{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T06:18:33Z","timestamp":1729664313059,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,9]]},"DOI":"10.1109\/sefm.2007.21","type":"proceedings-article","created":{"date-parts":[[2007,10,15]],"date-time":"2007-10-15T11:06:17Z","timestamp":1192446377000},"page":"329-338","source":"Crossref","is-referenced-by-count":8,"title":["Formal verification of tamper-evident storage for e-voting"],"prefix":"10.1109","author":[{"given":"Dominique","family":"Cansell","sequence":"first","affiliation":[]},{"given":"J. Paul","family":"Gibson","sequence":"additional","affiliation":[]},{"given":"Dominique","family":"Mery","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2005.11.003"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ASWEC.2000.844574"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1005817.1005846"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301313"},{"key":"ref14","article-title":"E-Voting: A Safety Critical System","author":"mcgaley","year":"2003","journal-title":"Technical Report NUIM-CS-TR-2003&#x2013;02"},{"key":"ref15","first-page":"153","article-title":"Transparency and e-Voting: Democratic vs. Commercial Interests","author":"mcgaley","year":"2004","journal-title":"Electronic Voting in Europe - Technology Law Politics and Society"},{"key":"ref16","article-title":"Design for verification - using design patterns to build reliable systems","author":"mehlitz","year":"2003","journal-title":"Proc 5th ICSE Workshop Component-Based Software Eng"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/570907.570917"},{"key":"ref18","first-page":"365","article-title":"In SP '06: Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P'06)","author":"molnar","year":"2006","journal-title":"Tamperevident history-independent subliminal-free data structures on PROM storage -or- how to store ballots on a voting machine"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/92755.92787"},{"key":"ref4","article-title":"Formal methods technology-transfer: a view from NASA","author":"caldwell","year":"1996","journal-title":"Proceedings of the ERCIM Workshop on Formal Methods for Industrial Critical Systems"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2005.170"},{"journal-title":"ClearSy Aix-en-Provence (France) B4FREE 2004","year":"0","key":"ref6"},{"key":"ref5","article-title":"Refinement: a constructive approach to formal software design for a secure e-voting interface","author":"cansell","year":"2006","journal-title":"Proceedings International Workshop on Formal Methods for Interactive Systems (FMIS)"},{"key":"ref8","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4615-0239-5","volume":"7","author":"gritzalis","year":"2003","journal-title":"Secure Electronic Voting"},{"journal-title":"Fundamentals of Software Engineering","year":"1991","author":"ghezzi","key":"ref7"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/10930755_1","article-title":"Click&#x2018;n'prove: Interactive proofs within set theory","volume":"2758","author":"abrial","year":"2003","journal-title":"16th Intl Conf Theorem Proving in Higher Order Logics (TPHOLs &#x2018;2003)"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44880-2_12"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1177\/0894439305275850"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/602421.602455"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"3","DOI":"10.3233\/IP-2003-0023","article-title":"E-voting in europe: Divergent democratic practice","volume":"8","author":"svensson","year":"2003","journal-title":"Information Polity"},{"journal-title":"Data and Computer Communications","year":"1985","author":"stallings","key":"ref21"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1023\/A:1005082925477"}],"event":{"name":"Fifth IEEE International Conference on Software Engineering and Formal Methods (SEFM 2007)","start":{"date-parts":[[2007,9,10]]},"location":"London, UK","end":{"date-parts":[[2007,9,14]]}},"container-title":["Fifth IEEE International Conference on Software Engineering and Formal Methods (SEFM 2007)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4343908\/4343909\/04343949.pdf?arnumber=4343949","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,3]],"date-time":"2019-05-03T15:53:52Z","timestamp":1556898832000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4343949\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,9]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/sefm.2007.21","relation":{},"subject":[],"published":{"date-parts":[[2007,9]]}}}