{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,2]],"date-time":"2025-10-02T00:47:33Z","timestamp":1759366053689,"version":"build-2065373602"},"publisher-location":"New York, NY, USA","reference-count":135,"publisher":"ACM","funder":[{"name":"Fulbright U.S. Student Program"},{"name":"Swiss Government Excellence Scholarships for Foreign Scholars"},{"name":"armasuisse Science and Technology"},{"DOI":"10.13039\/501100001961","name":"AXA Research Fund","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001961","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000006","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N000141912361"],"award-info":[{"award-number":["N000141912361"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100014013","name":"UK Research and Innovation","doi-asserted-by":"publisher","award":["EP\/X017524\/1"],"award-info":[{"award-number":["EP\/X017524\/1"]}],"id":[{"id":"10.13039\/100014013","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,10,13]]},"DOI":"10.1145\/3731569.3764837","type":"proceedings-article","created":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T12:43:24Z","timestamp":1759322604000},"page":"834-874","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["TRIP: Coercion-resistant Registration for E-Voting with Verifiability and Usability in Votegral"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0694-5489","authenticated-orcid":false,"given":"Louis-Henri","family":"Merino","sequence":"first","affiliation":[{"name":"\u00c9cole Polytechnique F\u00e9d\u00e9rale de Lausanne, Lausanne, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4284-6720","authenticated-orcid":false,"given":"Simone","family":"Colombo","sequence":"additional","affiliation":[{"name":"King's College London, London, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8379-471X","authenticated-orcid":false,"given":"Rene","family":"Reyes","sequence":"additional","affiliation":[{"name":"Boston University, Boston, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0330-8823","authenticated-orcid":false,"given":"Alaleh","family":"Azhir","sequence":"additional","affiliation":[{"name":"Harvard University, Cambridge, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5208-6622","authenticated-orcid":false,"given":"Shailesh","family":"Mishra","sequence":"additional","affiliation":[{"name":"\u00c9cole Polytechnique F\u00e9d\u00e9rale de Lausanne, Lausanne, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-6611-2544","authenticated-orcid":false,"given":"Pasindu","family":"Tennage","sequence":"additional","affiliation":[{"name":"\u00c9cole Polytechnique F\u00e9d\u00e9rale de Lausanne, Lausanne, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-7118-8752","authenticated-orcid":false,"given":"Mohammad Amin","family":"Raeisi","sequence":"additional","affiliation":[{"name":"Yale University, New Haven, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-6096-0834","authenticated-orcid":false,"given":"Haoqian","family":"Zhang","sequence":"additional","affiliation":[{"name":"\u00c9cole Polytechnique F\u00e9d\u00e9rale de Lausanne, Lausanne, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-1290-9121","authenticated-orcid":false,"given":"Jeff R.","family":"Allen","sequence":"additional","affiliation":[{"name":"\u00c9cole Polytechnique F\u00e9d\u00e9rale de Lausanne, Lausanne, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5008-1107","authenticated-orcid":false,"given":"Bernhard","family":"Tellenbach","sequence":"additional","affiliation":[{"name":"Armasuisse, Bern, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7791-8149","authenticated-orcid":false,"given":"Vero","family":"Estrada-Gali\u00f1anes","sequence":"additional","affiliation":[{"name":"\u00c9cole Polytechnique F\u00e9d\u00e9rale de Lausanne, Lausanne, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0528-3033","authenticated-orcid":false,"given":"Bryan","family":"Ford","sequence":"additional","affiliation":[{"name":"\u00c9cole Polytechnique F\u00e9d\u00e9rale de Lausanne, Lausanne, Switzerland"}]}],"member":"320","published-online":{"date-parts":[[2025,10,12]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"USENIX Journal of Election Technology and Systems (2","author":"Achenbach Dirk","unstructured":"Dirk Achenbach, Carmen Kempka, Bernhard L\u00f6we, and J\u00f6rn M\u00fcller-Quade. 2015. Improved Coercion-Resistant Electronic Elections through Deniable Re-Voting. In USENIX Journal of Election Technology and Systems (2, Vol. 3). USENIX Association, 26\u201345. https:\/\/www.usenix.org\/conference\/jets15\/workshop-program\/presentation\/achenbach"},{"key":"e_1_3_2_1_2_1","volume-title":"USENIX Security Symposium","volume":"17","author":"Adida Ben","year":"2008","unstructured":"Ben Adida. 2008. Helios: Web-based Open-Audit Voting.. In USENIX Security Symposium, Vol. 17. USENIX Association, 335\u2013348. https:\/\/www.usenix.org\/legacy\/events\/sec08\/tech\/full_papers\/adida\/adida.pdf"},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of the USENIX\/Accurate Electronic Voting Technology Workshop 2006 on Electronic Voting Technology Workshop","author":"Adida Ben","unstructured":"Ben Adida and C. Andrew Neff. 2006. Ballot Casting Assurance. In Proceedings of the USENIX\/Accurate Electronic Voting Technology Workshop 2006 on Electronic Voting Technology Workshop. USENIX Association. https:\/\/www.usenix.org\/conference\/evt-06\/ballot-casting-assurance"},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of the 2009 conference on Electronic voting technology\/workshop on trustworthy elections","author":"Adida Ben","unstructured":"Ben Adida and C. Andrew Neff. 2009. Efficient Receipt-Free Ballot Casting Resistant to Covert Channels. In Proceedings of the 2009 conference on Electronic voting technology\/workshop on trustworthy elections. USENIX Association. https:\/\/www.usenix.org\/conference\/evtwote-09\/efficient-receipt-free-ballot-casting-resistant-covert-channels"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2408.07892"},{"key":"e_1_3_2_1_6_1","unstructured":"Makhabbat Amanbay. 