{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T20:59:47Z","timestamp":1763499587345,"version":"3.45.0"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,12]],"date-time":"2021-11-12T00:00:00Z","timestamp":1636675200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,12]]},"DOI":"10.1145\/3460120.3484555","type":"proceedings-article","created":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T12:05:34Z","timestamp":1636805134000},"page":"2632-2652","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Verifying Table-Based Elections"],"prefix":"10.1145","author":[{"given":"David","family":"Basin","sequence":"first","affiliation":[{"name":"ETH Zurich, Zurich, Switzerland"}]},{"given":"Jannik","family":"Dreier","sequence":"additional","affiliation":[{"name":"Universite de Lorraine, CNRS, Inria, LORIA, Vandoeuvre-l\u00e8s-Nancy, France"}]},{"given":"Sofia","family":"Giampietro","sequence":"additional","affiliation":[{"name":"ETH Z\u00fcrich, Z\u00fcrich, Switzerland"}]},{"given":"Sa\u0161a","family":"Radomirovi\u0107","sequence":"additional","affiliation":[{"name":"Heriot-Watt University, Edinburgh, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2021,11,13]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Serge Abiteboul Richard Hull and Victor Vianu (Eds.). 1995. Foundations of Databases: The Logical Level 1st ed.). Addison-Wesley Longman Publishing Co. Inc. Boston MA USA."},{"key":"e_1_3_2_1_2_1","volume-title":"Dispute Resolution in Voting. In 33rd IEEE Computer Security Foundations Symposium, CSF 2020","author":"Basin David A.","year":"2020","unstructured":"David A. Basin, Sasa Radomirovic, and Lara Schmid. 2020. Dispute Resolution in Voting. In 33rd IEEE Computer Security Foundations Symposium, CSF 2020, Boston, MA, USA, June 22--26, 2020. IEEE, 1--16."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29011-4_17"},{"key":"e_1_3_2_1_4_1","volume-title":"2013 Electronic Voting Technology Workshop\/Workshop on Trustworthy Elections (EVT\/WOTE 13)","author":"Bell Susan","year":"2013","unstructured":"Susan Bell, Josh Benaloh, Michael D. Byrne, Dana Debeauvoir, Bryce Eakin, Philip Kortum, Neal McBurnett, Olivier Pereira, Philip B. Stark, Dan S. Wallach, Gail Fisher, Julian Montoya, Michelle Parker, and Michael Winn. 2013. STAR-Vote: A Secure, Transparent, Auditable, and Reliable Voting System. In 2013 Electronic Voting Technology Workshop\/Workshop on Trustworthy Elections (EVT\/WOTE 13). USENIX Association, Washington, D.C. https:\/\/www.usenix.org\/conference\/evtwote13\/workshop-program\/presentation\/bell"},{"key":"e_1_3_2_1_5_1","unstructured":"Josh Daniel Cohen Benaloh. 1987. Verifiable Secret-Ballot Elections. Ph.D. Dissertation. Yale University USA. AAI8809191."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.37"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2016.69"},{"key":"e_1_3_2_1_8_1","unstructured":"Swiss Federal Chancellery. [n.d.]. Anforderungskatalog f\u00fcr eidgen\u00f6ssische Volksabstimmungen mit der elektronischen Stimmabgabe. https:\/\/www.bk.admin.ch\/themen\/pore\/evoting\/07979\/index.html"},{"key":"e_1_3_2_1_9_1","unstructured":"David Chaum. [n.d.]. Random-Sample Voting - More democratic better quality and far lower cost. https:\/\/rsvoting.org\/whitepaper\/white_paper.pdf. Last accessed on 2021-01--20."},{"volume-title":"Advances in Cryptology -- EUROCRYPT '88","author":"Chaum David","key":"e_1_3_2_1_10_1","unstructured":"David Chaum. 1988. Elections with Unconditionally-Secret Ballots and Disruption Equivalent to Breaking RSA. In Advances in Cryptology -- EUROCRYPT '88, D. Barstow, W. Brauer, P. Brinch Hansen, D. Gries, D. Luckham, C. Moler, A. Pnueli, G. Seegm\u00fcller, J. Stoer, N. Wirth, and Christoph G. G\u00fcnther (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 177--182."},{"volume-title":"Proceedings of the Conference on Electronic Voting Technology","author":"Chaum David","key":"e_1_3_2_1_11_1","unstructured":"David Chaum, Richard Carback, Jeremy Clark, Aleksander Essex, Stefan Popoveniuc, Ronald L. Rivest, Peter Y. A. Ryan, Emily Shen, and Alan T. Sherman. 2008a. Scantegrity II: End-to-end Verifiability for Optical Scan Election Systems Using Invisible Ink Confirmation Codes. In Proceedings of the Conference on Electronic Voting Technology (San Jose, CA) (EVT'08). USENIX Association, Berkeley, CA, USA, Article 14, 13 pages. http:\/\/dl.acm.org\/citation.cfm?id=1496739.1496753"},{"key":"e_1_3_2_1_12_1","volume-title":"Scantegrity: End-to-end voter verifiable optical-scan voting","author":"Chaum David","year":"2008","unstructured":"David Chaum, Aleksander Essex, Richard Carback, Jeremy Clark, Stefan Popoveniuc, Alan T. Sherman, and P. Vora. 2008b. Scantegrity: End-to-end voter verifiable optical-scan voting. IEEE Security Privacy, Vol. 6, Article 3, 40--46 pages."