A LAN Voting Protocol View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

1995

AUTHORS

Vesna Hassler , Reinhard Posch

ABSTRACT

This paper presents a set of network protocols which provide for a voting service. The service is currently being implemented in the client-server architecture. The cryptographic technique combined with the basic voting protocol from Salomaa [19] is the method based on the multiple key ciphers introduced by Boyd [2]. Special protocols for registration of voters and issuing voting slips are developed. This ensures that the anonymity of a voting strategy is cryptographically secure and, on the other hand, that only legitimate voters may obtain a valid voting slip. More... »

PAGES

176-189

Book

TITLE

Information Security — the Next Decade

ISBN

978-1-5041-2910-7
978-0-387-34873-5

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-0-387-34873-5_15

DOI

http://dx.doi.org/10.1007/978-0-387-34873-5_15

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1026549195


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Institut f\u00fcr Angewandte Informationsverabeitung und Kommunikationstechnologie, TU-Graz, Klosterwiesgasse 32/1, A-8010, Graz, Austria", 
          "id": "http://www.grid.ac/institutes/grid.410413.3", 
          "name": [
            "Institut f\u00fcr Angewandte Informationsverabeitung und Kommunikationstechnologie, TU-Graz, Klosterwiesgasse 32/1, A-8010, Graz, Austria"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Hassler", 
        "givenName": "Vesna", 
        "id": "sg:person.016626361111.21", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016626361111.21"
        ], 
        "type": "Person"
      }, 
      {
        "familyName": "Posch", 
        "givenName": "Reinhard", 
        "id": "sg:person.011236005071.18", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011236005071.18"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "1995", 
    "datePublishedReg": "1995-01-01", 
    "description": "This paper presents a set of network protocols which provide for a voting service. The service is currently being implemented in the client-server architecture. The cryptographic technique combined with the basic voting protocol from Salomaa [19] is the method based on the multiple key ciphers introduced by Boyd [2]. Special protocols for registration of voters and issuing voting slips are developed. This ensures that the anonymity of a voting strategy is cryptographically secure and, on the other hand, that only legitimate voters may obtain a valid voting slip.", 
    "editor": [
      {
        "familyName": "Eloff", 
        "givenName": "Jan H. P.", 
        "type": "Person"
      }, 
      {
        "familyName": "von Solms", 
        "givenName": "Sebastiaan H.", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-0-387-34873-5_15", 
    "inLanguage": "en", 
    "isAccessibleForFree": true, 
    "isPartOf": {
      "isbn": [
        "978-1-5041-2910-7", 
        "978-0-387-34873-5"
      ], 
      "name": "Information Security \u2014 the Next Decade", 
      "type": "Book"
    }, 
    "keywords": [
      "voting protocol", 
      "client-server architecture", 
      "cryptographic techniques", 
      "network protocols", 
      "voting service", 
      "key ciphers", 
      "voting strategy", 
      "legitimate voters", 
      "registration of voters", 
      "special protocol", 
      "protocol", 
      "services", 
      "anonymity", 
      "cipher", 
      "architecture", 
      "registration", 
      "set", 
      "technique", 
      "method", 
      "strategies", 
      "hand", 
      "voters", 
      "Boyd", 
      "Salomaa", 
      "slip", 
      "paper", 
      "basic voting protocol", 
      "multiple key ciphers", 
      "voting slips", 
      "only legitimate voters", 
      "valid voting slip", 
      "LAN Voting Protocol"
    ], 
    "name": "A LAN Voting Protocol", 
    "pagination": "176-189", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1026549195"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-0-387-34873-5_15"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-0-387-34873-5_15", 
      "https://app.dimensions.ai/details/publication/pub.1026549195"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-01-01T19:20", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20220101/entities/gbq_results/chapter/chapter_350.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-0-387-34873-5_15"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-0-387-34873-5_15'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-0-387-34873-5_15'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-0-387-34873-5_15'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-0-387-34873-5_15'


 

This table displays all metadata directly associated to this object as RDF triples.

