{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T12:10:44Z","timestamp":1725538244844},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642042799"},{"type":"electronic","value":"9783642042805"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04280-5_2","type":"book-chapter","created":{"date-parts":[[2009,9,18]],"date-time":"2009-09-18T05:25:31Z","timestamp":1253251531000},"page":"13-25","source":"Crossref","is-referenced-by-count":0,"title":["Electronic Voting by Means of Digital Terrestrial Television: The Infrastructure, Security Issues and a Real Test-Bed"],"prefix":"10.1007","author":[{"given":"Roberto","family":"Caldelli","sequence":"first","affiliation":[]},{"given":"Rudy","family":"Becarelli","sequence":"additional","affiliation":[]},{"given":"Francesco","family":"Filippini","sequence":"additional","affiliation":[]},{"given":"Francesco","family":"Picchioni","sequence":"additional","affiliation":[]},{"given":"Riccardo","family":"Giorgetti","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","unstructured":"Federal Election Commission, Voting system Standards, Performance Standards, Introduction, \n \n http:\/\/www.fec.gov\/agenda\/agendas2001\/mtgdoc01-62\/v1\/v1s1.htm"},{"key":"2_CR2","unstructured":"Federal Election Commission, Voting System Standard, \n \n http:\/\/www.fec.gov\/agenda\/agendas2001\/mtgdoc01-62\/overview.htm"},{"issue":"3","key":"2_CR3","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/MSP.2008.70","volume":"6","author":"D. Chaum","year":"2008","unstructured":"Chaum, D., Essex, A., Carback, R., Clark, J., Popoveniuc, S., Sherman, A., Vora, P.: Scantegrity: End-to-End Voter-Verifiable Optical- Scan Voting. IEEE Security & Privacy\u00a06(3), 40\u201346 (2008)","journal-title":"IEEE Security & Privacy"},{"issue":"1","key":"2_CR4","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/MSECP.2004.1264852","volume":"2","author":"D. Chaum","year":"2004","unstructured":"Chaum, D.: Secret-ballot receipts: True voter-verifiable elections. IEEE Security & Privacy\u00a02(1), 38\u201347 (2004)","journal-title":"IEEE Security & Privacy"},{"key":"2_CR5","unstructured":"Jefferson, D., Rubin, A.D., Simons, B., Wagner, D.: A Security Analysis of the Secure Electronic Registration and Voting Experiment (SERVE) (2004), \n \n http:\/\/www.servesecurityreport.org\/\n \n \n (21.01.2007)"},{"key":"2_CR6","unstructured":"Kohno, T., Stubblefield, A., Rubin, A.D., Wallach, D.S.: Analysis of an Electronic Voting System (2004), \n \n http:\/\/avirubin.com\/vote.pdf\n \n \n (21.01.2007)"},{"key":"2_CR7","unstructured":"Essex et al.: The Punchscan Voting System: Vo-Comp Competition Submission. In: Proc. 1st Univ. Voting Systems Competition, VoComp (2007), \n \n http:\/\/punchscan.org\/vocomp\/PunchscanVocompSubmission.pdf"},{"key":"2_CR8","first-page":"256","volume-title":"Proc. 14th ACM Conf. Computer and Comm. Security (CCS 2007)","author":"S. Garera","year":"2007","unstructured":"Garera, S., Rubin, A.D.: An Independent Audit Framework for Software Dependent Voting Systems. In: Proc. 14th ACM Conf. Computer and Comm. Security (CCS 2007), pp. 256\u2013265. ACM Press, New York (2007)"},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"Chaum, D., Carback, R., Clark, J., Essex, A., Popoveniuc, S., Rivest, R., Ryan, P., Shen, E., Sherman, A.: Scantegrity II: End-to-End Verifiability for Optical Scan Election Systems Using Invisible Ink Confirmation Codes. IEEE Security & Privacy (May\/June 2008)","DOI":"10.1109\/MSP.2008.70"},{"key":"2_CR10","unstructured":"M\u00e4gi, T.: Practical Security Analysis of E-voting Systems. Master Thesis Tallinn University of Technology, Faculty of Information Technology, Department of Informatics, Chair of Information Security, Tallinn (2007)"},{"key":"2_CR11","unstructured":"Fisher, E.A., Coleman, K.J.: The Direct Recording Electronic Voting Machine (DRE) Controversy: FAQs and Misperceptions, Congressional Research Service, The Library of Congress (2005)"},{"key":"2_CR12","unstructured":"Jefferson, D., Rubin, A.D., Simons, B., Wagner, D.: A Security Analysis of the Secure Electronic Registration and Voting Experiment (SERVE), \n \n http:\/\/www.servesecurityreport.org\/"},{"key":"2_CR13","unstructured":"DVB Project, \n \n http:\/\/www.dvb.org"},{"key":"2_CR14","unstructured":"MHP-DVB Project, \n \n http:\/\/www.mhp.org"},{"key":"2_CR15","unstructured":"The Advanced Television Systems Committee, Inc., \n \n http:\/\/www.atsc.org"},{"key":"2_CR16","unstructured":"Integrated Services Digital Broadcasting, Japanese standard, \n \n http:\/\/www.dibeg.org"},{"key":"2_CR17","unstructured":"Security and Trust Services API for J2ME (SATSA), \n \n http:\/\/java.sun.com\/products\/satsa"},{"key":"2_CR18","unstructured":"Irdeto Access B.V., \n \n http:\/\/www.irdeto.com"},{"key":"2_CR19","unstructured":"Nagravision SA, \n \n http:\/\/www.nagravision.com"},{"key":"2_CR20","unstructured":"TAA, Tuscan American Association, \n \n http:\/\/www.toscanausa.org\/Election_EN.asp"},{"key":"2_CR21","unstructured":"ISO\/IEC 7816, \n \n http:\/\/www.iso.org\/iso\/search.htm?qt=7816&searchSubmit=Search&sort=rel&type=simple&published=on"}],"container-title":["IFIP Advances in Information and Communication Technology","Software Services for e-Business and e-Society"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04280-5_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T13:38:44Z","timestamp":1558359524000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04280-5_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642042799","9783642042805"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04280-5_2","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2009]]}}}