2023. The Ethics of AI-generated Art. https:\/\/papers.ssrn.com\/abstract=4551467"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1089\/elj.2019.0619"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12980-3_20"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","unstructured":"James Austgen Andr\u00e9s F\u00e1brega Sarah Allen Kushal Babel Mahimna Kelkar and Ari Juels. 2023. DAO Decentralization: Voting-Bloc Entropy Bribery and Dark DAOs. 10.48550\/arXiv.2311.03530","DOI":"10.48550\/arXiv.2311.03530"},{"key":"e_1_3_2_1_10_1","volume-title":"Advances in Cryptology \u2013 EUROCRYPT","author":"Bayer Stephanie","year":"2012","unstructured":"Stephanie Bayer and Jens Groth. 2012. Efficient Zero-Knowledge Argument for Correctness of a Shuffle. In Advances in Cryptology \u2013 EUROCRYPT 2012. Vol. 7237. Springer Berlin Heidelberg, Berlin, Heidelberg, 263\u2013280. http:\/\/link.springer.com\/10.1007\/978-3-642-29011-4_17"},{"key":"e_1_3_2_1_11_1","unstructured":"Josh Benaloh. 1987. Verifiable Secret-Ballot Elections. Ph.D. Thesis. Yale University. https:\/\/www.microsoft.com\/en-us\/research\/publication\/verifiable-secret-ballot-elections\/"},{"key":"e_1_3_2_1_12_1","volume-title":"2007 USENIX\/ACCURATE Electronic Voting Technology Workshop","author":"Benaloh Josh","year":"2007","unstructured":"Josh Benaloh. 2007. Ballot Casting Assurance via Voter-Initiated Poll Station Auditing. In 2007 USENIX\/ACCURATE Electronic Voting Technology Workshop. Boston, MA. https:\/\/www.usenix.org\/conference\/evt-07\/ballot-casting-assurance-voter-initiated-poll-station-auditing"},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings of the 26th annual ACM symposium on Theory of Computing (STOC '94)","author":"Benaloh Josh","year":"1994","unstructured":"Josh Benaloh and Dwight Tuinstra. 1994. Receipt-free secret-ballot elections. In Proceedings of the 26th annual ACM symposium on Theory of Computing (STOC '94). 544\u2013553. 10.1145\/195058.195407"},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of the 27th Annual Computer Security Applications Conference (ACSAC '11)","author":"Benzel Terry","year":"2011","unstructured":"Terry Benzel. 2011. The science of cyber security experimentation: the DETER project. In Proceedings of the 27th Annual Computer Security Applications Conference (ACSAC '11). Association for Computing Machinery, New York, NY, USA, 137\u2013148. 10.1145\/2076732.2076752"},{"key":"e_1_3_2_1_15_1","unstructured":"David Bernhard V\u00e9ronique Cortier Pierrick Gaudry Mathieu Turuani and Bogdan Warinschi. 2018. Verifiability Analysis of CHVote. https:\/\/eprint.iacr.org\/undefined\/undefined"},{"key":"e_1_3_2_1_16_1","first-page":"2","article-title":"Liquid Democracy: Potentials, Problems, and Perspectives","volume":"24","author":"Blum Christian","year":"2016","unstructured":"Christian Blum and Christina Isabel Zuber. 2016. Liquid Democracy: Potentials, Problems, and Perspectives. The Journal of Political Philosophy 24, 2 (June 2016), 162\u2013182.","journal-title":"The Journal of Political Philosophy"},{"key":"e_1_3_2_1_17_1","volume-title":"Proof-of-Personhood: Redemocratizing Permissionless Cryptocurrencies. In 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). 23\u201326","author":"Borge Maria","year":"2017","unstructured":"Maria Borge, Eleftherios Kokoris-Kogias, Philipp Jovanovic, Linus Gasser, Nicolas Gailly, and Bryan Ford. 2017. Proof-of-Personhood: Redemocratizing Permissionless Cryptocurrencies. In 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). 23\u201326. 10.1109\/EuroSPW.2017.46"},{"key":"e_1_3_2_1_18_1","volume-title":"Saving Democracy: Reducing Gang Influence on Political Elections in El Salvador. Master's thesis","author":"Castro Eleno","year":"2022","unstructured":"Eleno Castro and Randy Kotti. 2022. Saving Democracy: Reducing Gang Influence on Political Elections in El Salvador. Master's thesis. Harvard University."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2004.1264852"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48071-4_7"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.15779\/Z38RV0D15J"},{"key":"e_1_3_2_1_22_1","volume-title":"2008 IEEE Symposium on Security and Privacy. IEEE, 354\u2013368","author":"Clarkson Michael R.","year":"2008","unstructured":"Michael R. Clarkson, Stephen Chong, and Andrew C. Myers. 2008. Civitas: Toward a Secure Voting System. In 2008 IEEE Symposium on Security and Privacy. IEEE, 354\u2013368. 10.1109\/SP.2008.32"},{"key":"e_1_3_2_1_23_1","unstructured":"Committee on the Future of Voting: Accessible Reliable Verifiable Technology Committee on Science Technology and Law Policy and Global Affairs Computer Science and Telecommunications Board Division on Engineering and Physical Sciences and National Academies of Sciences Engineering and Medicine. 2018. Securing the Vote: Protecting American Democracy. National Academies Press Washington D.C. https:\/\/www.nap.edu\/catalog\/25120"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-48806-1_1"},{"key":"e_1_3_2_1_25_1","unstructured":"V\u00e9ronique Cortier Jannik Dreier Pierrick Gaudry and Mathieu Turuani. 