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/362384.362685"},{"key":"e_1_3_2_1_14_1","first-page":"23","article-title":"Understanding Relations (Installment #7)","volume":"7","author":"Codd E. F.","year":"1975","unstructured":"E. F. Codd. 1975. Understanding Relations (Installment #7). FDT Bull. ACM SIGFIDET SIGMOD, Vol. 7, 3 (1975), 23--28.","journal-title":"FDT Bull. ACM SIGFIDET SIGMOD"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/320107.320109"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1985.2"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.52"},{"key":"e_1_3_2_1_18_1","volume-title":"Use of voting computers in 2005 Bundestag election unconstitutional","author":"Constitutional Court German Federal","year":"2009","unstructured":"German Federal Constitutional Court. 2009. Use of voting computers in 2005 Bundestag election unconstitutional. Press Release No. 19\/2009, available at https:\/\/www.bundesverfassungsgericht.de\/SharedDocs\/Pressemitteilungen\/EN\/2009\/bvg09-019.html. Last visited 2021-01--18."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--642--12980--3_18"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/11787006_1"},{"key":"e_1_3_2_1_21_1","volume-title":"New Directions in Electronic Voting (Lecture Notes in Computer Science","volume":"401","author":"Essex Aleksander","year":"2010","unstructured":"Aleksander Essex, Jeremy Clark, and Carlisle Adams. 2010a. Towards Trustworthy Elections, New Directions in Electronic Voting. In Towards Trustworthy Elections, New Directions in Electronic Voting (Lecture Notes in Computer Science, Vol. 6000). Springer, 388--401."},{"key":"e_1_3_2_1_22_1","volume-title":"Proceedings of the 2010 International Conference on Electronic Voting Technology\/Workshop on Trustworthy Elections","author":"Essex Aleksander","year":"2010","unstructured":"Aleksander Essex, Jeremy Clark, Urs Hengartner, and Carlisle Adams. 2010b. Eperio: Mitigating Technical Complexity in Cryptographic Election Verification. In Proceedings of the 2010 International Conference on Electronic Voting Technology\/Workshop on Trustworthy Elections (Washington, DC) (EVT\/WOTE'10). USENIX Association, Berkeley, CA, USA, 1--16. http:\/\/dl.acm.org\/citation.cfm?id=1924892.1924905"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.14778\/1453856.1453873"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45539-6_38"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866366"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217302"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2004.04.005"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.33"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/501983.502000"},{"key":"e_1_3_2_1_30_1","volume-title":"New Directions in Electronic Voting (Lecture Notes in Computer Science","volume":"259","author":"Popoveniuc Stefan","year":"2010","unstructured":"Stefan Popoveniuc and Benjamin Hosp. 2010. An Introduction to PunchScan. In Towards Trustworthy Elections, New Directions in Electronic Voting (Lecture Notes in Computer Science, Vol. 6000). Springer, 242--259."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"volume-title":"Logical Approaches to Incomplete Information: A survey","author":"van der Meyden Ron","key":"e_1_3_2_1_32_1","unstructured":"Ron van der Meyden. 1998. Logical Approaches to Incomplete Information: A survey .Springer Berlin Heidelberg, 307--356."}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Virtual Event Republic of Korea","acronym":"CCS '21"},"container-title":["Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484555","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3484555","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T20:53:45Z","timestamp":1763499225000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484555"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,12]]},"references-count":32,"alternative-id":["10.1145\/3460120.3484555","10.1145\/3460120"],"URL":"https:\/\/doi.org\/10.1145\/3460120.3484555","relation":{},"subject":[],"published":{"date-parts":[[2021,11,12]]},"assertion":[{"value":"2021-11-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}