockchains\/"},{"key":"e_1_3_2_1_5_1","unstructured":"Vitalik Buterin et al. 2013. Ethereum white paper. GitHub repository (2013) 22--23.  Vitalik Buterin et al. 2013. Ethereum white paper. GitHub repository (2013) 22--23."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89255-7_15"},{"key":"e_1_3_2_1_7_1","unstructured":"Estonia ID card. [n.d.]. ([n.d.]). https:\/\/e-estonia.com\/solutions\/e-identity\/id-card\/  Estonia ID card. [n.d.]. ([n.d.]). https:\/\/e-estonia.com\/solutions\/e-identity\/id-card\/"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"D. L. Dill and A.D. Rubin. 2004. E-Voting Security. Security and Privacy Magazine 2(1) (2004) 22--23.  D. L. Dill and A.D. Rubin. 2004. E-Voting Security. Security and Privacy Magazine 2(1) (2004) 22--23.","DOI":"10.1109\/MSECP.2004.1264849"},{"key":"e_1_3_2_1_9_1","volume-title":"Election Security: Perception and Reality","author":"Evans D.","year":"2004","unstructured":"D. Evans and N. Paul . 2004 . Election Security: Perception and Reality . IEEE Privacy Magazine 2(1) (2004), 2--9. D. Evans and N. Paul. 2004. Election Security: Perception and Reality. IEEE Privacy Magazine 2(1) (2004), 2--9."},{"key":"e_1_3_2_1_10_1","unstructured":"Aicha Fatrah. [n.d.]. ([n. d.]). https:\/\/github.com\/aiichaa\/votingSystem  Aicha Fatrah. [n.d.]. ([n. d.]). https:\/\/github.com\/aiichaa\/votingSystem"},{"key":"e_1_3_2_1_11_1","series-title":"SIAM Journal on computing 18, 1","volume-title":"The knowledge complexity of interactive proof systems","author":"Goldwasser Shafi","year":"1989","unstructured":"Shafi Goldwasser , Silvio Micali , and Charles Rackoff . 1989. The knowledge complexity of interactive proof systems . SIAM Journal on computing 18, 1 ( 1989 ), 186--208. Shafi Goldwasser, Silvio Micali, and Charles Rackoff. 1989. The knowledge complexity of interactive proof systems. SIAM Journal on computing 18, 1 (1989), 186--208."},{"key":"e_1_3_2_1_12_1","volume-title":"In Proceedings of the IEEE 11th International Conference on Cloud Computing (CLOUD). IEEE","author":"Hj\u00e1lmarsson Fri\u00f0rik","year":"2018","unstructured":"Fri\u00f0rik \u00de Hj\u00e1lmarsson , Gunnlaugur K Hrei\u00f0arsson , Mohammad Hamdaqa , and G\u00edsli Hj\u00e1lmt\u00fdsson . 2018 . In Proceedings of the IEEE 11th International Conference on Cloud Computing (CLOUD). IEEE , San Francisco, CA, USA, 983--986. Fri\u00f0rik \u00de Hj\u00e1lmarsson, Gunnlaugur K Hrei\u00f0arsson, Mohammad Hamdaqa, and G\u00edsli Hj\u00e1lmt\u00fdsson. 2018. In Proceedings of the IEEE 11th International Conference on Cloud Computing (CLOUD). IEEE, San Francisco, CA, USA, 983--986."},{"volume-title":"Proceedings of the IEEE 35th Annual 2001 International Carnahan Conference on Security Technology. IEEE","author":"Jan J.","key":"e_1_3_2_1_14_1","unstructured":"J. Jan , Y. Chen , and Y. Lin . 2010. The Design of Protocol for e-Voting on the Internet . In Proceedings of the IEEE 35th Annual 2001 International Carnahan Conference on Security Technology. IEEE , London, England, UK, 180--189. J. Jan, Y. Chen, and Y. Lin. 2010. The Design of Protocol for e-Voting on the Internet. In Proceedings of the IEEE 35th Annual 2001 International Carnahan Conference on Security Technology. IEEE, London, England, UK, 180--189."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICEBE.2007.36"},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of the IEEE International Conference on e-Business Engineering (ICEBE'07)","author":"Meng Bo","year":"2010","unstructured":"Bo Meng . 2010 . Analyzing and Improving Internet Voting Protocol . In Proceedings of the IEEE International Conference on e-Business Engineering (ICEBE'07) . Springer, Hong Kong, China, 114--130. Bo Meng. 2010. Analyzing and Improving Internet Voting Protocol. In Proceedings of the IEEE International Conference on e-Business Engineering (ICEBE'07). Springer, Hong Kong, China, 114--130."},{"key":"e_1_3_2_1_17_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system.","author":"Nakamoto S.","year":"2008","unstructured":"S. Nakamoto . 2008 . Bitcoin: A peer-to-peer electronic cash system. (2008). https:\/\/bitcoin.org\/bitcoin.pdf S. Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. (2008). https:\/\/bitcoin.org\/bitcoin.pdf"},{"key":"e_1_3_2_1_18_1","unstructured":"Ministry of Local Government and Modernisation. [n.d.]. Internet Voting Pilot to be Discontinued. ([n.d.]). https:\/\/www.regjeringen.no\/en\/aktuelt\/Internet-voting-pilot-to-be-discontinued\/id764300\/  Ministry of Local Government and Modernisation. [n.d.]. Internet Voting Pilot to be Discontinued. ([n.d.]). https:\/\/www.regjeringen.no\/en\/aktuelt\/Internet-voting-pilot-to-be-discontinued\/id764300\/"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/NCTT.2003.1188334"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48405-1_10"}],"event":{"name":"BDIoT'19: The 4th International Conference On Big Data and Internet of Things","acronym":"BDIoT'19","location":"Rabat Morocco"},"container-title":["Proceedings of the 4th International Conference on Big Data and Internet of Things"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3372938.3372969","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3372938.3372969","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T17:49:58Z","timestamp":1750268998000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3372938.3372969"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,23]]},"references-count":19,"alternative-id":["10.1145\/3372938.3372969","10.1145\/3372938"],"URL":"https:\/\/doi.org\/10.1145\/3372938.3372969","relation":{},"subject":[],"published":{"date-parts":[[2019,10,23]]},"assertion":[{"value":"2020-01-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}