2019. A simple alternative to Benaloh challenge for the cast-as-intended property in Helios\/Belenios. (2019). https:\/\/hal.inria.fr\/hal-02346420"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1093\/pastj\/gtr008","article-title":"Reforming Voting Practices In a Global Age: The Making and Remaking of the Modern Secret Ballot in Britain, France and the United States c. 1600\u2014c. 1950","volume":"212","author":"Crook Malcolm","year":"2011","unstructured":"Malcolm Crook and Tom Crook. 2011. Reforming Voting Practices In a Global Age: The Making and Remaking of the Modern Secret Ballot in Britain, France and the United States c. 1600\u2014c. 1950. Past & Present 212 (2011), 199\u2013237. https:\/\/www.jstor.org\/stable\/23014789","journal-title":"Past & Present"},{"key":"e_1_3_2_1_27_1","volume-title":"Proceedings of the 18th conference on USENIX security symposium (SSYM'09)","author":"Scott","unstructured":"Scott A. Crosby and Dan S. Wallach. 2009. Efficient data structures for tamper-evident logging. In Proceedings of the 18th conference on USENIX security symposium (SSYM'09). USENIX Association, USA, 317\u2013334."},{"key":"e_1_3_2_1_28_1","unstructured":"Anders Dalskov. 2021. anderspkd\/groth-shuffle: Bayer-Groth shuffle. https:\/\/github.com\/anderspkd\/groth-shuffle\/tree\/master"},{"key":"e_1_3_2_1_29_1","unstructured":"Al Danial. [n. d.]. Counting Lines of Code. http:\/\/cloc.sourceforge.net\/."},{"key":"e_1_3_2_1_30_1","unstructured":"DEDIS. 2025. DEDIS Advanced Crypto Library for Go. https:\/\/github.com\/dedis\/kyber"},{"key":"e_1_3_2_1_31_1","volume-title":"Reliable MIX Cascade Networks through Reputation","author":"Dingledine Roger","unstructured":"Roger Dingledine and Paul Syverson. 2003. Reliable MIX Cascade Networks through Reputation. In Financial Cryptography, Gerhard Goos, Juris Hartmanis, Jan Van Leeuwen, and Matt Blaze (Eds.). Vol. 2357. Springer Berlin Heidelberg, Berlin, Heidelberg, 253\u2013268. http:\/\/link.springer.com\/10.1007\/3-540-36504-4_18"},{"key":"e_1_3_2_1_32_1","volume-title":"Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems (CHI '19)","author":"Distler Verena","year":"2019","unstructured":"Verena Distler, Marie-Laure Zollinger, Carine Lallemand, Peter B. Roenne, Peter Y. A. Ryan, and Vincent Koenig. 2019. Security - Visible, Yet Unseen?. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems (CHI '19). Association for Computing Machinery, New York, NY, USA, 1\u201313. 10.1145\/3290605.3300835"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45748-8_24"},{"key":"e_1_3_2_1_34_1","unstructured":"E-Estonia. 2024. ID-card | e-estonia. https:\/\/e-estonia.com\/solutions\/estonian-e-identity\/id-card\/"},{"key":"e_1_3_2_1_35_1","volume-title":"e-Democracy & open data - e-Estonia. https:\/\/e-estonia.com\/solutions\/e-governance\/e-democracy\/ Accessed","year":"2025","unstructured":"E-Estonia. 2025. e-Democracy & open data - e-Estonia. https:\/\/e-estonia.com\/solutions\/e-governance\/e-democracy\/ Accessed August 2025."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2022.101718"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1419828112"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","unstructured":"Ehsan Estaji Thomas Haines Kristian Gj\u00f8steen Peter B. R\u00f8nne Peter Y. A. Ryan and Najmeh Soroush. 2020. Revisiting Practical and Usable Coercion-Resistant Remote E-Voting. In E-Vote-ID 2020: Electronic Voting. 50\u201366. 10.1007\/978-3-030-60347-2_4","DOI":"10.1007\/978-3-030-60347-2_4"},{"key":"e_1_3_2_1_39_1","unstructured":"Christopher Famighetti. 2016. Long voting lines: Explained. Technical Report. Brennan Center for Justice. https:\/\/www.brennancenter.org\/sites\/default\/files\/analysis\/Long_Voting_Lines_Explained.pdf"},{"key":"e_1_3_2_1_40_1","volume-title":"Informatik","author":"Feier Christian","year":"2014","unstructured":"Christian Feier, Stephan Neumann, and Melanie Volkamer. 2014. Coercion-Resistant Internet Voting in Practice. In Informatik 2014. https:\/\/dl.gi.de\/handle\/20.500.12116\/2749"},{"key":"e_1_3_2_1_41_1","volume-title":"Voter coercion and pro-poor redistribution in rural Mexico. WIDER Working Paper 2021\/141","author":"Filipovich Dragan","unstructured":"Dragan Filipovich, Miguel Ni\u00f1o-Zaraz\u00faa, and Alma Santill\u00e1n Hern\u00e1ndez. 2021. Voter coercion and pro-poor redistribution in rural Mexico. WIDER Working Paper 2021\/141. The United Nations University World Institute for Development Economics Research (UNU-WIDER). https:\/\/hdl.handle.net\/10419\/248355"},{"key":"e_1_3_2_1_42_1","volume-title":"The Secret Ballot At Risk: Recommendations for Protecting Democracy. (Aug","author":"Fitzgerald Caitriona","year":"2016","unstructured":"Caitriona Fitzgerald, Pamela Smith, and Susannah Goodman. 2016. The Secret Ballot At Risk: Recommendations for Protecting Democracy. (Aug. 2016)."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41562-023-01550-8"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","unstructured":"Bryan Ford. 2020. Identity and Personhood in Digital Democracy: Evaluating Inclusion Equality Security and Privacy in Pseudonym Parties and Other Proofs of Personhood. 10.48550\/arXiv.2011.02412","DOI":"10.48550\/arXiv.2011.02412"},{"key":"e_1_3_2_1_45_1","unstructured":"Bryan Ford. 2020. A Liquid Perspective on Democratic Choice. http:\/\/arxiv.org\/abs\/2003.12393"},{"key":"e_1_3_2_1_46_1","volume-title":"Proceedings of the 1st Workshop on Social Network Systems (SocialNets '08)","author":"Ford Bryan","year":"2008","unstructured":"Bryan Ford and Jacob Strauss. 2008. An offline foundation for online accountable pseudonyms. In Proceedings of the 1st Workshop on Social Network Systems (SocialNets '08). Association for Computing Machinery, New York, NY, USA, 31\u201336. 