103 TRIPLES      23 PREDICATES      58 URIs      51 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-0-387-34873-5_15 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author N8ab97a3d7659402aa0563f87036277d4
4 schema:datePublished 1995
5 schema:datePublishedReg 1995-01-01
6 schema:description This paper presents a set of network protocols which provide for a voting service. The service is currently being implemented in the client-server architecture. The cryptographic technique combined with the basic voting protocol from Salomaa [19] is the method based on the multiple key ciphers introduced by Boyd [2]. Special protocols for registration of voters and issuing voting slips are developed. This ensures that the anonymity of a voting strategy is cryptographically secure and, on the other hand, that only legitimate voters may obtain a valid voting slip.
7 schema:editor N20c5c058fd1e48738f7704992b5dca31
8 schema:genre chapter
9 schema:inLanguage en
10 schema:isAccessibleForFree true
11 schema:isPartOf N02948ab9e09e4472bd4fbb523e8f643a
12 schema:keywords Boyd
13 LAN Voting Protocol
14 Salomaa
15 anonymity
16 architecture
17 basic voting protocol
18 cipher
19 client-server architecture
20 cryptographic techniques
21 hand
22 key ciphers
23 legitimate voters
24 method
25 multiple key ciphers
26 network protocols
27 only legitimate voters
28 paper
29 protocol
30 registration
31 registration of voters
32 services
33 set
34 slip
35 special protocol
36 strategies
37 technique
38 valid voting slip
39 voters
40 voting protocol
41 voting service
42 voting slips
43 voting strategy
44 schema:name A LAN Voting Protocol
45 schema:pagination 176-189
46 schema:productId N792132f8e123490a921d3a3dc849f12b
47 Nfc453f3af1d3416d9cdf6c93d136d71b
48 schema:publisher N7ae360efd58f4373a98543774182c8d9
49 schema:sameAs https://app.dimensions.ai/details/publication/pub.1026549195
50 https://doi.org/10.1007/978-0-387-34873-5_15
51 schema:sdDatePublished 2022-01-01T19:20
52 schema:sdLicense https://scigraph.springernature.com/explorer/license/
53 schema:sdPublisher N9e4e149cab7b43658f4e8b6780a67ce3
54 schema:url https://doi.org/10.1007/978-0-387-34873-5_15
55 sgo:license sg:explorer/license/
56 sgo:sdDataset chapters
57 rdf:type schema:Chapter
58 N02948ab9e09e4472bd4fbb523e8f643a schema:isbn 978-0-387-34873-5
59 978-1-5041-2910-7
60 schema:name Information Security — the Next Decade
61 rdf:type schema:Book
62 N20c5c058fd1e48738f7704992b5dca31 rdf:first Ndb23d63c3f304bab9172049a71539667
63 rdf:rest Nc1afe8c3ef4a476caf9a3b07311955a1
64 N5a23f66a003742c5aa4dbb1d2b2b3000 schema:familyName von Solms
65 schema:givenName Sebastiaan H.
66 rdf:type schema:Person
67 N792132f8e123490a921d3a3dc849f12b schema:name dimensions_id
68 schema:value pub.1026549195
69 rdf:type schema:PropertyValue
70 N7ae360efd58f4373a98543774182c8d9 schema:name Springer Nature
71 rdf:type schema:Organisation
72 N8ab97a3d7659402aa0563f87036277d4 rdf:first sg:person.016626361111.21
73 rdf:rest Nb29e78d74b304431a531f195f77b3e3f
74 N9e4e149cab7b43658f4e8b6780a67ce3 schema:name Springer Nature - SN SciGraph project
75 rdf:type schema:Organization
76 Nb29e78d74b304431a531f195f77b3e3f rdf:first sg:person.011236005071.18
77 rdf:rest rdf:nil
78 Nc1afe8c3ef4a476caf9a3b07311955a1 rdf:first N5a23f66a003742c5aa4dbb1d2b2b3000
79 rdf:rest rdf:nil
80 Ndb23d63c3f304bab9172049a71539667 schema:familyName Eloff
81 schema:givenName Jan H. P.
82 rdf:type schema:Person
83 Nfc453f3af1d3416d9cdf6c93d136d71b schema:name doi
84 schema:value 10.1007/978-0-387-34873-5_15
85 rdf:type schema:PropertyValue
86 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
87 schema:name Information and Computing Sciences
88 rdf:type schema:DefinedTerm
89 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
90 schema:name Data Format
91 rdf:type schema:DefinedTerm
92 sg:person.011236005071.18 schema:familyName Posch
93 schema:givenName Reinhard
94 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011236005071.18
95 rdf:type schema:Person
96 sg:person.016626361111.21 schema:affiliation grid-institutes:grid.410413.3
97 schema:familyName Hassler
98 schema:givenName Vesna
99 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016626361111.21
100 rdf:type schema:Person
101 grid-institutes:grid.410413.3 schema:alternateName Institut für Angewandte Informationsverabeitung und Kommunikationstechnologie, TU-Graz, Klosterwiesgasse 32/1, A-8010, Graz, Austria
102 schema:name Institut für Angewandte Informationsverabeitung und Kommunikationstechnologie, TU-Graz, Klosterwiesgasse 32/1, A-8010, Graz, Austria
103 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...