dc.contributor.author | Chaum, David | |
dc.contributor.author | Carback, Richard T. | |
dc.contributor.author | Clark, J. | |
dc.contributor.author | Essex, Aleksander | |
dc.contributor.author | Popoveniuc, Stefan | |
dc.contributor.author | Rivest, Ronald L. | |
dc.contributor.author | Ryan, Peter Y. A. | |
dc.contributor.author | Shen, Emily (Emily Huei-Yi) | |
dc.contributor.author | Sherman, Alan T. | |
dc.contributor.author | Vora, Poorvi L. | |
dc.date.accessioned | 2012-09-14T16:43:19Z | |
dc.date.available | 2012-09-14T16:43:19Z | |
dc.date.issued | 2010-02 | |
dc.date.submitted | 2009-11 | |
dc.identifier.issn | 1556-6013 | |
dc.identifier.uri | http://hdl.handle.net/1721.1/72965 | |
dc.description.abstract | In the above titled paper (ibid., vol. 4, no. 4, pp. 611-627, Dec. 09), due to a production error, the affiliations of two of the authors were listed incorrectly. The correct affiliations are presented here. Also, the name of the last author in the affiliations footnote was printed incorrectly. The correct name is P. Y. A. Ryan. | en_US |
dc.language.iso | en_US | |
dc.publisher | Institute of Electrical and Electronics Engineers (IEEE) | en_US |
dc.relation.isversionof | http://dx.doi.org/10.1109/TIFS.2010.2040672 | en_US |
dc.rights | Article is made available in accordance with the publisher's policy and may be subject to US copyright law. Please refer to the publisher's site for terms of use. | en_US |
dc.source | IEEE | en_US |
dc.title | Corrections to “Scantegrity II: End-to-End Verifiability by Voters of Optical Scan Elections Through Confirmation Codes” [Dec 09 611-627] | en_US |
dc.type | Article | en_US |
dc.identifier.citation | Chaum, David et al. “Corrections to "Scantegrity II: End-to-End Verifiability by Voters of Optical Scan Elections Through Confirmation Codes" [Dec 09 611-627.” IEEE Transactions on Information Forensics and Security 5.1 (2010): 194–194. © Copyright 2010 IEEE | en_US |
dc.contributor.department | Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science | en_US |
dc.contributor.approver | Rivest, Ronald L. | |
dc.contributor.mitauthor | Rivest, Ronald L. | |
dc.contributor.mitauthor | Shen, Emily Huei-Yi | |
dc.relation.journal | IEEE Transactions on Information Forensics and Security | en_US |
dc.eprint.version | Final published version | en_US |
dc.type.uri | http://purl.org/eprint/type/JournalArticle | en_US |
eprint.status | http://purl.org/eprint/status/PeerReviewed | en_US |
dspace.orderedauthors | Chaum, David; Carback, Richard T.; Clark, Jeremy; Essex, Aleksander; Popoveniuc, Stefan; Rivest, Ronald L.; Ryan, Peter Y. A.; Shen, Emily; Sherman, Alan T.; Vora, Poorvi L. | en |
dc.identifier.orcid | https://orcid.org/0000-0002-7105-3690 | |
dspace.mitauthor.error | true | |
mit.license | PUBLISHER_POLICY | en_US |
mit.metadata.status | Complete | |