10.1145\/1435497.1435503"},{"key":"e_1_3_2_1_47_1","first-page":"152","article-title":"UnLynx: A Decentralized System for Privacy-Conscious Data Sharing","volume":"4","author":"Froelicher David","year":"2017","unstructured":"David Froelicher, Patricia Egger, Jo\u00e3o S\u00e1 Sousa, Jean Louis Raisaro, Zhicong Huang, Christian Vincent Mouchet, Bryan Ford, and Jean-Pierre Hubaux. 2017. UnLynx: A Decentralized System for Privacy-Conscious Data Sharing. In Proceedings on Privacy Enhancing Technologies, Vol. 4. 152\u2013170. https:\/\/petsymposium.org\/2017\/papers\/issue4\/paper54-2017-4-source.pdf","journal-title":"Proceedings on Privacy Enhancing Technologies"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0007123416000752"},{"key":"e_1_3_2_1_49_1","volume-title":"Proceedings of the 26th Symposium on Operating Systems Principles (SOSP '17)","author":"Gilad Yossi","year":"2017","unstructured":"Yossi Gilad, Rotem Hemo, Silvio Micali, Georgios Vlachos, and Nickolai Zeldovich. 2017. Algorand: Scaling Byzantine Agreements for Cryptocurrencies. In Proceedings of the 26th Symposium on Operating Systems Principles (SOSP '17). Association for Computing Machinery, New York, NY, USA, 51\u201368. 10.1145\/3132747.3132757"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1177\/0022343319884998"},{"key":"e_1_3_2_1_51_1","unstructured":"gozxing 2021. A Barcode Scanning\/Encoding Library for Go. https:\/\/github.com\/makiuchi-d\/gozxing."},{"key":"e_1_3_2_1_52_1","unstructured":"Michael Graff and Nick Ochsner. 2021. 'This Smacks of Something Gone Awry': A True Tale of Absentee Vote Fraud. https:\/\/www.politico.com\/news\/magazine\/2021\/11\/29\/true-tale-absentee-voter-fraud-north-carolina-523238"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-010-9067-9"},{"key":"e_1_3_2_1_54_1","volume-title":"Voter Suppression Post-Shelby: Impacts and Issues of Voter Purge and Voter ID Laws. Mercer Law Review (May","author":"Hardy Lydia","year":"2020","unstructured":"Lydia Hardy. 2020. Voter Suppression Post-Shelby: Impacts and Issues of Voter Purge and Voter ID Laws. Mercer Law Review (May 2020)."},{"key":"e_1_3_2_1_55_1","volume-title":"Netizens: On the History and Impact of Usenet and the Internet","author":"Hauben Michael","year":"1997","unstructured":"Michael Hauben and Ronda Hauben. 1997. Netizens: On the History and Impact of Usenet and the Internet. IEEE Computer Society Press. https:\/\/www.columbia.edu\/~hauben\/netbook\/"},{"key":"e_1_3_2_1_56_1","volume-title":"Open Democracy: Reinventing Popular Rule for the Twenty-First Century. https:\/\/press.princeton.edu\/books\/hardcover\/9780691181998\/open-democracy","author":"H\u00e9l\u00e8ne Landemore","year":"2020","unstructured":"Landemore H\u00e9l\u00e8ne. 2020. Open Democracy: Reinventing Popular Rule for the Twenty-First Century. https:\/\/press.princeton.edu\/books\/hardcover\/9780691181998\/open-democracy"},{"key":"e_1_3_2_1_57_1","volume-title":"E-voting and e-elections. https:\/\/www.id.ee\/en\/article\/e-voting-and-e-elections\/ Accessed","author":"ID.","year":"2025","unstructured":"ID. 2025. E-voting and e-elections. https:\/\/www.id.ee\/en\/article\/e-voting-and-e-elections\/ Accessed August 2025."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44448-3_13"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32747-6_7"},{"key":"e_1_3_2_1_60_1","volume-title":"Mail Carrier Accused of Throwing Away Mail-in Ballots. NBC Boston (Oct","author":"Johnson Malcolm","year":"2021","unstructured":"Malcolm Johnson. 2021. Mail Carrier Accused of Throwing Away Mail-in Ballots. NBC Boston (Oct. 2021). https:\/\/www.nbcboston.com\/news\/local\/mail-carrier-accused-of-throwing-away-mail-in-ballots\/2544494\/"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12980-3_2"},{"key":"e_1_3_2_1_62_1","unstructured":"Kurt Jung. 2024. GoFPDF document generator. https:\/\/github.com\/jung-kurt\/gofpdf"},{"key":"e_1_3_2_1_63_1","unstructured":"Alex Katsomitros. 2025. The great big tech break-up. https:\/\/www.worldfinance.com\/special-reports\/the-great-big-tech-break-up"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1080\/14747731.2011.621287"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-30625-0_9"},{"key":"e_1_3_2_1_66_1","first-page":"1","volume-title":"Proceedings of the International AAAI Conference on Web and Social Media 9","author":"Kling Christoph","year":"2015","unstructured":"Christoph Kling, J\u00e9r\u00f4me Kunegis, Heinrich Hartmann, Markus Strohmaier, and Steffen Staab. 2015. Voting Behaviour and Power in Online Democracy: A Study of LiquidFeedback in Germany's Pirate Party. Proceedings of the International AAAI Conference on Web and Social Media 9, 1 (2015), 208\u2013217. 10.1609\/icwsm.v9i1.14618"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21424-0_10"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","unstructured":"Kristjan Krips and Jan Willemson. 2019. On Practical Aspects of Coercion-Resistant Remote Voting Systems. In E-Vote-ID 2019: Electronic Voting. 216\u2013232. 10.1007\/978-3-030-30625-0_14","DOI":"10.1007\/978-3-030-30625-0_14"},{"key":"e_1_3_2_1_69_1","volume-title":"Proceedings of the IAVoSS Workshop on Trustworthy Elections. https:\/\/ucalgary.scholaris.ca\/items\/6cd2fb33-95ae-4712-83ff-b863dd915abe","author":"Krivoruchko Taisya","year":"2007","unstructured":"Taisya Krivoruchko. 2007. Robust Coercion-Resistant Registration for Remote E-voting. In Proceedings of the IAVoSS Workshop on Trustworthy Elections. https:\/\/ucalgary.scholaris.ca\/items\/6cd2fb33-95ae-4712-83ff-b863dd915abe"},{"key":"e_1_3_2_1_70_1","volume-title":"Robust coercion-resistant registration for remote electronic voting. Master's thesis","author":"Krivoruchko Taisya","year":"1880","unstructured":"Taisya Krivoruchko. 