{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T10:17:23Z","timestamp":1725531443555},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/trustcom.2013.278","type":"proceedings-article","created":{"date-parts":[[2013,12,17]],"date-time":"2013-12-17T19:46:29Z","timestamp":1387309589000},"page":"1696-1703","source":"Crossref","is-referenced-by-count":1,"title":["Toward Coercion-Resistant End-to-End Verifiable Electronic Voting Systems"],"prefix":"10.1109","author":[{"given":"Wagner M.","family":"Santos","sequence":"first","affiliation":[]},{"given":"Ruy J.G.B.","family":"de Queiroz","sequence":"additional","affiliation":[]},{"given":"Carlos E.R.","family":"Saraiva","sequence":"additional","affiliation":[]},{"given":"Gleudson P.V.","family":"Junior","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48658-5_19"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/10590.10595"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44987-6_6"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/383962.384044"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1985.2"},{"key":"13","first-page":"207","article-title":"Practical threshold signature","author":"shoup","year":"2000","journal-title":"Proc Adv EUROCRYPT'00"},{"key":"14","first-page":"339","article-title":"Making mix nets robust for electronic voting by randomized partial checking","author":"jakobsson","year":"2002","journal-title":"Proceedings of the 11th USENIX Security Symposium"},{"key":"11","first-page":"335","article-title":"Helios: Web-based open-audit voting","author":"adida","year":"2008","journal-title":"Proceedings of the 17th Usenix Secrurity Symposium (USENIX Secrurity 2008)"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/501997.502000"},{"journal-title":"DIMACS","article-title":"Millimix: Mixing in small batches","year":"1999","author":"jakobsson","key":"20"},{"journal-title":"Advances in CryptologyCrypto '86","article-title":"How to prove yourself: Practical solutions to identification and signature problems","year":"1986","author":"fiat","key":"22"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1145\/62212.62222"},{"journal-title":"Em Preproceedings of the 2006 IAVoSS Workshop on Trustworthy Elections (WOTE)","article-title":"An introduction to punchscan","year":"2006","author":"popoveniuc","key":"24"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1145\/1102199.1102213"},{"key":"26","first-page":"393","article-title":"Receipt-free mix-type voting scheme-A practical solution to the implementation of a voting booth","author":"sako","year":"1995","journal-title":"Eurocrypt'95"},{"journal-title":"Securing Digital Democracy Course","year":"2012","author":"halderman","key":"27"},{"key":"3","first-page":"118","article-title":"A practical voter-verifiable election scheme","author":"chaum","year":"2005","journal-title":"Proceedings of the 10th European Symposium on Research in Cumputer Science (ESORICS'05)"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2004.1264852"},{"journal-title":"EVT\/WOTE'11 Proceedings of the 2011 Conference on Electronic Voting Technolgy\/workshop on Trustworthy Elections","article-title":"Scantegrity iii: Automatic trustworthy receipts, highlighting over\/under votes, and full voter verifiability","year":"2011","author":"chaum","key":"10"},{"journal-title":"Sistema Seguro de Votac?a?o Eletro?nica Multi-Ce?dulas Curitiba PR","year":"2008","author":"costa","key":"1"},{"journal-title":"Scantegrity ii End-to-end verifiability for optical scan election systems using invisible ink confirmation codes","year":"2008","author":"chaum","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12980-3_22"},{"journal-title":"The Punchscan Voting System","year":"2007","author":"essex","key":"5"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1179601.1179607"},{"key":"9","first-page":"213","article-title":"Pre?t a? Voter with re-encryption mixes","author":"ryan","year":"2006","journal-title":"Proc 11th Eur Symp Res Comput Sci (ESORICS'06)"},{"journal-title":"USENIX\/ACCURATE Electronic Voting Technology Workshop (EVT)","article-title":"Three voting protocols: Theeballot, vav, and twin","year":"2007","author":"rivest","key":"8"}],"event":{"name":"2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","start":{"date-parts":[[2013,7,16]]},"location":"Melbourne, Australia","end":{"date-parts":[[2013,7,18]]}},"container-title":["2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6679587\/6680793\/06681037.pdf?arnumber=6681037","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T23:59:06Z","timestamp":1490227146000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6681037\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/trustcom.2013.278","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}