{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:35:47Z","timestamp":1750307747145,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,3,16]],"date-time":"2008-03-16T00:00:00Z","timestamp":1205625600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001871","name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","doi-asserted-by":"publisher","award":["POSC\/EIQ\/57038\/2004"],"award-info":[{"award-number":["POSC\/EIQ\/57038\/2004"]}],"id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,3,16]]},"DOI":"10.1145\/1363686.1364202","type":"proceedings-article","created":{"date-parts":[[2008,4,29]],"date-time":"2008-04-29T13:04:11Z","timestamp":1209474251000},"page":"2159-2166","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Verifiable anonymous vote submission"],"prefix":"10.1145","author":[{"given":"Andr\u00e9","family":"Z\u00faquete","sequence":"first","affiliation":[{"name":"IEETA\/ Univ. of Aveiro, Campus Universit\u00e1rio de Santiago, Aveiro, Portugal"}]},{"given":"Filipe","family":"Almeida","sequence":"additional","affiliation":[{"name":"IEETA\/ Univ. of Aveiro, Campus Universit\u00e1rio de Santiago, Aveiro, Portugal"}]}],"member":"320","published-online":{"date-parts":[[2008,3,16]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/195058.195407"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/11836810_3"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2004.1264852"},{"key":"e_1_3_2_1_5_1","first-page":"244","volume-title":"Advances in Cryptology - AUSCRYPT '92 (LNCS 718)","author":"Fujioka A.","year":"1992","unstructured":"A. Fujioka , T. Okamoto , and K. Ohta . A Practical Secret Voting Scheme for Large Scale Elections . In J. Seberry and Y. Zheng, editors, Advances in Cryptology - AUSCRYPT '92 (LNCS 718) , pages 244 -- 251 , Gold Coast, Queensland, Australia , 1992 . Springer-Verlag . A. Fujioka, T. Okamoto, and K. Ohta. A Practical Secret Voting Scheme for Large Scale Elections. In J. Seberry and Y. Zheng, editors, Advances in Cryptology - AUSCRYPT '92 (LNCS 718), pages 244--251, Gold Coast, Queensland, Australia, 1992. Springer-Verlag."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/647253.720294"},{"issue":"2","key":"e_1_3_2_1_7_1","first-page":"47","volume":"1","author":"Joaquim R.","year":"2003","unstructured":"R. Joaquim , A. Z\u00faquete , and P. Ferreira . REVS - A Robust Electronic Voting System. IADIS Int. Journal on WWW\/ Internet , 1 ( 2 ): 47 -- 63 , Dec. 2003 . R. Joaquim, A. Z\u00faquete, and P. Ferreira. REVS - A Robust Electronic Voting System. IADIS Int. Journal on WWW\/ Internet, 1(2):47--63, Dec. 2003.","journal-title":"Journal on WWW\/ Internet"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102199.1102213"},{"key":"e_1_3_2_1_9_1","first-page":"44","volume-title":"IADIS Int. Conf. Applied Computing 2004","author":"Lebre R.","year":"2004","unstructured":"R. Lebre , R. Joaquim , A. Z\u00faquete , and P. Ferreira . Internet Voting: Improving Resistance to Malicious Servers . In IADIS Int. Conf. Applied Computing 2004 , pages 44 -- 52 , Lisboa, Portugal , Mar. 2004 . R. Lebre, R. Joaquim, A. Z\u00faquete, and P. Ferreira. Internet Voting: Improving Resistance to Malicious Servers. In IADIS Int. Conf. Applied Computing 2004, pages 44--52, Lisboa, Portugal, Mar. 2004."},{"key":"e_1_3_2_1_10_1","first-page":"245","volume-title":"Int. Conf. on Information Security and Cryptology (ICISC '03)","author":"Lee B.","year":"2004","unstructured":"B. Lee , C. Boyd , E. Dawson , K. Kim , J. Yang , and S. Yoo . Providing Receipt-freeness in Mixnet-based Voting Protocols. In J. I. Lim and D. H. Lee, editors , Int. Conf. on Information Security and Cryptology (ICISC '03) (LNCS 2971), pages 245 -- 258 , Seoul, Korea , Nov. 2004 . Springer. B. Lee, C. Boyd, E. Dawson, K. Kim, J. Yang, and S. Yoo. Providing Receipt-freeness in Mixnet-based Voting Protocols. In J. I. Lim and D. H. Lee, editors, Int. Conf. on Information Security and Cryptology (ICISC '03) (LNCS 2971), pages 245--258, Seoul, Korea, Nov. 2004. Springer."