2007. Robust coercion-resistant registration for remote electronic voting. Master's thesis. University of Calgary. http:\/\/hdl.handle.net\/1880\/102243"},{"key":"e_1_3_2_1_71_1","volume-title":"Proceedings of the Fifth International Joint Conference on Electronic Voting. TalTech press, 189","author":"Kulyk Oksana","year":"2020","unstructured":"Oksana Kulyk and Stephan Neumann. 2020. Human Factors in Coercion Resistant Internet Voting-A Review of Existing Solutions and Open Challenges. In Proceedings of the Fifth International Joint Conference on Electronic Voting. TalTech press, 189."},{"key":"e_1_3_2_1_72_1","volume-title":"Ordinos: A Verifiable Tally-Hiding E-Voting System. In 2020 IEEE European Symposium on Security and Privacy. IEEE. 10","author":"K\u00fcsters Ralf","year":"2020","unstructured":"Ralf K\u00fcsters, Julian Liedtke, Johannes M\u00fcller, Daniel Rausch, and Andreas Vogt. 2020. Ordinos: A Verifiable Tally-Hiding E-Voting System. In 2020 IEEE European Symposium on Security and Privacy. IEEE. 10.1109\/EuroSP48549.2020.00022"},{"key":"e_1_3_2_1_73_1","volume-title":"Warren","author":"Lacelle-Webster Antonin","year":"2021","unstructured":"Antonin Lacelle-Webster and Mark E. Warren. 2021. Citizens' Assemblies and Democracy. In Oxford Research Encyclopedia of Politics. Oxford University Press. https:\/\/oxfordre.com\/politics\/display\/10.1093\/acrefore\/9780190228637.001.0001\/acrefore-9780190228637-e-1975"},{"key":"e_1_3_2_1_74_1","volume-title":"The Computer as a Communication Device. Science and Technology (April","author":"Licklider J.C.R.","year":"1968","unstructured":"J.C.R. Licklider. 1968. The Computer as a Communication Device. Science and Technology (April 1968)."},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1002\/j.1662-6370.2007.tb00075.x","article-title":"The Impact of Postal Voting on Participation: Evidence for Switzerland","volume":"13","author":"Luechinger Simon","year":"2007","unstructured":"Simon Luechinger, Myra Rosinger, and Alois Stutzer. 2007. The Impact of Postal Voting on Participation: Evidence for Switzerland. Swiss Political Science Review 13, 2 (2007), 167\u2013202.","journal-title":"Swiss Political Science Review"},{"key":"e_1_3_2_1_76_1","volume-title":"29th USENIX Security Symposium. USENIX Association, 1553\u20131570","author":"Lueks Wouter","year":"2020","unstructured":"Wouter Lueks, I\u00f1igo Querejeta-Azurmendi, and Carmela Troncoso. 2020. VoteAgain: A scalable coercion-resistant voting system. In 29th USENIX Security Symposium. USENIX Association, 1553\u20131570. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/lueks"},{"key":"e_1_3_2_1_77_1","volume-title":"2024 IEEE Symposium on Security and Privacy (SP). 3478\u20133496","author":"Merino Louis-Henri","year":"2024","unstructured":"Louis-Henri Merino, Alaleh Azhir, Haoqian Zhang, Simone Colombo, Bernhard Tellenbach, Vero Estrada-Gali\u00f1anes, and Bryan Ford. 2024. E-Vote Your Conscience: Perceptions of Coercion and Vote Buying, and the Usability of Fake Credentials in Online Voting. In 2024 IEEE Symposium on Security and Privacy (SP). 3478\u20133496. 10.1109\/SP54263.2024.00252"},{"key":"e_1_3_2_1_78_1","volume-title":"Haoqian Zhang, Jeff R. Allen","author":"Merino Louis-Henri","year":"2025","unstructured":"Louis-Henri Merino, Simone Colombo, Rene Reyes, Alaleh Azhir, Shailesh Mishra, Pasindu Tennage, Mohammad Amin Raeisi, Haoqian Zhang, Jeff R. Allen, Bernhard Tellenbach, Vero Estrada-Gali\u00f1anes, and Bryan Ford. 2025. TRIP: Coercion-resistant Registration for E-Voting with Verifiability and Usability in Votegral (extended version). http:\/\/arxiv.org\/abs\/2202.06692"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1109\/MS.2014.127","article-title":"The Go Programming language","volume":"31","author":"Meyerson Jeff","year":"2014","unstructured":"Jeff Meyerson. 2014. The Go Programming language. IEEE Software 31, 5 (2014), 104\u2013104.","journal-title":"IEEE Software"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","unstructured":"Tal Moran and Moni Naor. 2006. Receipt-Free Universally-Verifiable Voting with Everlasting Privacy. In Advances in Cryptology. 10.1007\/11818175_22","DOI":"10.1007\/11818175_22"},{"key":"e_1_3_2_1_81_1","unstructured":"move 2009. Military and Overseas Voter Empowerment \"MOVE\" Act. Pub. L. No. 111-84 \u00a7\u00a7 577-83(a). https:\/\/www.eac.gov\/sites\/default\/files\/document_library\/files\/Military-and-Overseas-Voter-Empowerment-%E2%80%9CMOVE%E2%80%9D-Act.pdf Enacted as part of the National Defense Authorization Act for Fiscal Year 2010."},{"key":"e_1_3_2_1_82_1","volume-title":"Bitcoin: A Peer-to-Peer Electronic Cash System.","author":"Nakamoto Satoshi","year":"2008","unstructured":"Satoshi Nakamoto. 2008. Bitcoin: A Peer-to-Peer Electronic Cash System."},{"key":"e_1_3_2_1_83_1","volume-title":"Conference of State Legislatures. 2024","author":"National","year":"2024","unstructured":"National Conference of State Legislatures. 2024. Table 18: States with All-Mail Elections. https:\/\/www.ncsl.org\/elections-and-campaigns\/table-18-states-with-all-mail-elections. Accessed: 2024-12-07."},{"key":"e_1_3_2_1_84_1","volume-title":"Conference of State Legislatures. 2024","author":"National","year":"2024","unstructured":"National Conference of State Legislatures. 2024. Table 3: States with Permanent Absentee Voting Lists. https:\/\/www.ncsl.org\/elections-and-campaigns\/table-3-states-with-permanent-absentee-voting-lists. Accessed: 2024-12-07."},{"key":"e_1_3_2_1_85_1","volume-title":"Proceedings of the 8th ACM conference on Computer and Communications Security (CCS '01)","author":"Neff C. Andrew","year":"2001","unstructured":"C. Andrew Neff. 2001. A verifiable secret shuffle and its application to e-voting. In Proceedings of the 8th ACM conference on Computer and Communications Security (CCS '01). Association for Computing Machinery, New York, NY, USA, 116\u2013125. 10.1145\/501983.502000"},{"key":"e_1_3_2_1_86_1","volume-title":"Proceedings of the 17th Brazilian Symposium on Human Factors in Computing Systems (IHC","author":"Neto Andr\u00e9 Silva","year":"2018","unstructured":"Andr\u00e9 Silva Neto, Matheus Leite, Roberto Ara\u00fajo, Marcelle Pereira Mota, Nelson Cruz Sampaio Neto, and Jacques Traor\u00e9. 2018. Usability Considerations For Coercion-Resistant Election Systems. In Proceedings of the 17th Brazilian Symposium on Human Factors in Computing Systems (IHC 2018). New York, NY, USA, 1\u201310. 10.1145\/3274192.3274232"},{"key":"e_1_3_2_1_87_1","unstructured":"Stephan Neumann Christian Feier Melanie Volkamer and Reto Koenig. 2013. Towards a practical JCJ\/Civitas implementation. In Informatik angepasst an Mensch Organisation und Umwelt."},{"key":"e_1_3_2_1_88_1","volume-title":"Seventh Conference on Availability, Reliability and Security. 10","author":"Neumann Stephan","year":"2012","unstructured":"Stephan Neumann and Melanie Volkamer. 2012. Civitas and the Real World: Problems and Solutions from a Practical Point of View. In Seventh Conference on Availability, Reliability and Security. 10.1109\/ARES.2012.75"},{"key":"e_1_3_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-295x.109.2.330"},{"key":"e_1_3_2_1_90_1","unstructured":"NIST. 2007. Usability Performance Benchmarks For the Voluntary Voting System Guidelines. Technical Report. NIST. https:\/\/www.nist.gov\/document\/usability-benchmarks-080907doc"},{"key":"e_1_3_2_1_91_1","volume-title":"Compressed to 0: The Silent Strings of Proof of Personhood. Stanford Journal of Blockchain Law & Policy (Jan","author":"Ohlhaver Puja","year":"2025","unstructured":"Puja Ohlhaver, Mikhail Nikulin, and Paula Berman. 2025. Compressed to 0: The Silent Strings of Proof of Personhood. Stanford Journal of Blockchain Law & Policy (Jan. 2025). https:\/\/stanford-jblp.pubpub.org\/pub\/compressed-to-0-proof-personhood\/release\/5"},{"key":"e_1_3_2_1_92_1","unstructured":"OpenPrinting. 2024. OpenPrinting\/cups. https:\/\/github.com\/OpenPrinting\/cups https:\/\/github.com\/OpenPrinting\/cups."},{"key":"e_1_3_2_1_93_1","unstructured":"Jon H Pammett and Nicole Goodman. 2013. Consultation and Evaluation Practices in the Implementation of Internet Voting in Canada and Europe."},{"key":"e_1_3_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1093\/cybsec\/tyaa025"},{"key":"e_1_3_2_1_95_1","volume-title":"How to Accommodate a Massive Surge in Absentee Voting","author":"Pildes Richard H.","year":"2020","unstructured":"Richard H. Pildes. 2020. How to Accommodate a Massive Surge in Absentee Voting. The University of Chicago Law Review (2020). https:\/\/lawreview.uchicago.edu\/online-archive\/how-accommodate-massive-surge-absentee-voting"},{"key":"e_1_3_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.1504\/EG.2010.030926"},{"key":"e_1_3_2_1_97_1","unstructured":"Swiss Post. 2024. E-Voting Architecture Document. Technical Report. v1.4.0."},{"key":"e_1_3_2_1_98_1","unstructured":"Marie Poteriaieva. 2024. Polymarket's $3.2 Billion Election Bet Shows Web3 Potential. https:\/\/www.forbes.com\/sites\/digital-assets\/2024\/11\/05\/polymarkets-32-billion-election-bet-shows-web3-potential\/"},{"key":"e_1_3_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.3390\/math8091618"},{"key":"e_1_3_2_1_100_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-923X.2005.00700.x"},{"key":"e_1_3_2_1_101_1","unstructured":"Rahul Rathi. 2019. Effect of Cambridge Analytica's Facebook ads on the 2016 US Presidential Election. https:\/\/towardsdatascience.com\/effect-of-cambridge-analyticas-facebook-ads-on-the-2016-us-presidential-election-dacb5462155d"},{"key":"e_1_3_2_1_102_1","volume-title":"Help America Vote Act of","author":"Rep Robert W.","year":"2002","unstructured":"Robert W. [R-OH-18 Rep. Ney. 2002. H.R.3295 - 107th Congress (2001-2002): Help America Vote Act of 2002. https:\/\/www.congress.gov\/bill\/107th-congress\/house-bill\/3295"},{"key":"e_1_3_2_1_103_1","volume-title":"Moldovan Police Accuse Pro-Russian Oligarch Of $39M Vote-Buying Scheme. Radio Free Europe\/Radio Liberty (Oct","author":"Service L's Moldovan","year":"2024","unstructured":"RFE\/RL's Moldovan Service. 2024. Moldovan Police Accuse Pro-Russian Oligarch Of $39M Vote-Buying Scheme. Radio Free Europe\/Radio Liberty (Oct. 2024). https:\/\/www.rferl.org\/a\/moldova-police-accuse-shor-russia-oligarch-39m-vote-buying\/33172951.html"},{"key":"e_1_3_2_1_104_1","volume-title":"Proceedings of the 2020 Conference on Fairness, Accountability, and Transparency (FAT* '20)","author":"Ribeiro Manoel Horta","year":"2020","unstructured":"Manoel Horta Ribeiro, Raphael Ottoni, Robert West, Virg\u00edlio A. F. Almeida, and Wagner Meira. 2020. Auditing radicalization pathways on YouTube. In Proceedings of the 2020 Conference on Fairness, Accountability, and Transparency (FAT* '20). Association for Computing Machinery, New York, NY, USA, 131\u2013141. 10.1145\/3351095.3372879"},{"key":"e_1_3_2_1_105_1","unstructured":"Gary Robertson. 2022. Plea agreements reached by 4 in NC Congress ballot probe. https:\/\/apnews.com\/article\/2022-midterm-elections-health-covid-north-carolina-raleigh-07c0fbdcdbb4595e4ea0076892c9d294"},{"key":"e_1_3_2_1_106_1","first-page":"3","article-title":"Passive Voter Suppression: Campaign Mobilization and the Effective Disfranchisement of the Poor","volume":"114","author":"Ross Bertrall L.","year":"2019","unstructured":"Bertrall L. Ross and Douglas M. Spencer. 