},{"key":"e_1_3_2_1_11_1","first-page":"389","volume-title":"Int. Conf. on Information Security and Cryptology (ICISC '02)","author":"Lee B.","year":"2002","unstructured":"B. Lee and K. Kim . Receipt-free electronic voting scheme with a tamper resistant randomizer . In Int. Conf. on Information Security and Cryptology (ICISC '02) (LNCS 2587), pages 389 -- 406 . Springer-Verlag , 2002 . B. Lee and K. Kim. Receipt-free electronic voting scheme with a tamper resistant randomizer. In Int. Conf. on Information Security and Cryptology (ICISC '02) (LNCS 2587), pages 389--406. Springer-Verlag, 2002."},{"key":"e_1_3_2_1_12_1","first-page":"440","volume-title":"Fault Tolerant Anonymous Channel. In 1st Int. Conf. in Information and Communications Security (ICICS '97)","author":"Ogata W.","year":"1997","unstructured":"W. Ogata , K. Kurosawa , K. Sako , and K. Takatani . Fault Tolerant Anonymous Channel. In 1st Int. Conf. in Information and Communications Security (ICICS '97) (LNCS 1334), pages 440 -- 444 , Beijing, China , 1997 . Springer-Verlag. W. Ogata, K. Kurosawa, K. Sako, and K. Takatani. Fault Tolerant Anonymous Channel. In 1st Int. Conf. in Information and Communications Security (ICICS '97) (LNCS 1334), pages 440--444, Beijing, China, 1997. Springer-Verlag."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(87)90087-3"},{"key":"e_1_3_2_1_14_1","first-page":"44","volume-title":"Anonymous Connections and Onion Routing. In 18th IEEE Symp. on Security and Privacy","author":"Syverson P. F.","year":"1997","unstructured":"P. F. Syverson , D. M. Goldschlag , and M. G. Reed . Anonymous Connections and Onion Routing. In 18th IEEE Symp. on Security and Privacy , pages 44 -- 54 , Oakland, CA, USA , May 1997 . P. F. Syverson, D. M. Goldschlag, and M. G. Reed. Anonymous Connections and Onion Routing. In 18th IEEE Symp. on Security and Privacy, pages 44--54, Oakland, CA, USA, May 1997."},{"key":"e_1_3_2_1_15_1","volume-title":"Works. on Recent Advances on Intrusion-Tolerant Systems (WRAITS 2007","author":"Z\u00faquete A.","year":"2007","unstructured":"A. Z\u00faquete , C. Costa , and M. Rom\u00e3o . An Intrusion-tolerant E-voting Client System . In Works. on Recent Advances on Intrusion-Tolerant Systems (WRAITS 2007 ), Lisboa, Portugal , Mar. 2007 . A. Z\u00faquete, C. Costa, and M. Rom\u00e3o. An Intrusion-tolerant E-voting Client System. In Works. on Recent Advances on Intrusion-Tolerant Systems (WRAITS 2007), Lisboa, Portugal, Mar. 2007."}],"event":{"name":"SAC '08: The 2008 ACM Symposium on Applied Computing","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Fortaleza, Ceara Brazil","acronym":"SAC '08"},"container-title":["Proceedings of the 2008 ACM symposium on Applied computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1363686.1364202","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1363686.1364202","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:39:02Z","timestamp":1750253942000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1363686.1364202"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,3,16]]},"references-count":15,"alternative-id":["10.1145\/1363686.1364202","10.1145\/1363686"],"URL":"https:\/\/doi.org\/10.1145\/1363686.1364202","relation":{},"subject":[],"published":{"date-parts":[[2008,3,16]]},"assertion":[{"value":"2008-03-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}