2019. Passive Voter Suppression: Campaign Mobilization and the Effective Disfranchisement of the Poor. Northwestern University Law Review 114, 3 (November 2019), 633\u2013704.","journal-title":"Northwestern University Law Review"},{"key":"e_1_3_2_1_107_1","unstructured":"Horst Rutter. 2024. pdfcpu\/pdfcpu. https:\/\/github.com\/pdfcpu\/pdfcpu https:\/\/github.com\/pdfcpu\/pdfcpu."},{"key":"e_1_3_2_1_108_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-43725-1_20"},{"key":"e_1_3_2_1_109_1","doi-asserted-by":"publisher","unstructured":"Peter B. R\u00f8nne Tamara Finogina and Javier Herranz. 2025. Expanding the Toolbox: Coercion and Vote-Selling at Vote-Casting Revisited. In Electronic Voting David Duenas-Cid Peter Roenne Melanie Volkamer Jurlind Budurushi Michelle Blom Adri\u00e0 Rodr\u00edguez-P\u00e9rez Iuliia Spycher-Krivonosova Jordi Castell\u00e0 Roca and Jordi Barrat Esteve (Eds.). Springer Nature Switzerland Cham 141\u2013157. 10.1007\/978-3-031-72244-8_9","DOI":"10.1007\/978-3-031-72244-8_9"},{"key":"e_1_3_2_1_110_1","volume-title":"Proceedings 2021 Network and Distributed System Security Symposium. Internet Society, Virtual. 10","author":"Sav Sinem","year":"2021","unstructured":"Sinem Sav, Apostolos Pyrgelis, Juan Ram\u00f3n Troncoso-Pastoriza, David Froelicher, Jean-Philippe Bossuat, Joao Sa Sousa, and JeanPierre Hubaux. 2021. POSEIDON: Privacy-Preserving Federated Neural Network Learning. In Proceedings 2021 Network and Distributed System Security Symposium. Internet Society, Virtual. 10.14722\/ndss.2021.24119"},{"key":"e_1_3_2_1_111_1","volume-title":"2015 Second International Conference on eDemocracy & eGovernment (ICEDEG). IEEE, Quito, Ecuador, 126\u2013132","author":"Serdult Uwe","year":"2015","unstructured":"Uwe Serdult, Micha Germann, Fernando Mendez, Alicia Portenier, and Christoph Wellig. 2015. Fifteen years of internet voting in Switzerland [History, Governance and Use]. In 2015 Second International Conference on eDemocracy & eGovernment (ICEDEG). IEEE, Quito, Ecuador, 126\u2013132. 10.1109\/ICEDEG.2015.7114482"},{"key":"e_1_3_2_1_112_1","volume-title":"Unpacking How Decentralized Autonomous Organizations (DAOs) Work in Practice. In 2024 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). 416\u2013424","author":"Sharma Tanusree","year":"2024","unstructured":"Tanusree Sharma, Yujin Potter, Kornrapat Pongmala, Henry Wang, Andrew Miller, Dawn Song, and Yang Wang. 2024. Unpacking How Decentralized Autonomous Organizations (DAOs) Work in Practice. In 2024 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). 416\u2013424. 10.1109\/ICBC59979.2024.10634404"},{"key":"e_1_3_2_1_113_1","doi-asserted-by":"crossref","unstructured":"Divya Siddarth Sergey Ivliev Santiago Siri and Paula Berman. 2020. Who Watches the Watchmen? A Review of Subjective Approaches for Sybil-resistance in Proof of Personhood Protocols. https:\/\/arxiv.org\/abs\/2008.05300","DOI":"10.3389\/fbloc.2020.590171"},{"key":"e_1_3_2_1_114_1","doi-asserted-by":"publisher","DOI":"10.3389\/fbloc.2020.590171"},{"key":"e_1_3_2_1_115_1","volume-title":"US election: Bomb threats and printer glitches disrupt voting in battleground states. Sky News (Nov","author":"News Sky","year":"2024","unstructured":"Sky News. 2024. US election: Bomb threats and printer glitches disrupt voting in battleground states. Sky News (Nov. 2024). https:\/\/news.sky.com\/story\/us-election-bomb-threats-and-printer-glitches-disrupt-voting-in-key-swing-states-13249161"},{"key":"e_1_3_2_1_116_1","unstructured":"Smartmatic. 2024. Estonia: The World's Longest Standing Most Advanced Internet Voting Solution. https:\/\/www.smartmatic.com\/featured-case-studies\/estonia-the-worlds-longest-standing-most-advanced-internet-voting-solution\/. Accessed: 2024-12-07."},{"key":"e_1_3_2_1_117_1","unstructured":"Warren D Smith. 2005. New cryptographic election protocol with best-known theoretical properties. Technical Report. Center for Range Voting. 14 pages. https:\/\/rangevoting.org\/WarrenSmithPages\/homepage\/jcj.pdf"},{"key":"e_1_3_2_1_118_1","volume-title":"Security Analysis of the Estonian Internet Voting System. In ACM SIGSAC Conference on Computer and Communications Security. 10","author":"Springall Drew","unstructured":"Drew Springall, Travis Finkenauer, Zakir Durumeric, Jason Kitcat, Harri Hursti, Margaret MacAlpine, and J. Alex Halderman. 2014. Security Analysis of the Estonian Internet Voting System. In ACM SIGSAC Conference on Computer and Communications Security. 10.1145\/2660267.2660315"},{"key":"e_1_3_2_1_119_1","volume-title":"Proceedings of the 15th International Conference on Financial Cryptography and Data Security. 182\u2013189","author":"Spycher Oliver","year":"2011","unstructured":"Oliver Spycher, Reto Koenig, Rolf Haenni, and Michael Schl\u00e4pfer. 2011. A New Approach towards Coercion-Resistant Remote E-Voting in Linear Time. In Proceedings of the 15th International Conference on Financial Cryptography and Data Security. 182\u2013189. 10.1007\/978-3-642-27576-0_15"},{"issue":"0","key":"e_1_3_2_1_120_1","first-page":"0","article-title":"Protocol of the Swiss Post Voting System: Computational Proof of Complete Verifiability and Privacy","volume":"1","author":"Post Swiss","year":"2021","unstructured":"Swiss Post. 2021. Protocol of the Swiss Post Voting System: Computational Proof of Complete Verifiability and Privacy. Technical Report 1.0.0. https:\/\/gitlab.com\/swisspost-evoting\/e-voting\/e-voting-documentation","journal-title":"Technical Report"},{"key":"e_1_3_2_1_121_1","volume-title":"Four people plead guilty in North Carolina ballot probe of 2016 and 2018 elections. NBC News (Sept","author":"Press The Associated","year":"2022","unstructured":"The Associated Press. 2022. Four people plead guilty in North Carolina ballot probe of 2016 and 2018 elections. NBC News (Sept. 2022). https:\/\/www.nbcnews.com\/politics\/elections\/four-people-plead-guilty-north-carolina-ballot-probe-2016-2018-electio-rcna49534"},{"key":"e_1_3_2_1_122_1","volume-title":"a Pennsylvania judge says. NPR (Nov","author":"Press The Associated","year":"2024","unstructured":"The Associated Press. 2024. Elon Musk's $1 million-a-day voter sweepstakes can proceed, a Pennsylvania judge says. NPR (Nov. 2024). https:\/\/www.npr.org\/2024\/11\/05\/g-s1-32345\/elon-musk-voter-sweepstakes-proceed"},{"key":"e_1_3_2_1_123_1","volume-title":"Proceedings of the 6th USENIX symposium on Networked systems design and implementation (NSDI'09)","author":"Tran Nguyen","year":"2009","unstructured":"Nguyen Tran, Bonan Min, Jinyang Li, and Lakshminarayanan Subramanian. 2009. Sybil-resilient online content voting. In Proceedings of the 6th USENIX symposium on Networked systems design and implementation (NSDI'09). USENIX Association, USA, 15\u201328."},{"key":"e_1_3_2_1_124_1","volume-title":"Voting Time Estimator. https:\/\/go41.com\/vote\/estimator.htm Accessed","author":"Election Excellence U.S.","year":"2025","unstructured":"U.S. Alliance for Election Excellence. 2025. Voting Time Estimator. https:\/\/go41.com\/vote\/estimator.htm Accessed August 2025."},{"key":"e_1_3_2_1_125_1","volume-title":"District of New Jersey","author":"Attorney's Office U.S.","year":"2021","unstructured":"U.S. Attorney's Office, District of New Jersey. 2021. District of New Jersey | Postal Employee Admits Dumping Mail, Including Election Ballots Sent to West Orange Residents | United States Department of Justice. https:\/\/www.justice.gov\/usao-nj\/pr\/postal-employee-admits-dumping-mail-including-election-ballots-sent-west-orange-residents"},{"key":"e_1_3_2_1_126_1","unstructured":"USA.gov. 2024. Absentee and Early Voting. https:\/\/www.usa.gov\/absentee-voting. Accessed: 2024-12-07."},{"key":"e_1_3_2_1_127_1","volume-title":"On Coercion-Resistant Electronic Elections with Linear Work. In The Second Conference on Availability, Reliability and Security. 10","author":"Weber Stefan G.","year":"2007","unstructured":"Stefan G. Weber, Roberto Araujo, and Johannes Buchmann. 2007. On Coercion-Resistant Electronic Elections with Linear Work. In The Second Conference on Availability, Reliability and Security. 10.1109\/ARES.2007.108"},{"key":"e_1_3_2_1_128_1","unstructured":"Wendy Weiser. 2020. How to Protect the 2020 Vote from the Coronavirus | Brennan Center for Justice. https:\/\/www.brennancenter.org\/our-work\/policy-solutions\/how-protect-2020-vote-coronavirus"},{"key":"e_1_3_2_1_129_1","unstructured":"Danielle Wiener-Bronner. 2014. Yes There Are Elections in North Korea and Here's How They Work. https:\/\/www.theatlantic.com\/international\/archive\/2014\/03\/north-korea-elections-guide\/358875\/"},{"key":"e_1_3_2_1_130_1","volume-title":"Voter Supression","author":"Wilder William","year":"2020","unstructured":"William Wilder. 2021. Voter Supression in 2020. Brennan Center for Justice at New York University School of Law. https:\/\/www.brennancenter.org\/sites\/default\/files\/2021-08\/2021_08_Racial_Voter_Suppression_2020.pdf"},{"key":"e_1_3_2_1_131_1","doi-asserted-by":"crossref","unstructured":"Dylan Yaga Peter Mell Nik Roby and Karen Scarfone. 2018. Blockchain Technology Overview. Technical Report NIST Internal or Interagency Report (NISTIR) 8202. National Institute of Standards and Technology. https:\/\/csrc.nist.gov\/pubs\/ir\/8202\/final","DOI":"10.6028\/NIST.IR.8202"},{"key":"e_1_3_2_1_132_1","volume-title":"29th IEEE Symposium on Security and Privacy (S&P)","author":"Yu Haifeng","year":"2008","unstructured":"Haifeng Yu, Phillip B. Gibbons, Michael Kaminsky, and Feng Xiao. 2008. SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks. In 29th IEEE Symposium on Security and Privacy (S&P) (Oakland, CA). https:\/\/www.iscs.nus.edu.sg\/~yuhf\/sybillimit-tr.pdf"},{"key":"e_1_3_2_1_133_1","unstructured":"Haifeng Yu Michael Kaminsky Phillip B. Gibbons and Abraham Flaxman. 2006. SybilGuard: Defending Against Sybil Attacks via Social Networks. In ACM SIGCOMM (Pisa Italy)."},{"key":"e_1_3_2_1_134_1","volume-title":"30th IEEE Symposium on Security and Privacy (S&P)","author":"Yu Haifeng","year":"2009","unstructured":"Haifeng Yu, Chenwei Shi, Michael Kaminsky, Phillip B. Gibbons, and Feng Xiao. 2009. DSybil: Optimal Sybil-resistance for recommendation systems. In 30th IEEE Symposium on Security and Privacy (S&P) (Oakland, CA)."},{"key":"e_1_3_2_1_135_1","unstructured":"Margarita Zavadskaya. 2024. Why Does the Kremlin Bother Holding Sham Elections? https:\/\/www.journalofdemocracy.org\/elections\/why-does-the-kremlin-bother-holding-sham-elections\/"}],"event":{"name":"SOSP '25: ACM SIGOPS 31st Symposium on Operating Systems Principles","location":"Lotte Hotel World Seoul Republic of Korea","acronym":"SOSP '25","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems","USENIX"]},"container-title":["Proceedings of the ACM SIGOPS 31st Symposium on Operating Systems Principles"],"original-title":[],"deposited":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T12:43:46Z","timestamp":1759322626000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3731569.3764837"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,12]]},"references-count":135,"alternative-id":["10.1145\/3731569.3764837","10.1145\/3731569"],"URL":"https:\/\/doi.org\/10.1145\/3731569.3764837","relation":{},"subject":[],"published":{"date-parts":[[2025,10,12]]},"assertion":[{"value":"2025-10-12","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}