Page 104 - Towards Trustworthy Elections New Directions in Electronic Voting by Ed Gerck (auth.), David Chaum, Markus Jakobsson, Ronald L. Rivest, Peter Y. A. Ryan, Josh Benaloh, Miroslaw Kutylowski, Ben Adida ( (z-lib.org (1)
P. 104

J.A. Goler and E.J. Selker
                          96
                           9. MIT CalTech: Voting Technology Project. Voting: What is, what could be (2001)
                          10. Chaum, D.: Blind signatures for untraceable payments. In: Advances in Cryptology:
                             Proceedings of Crypto, vol. 82, pp. 23–25 (1982)
                          11. Chaum, D.: Secret-ballot receipts: True voter-verifiable elections. IEEE Security &
                             Privacy Magazine 2(1), 38–47 (2004)
                          12. Chaum, D., Ryan, P.Y.A., Schneider, S.: A Practical Voter-Verifiable Election
                             Scheme. In: Proceedings of Computer Security-Esorics 2005: 10th European Sym-
                             posium on Research in Computer Security, Milan, Italy, September 12-14 (2005)
                          13. Feldman, A.J., Halderman, J.A., Felten, E.W.: Security Analysis of the Diebold
                             AccuVote-TS Voting Machine. Center for Information Technology Policy. Princeton
                             University, Princeton (September 13, 2006)
                          14. Fujioka, A., Okamoto, T., Ohta, K.: A practical secret voting scheme for large
                             scale elections. In: Zheng, Y., Seberry, J. (eds.) AUSCRYPT 1992. LNCS, vol. 718,
                             pp. 244–251. Springer, Heidelberg (1993)
                          15. Jefferson, D., Rubin, A.D., Simons, B., Wagner, D.A.: A Security Analysis of the
                             Secure Electronic Registration and Voting Experiment, SERVE (2004)
                          16. Jones, D.W.: Problems with Voting Systems and the Applicable Standards (2001)
                          17. Kovalev, I.V., Grosspietsch, K.E.: An Approach for the Reliability Optimization
                             of N-Version Software under Resource and Cost/Timing Constraints. Institut f¨ur
                             Autonome intelligente Systeme (1999)
                          18. Liburd, S.S.D.: An N-version electronic voting system (2004)
                          19. Mercuri, R.: A better ballot box? IEEE Spectrum 39(10), 46–50 (2002)
                          20. Mitrou, L., Gritzalis, D., Katsikas, S.: Revisiting legal and regulatory requirements
                             for secure e-voting. In: el Hadidi, M., et al. (eds.) Proc. of the 16th International
                             Information Society Conference (IFIP/SEC-2002), Egypt, pp. 6–8 (2002)
                          21. Mitrou, L., Gritzalis, D., Katsikas, S., Quirchmayr, G.: Electronic Voting: Consti-
                             tutional And Legal Requirements, And Their Technical Implications. In: Secure
                             Electronic Voting (2003)
                          22. Moynihan, D.P.: Building Secure Elections: E-Voting, Security, and Systems The-
                             ory. Public Administration Review 64(5), 515–528 (2004)
                          23. Nickerson, D.W., Friedrichs, R.D., King, D.C.: Partisan Mobilization Campaigns
                             in the Field: Results from a Statewide Turnout Experiment in Michigan. Political
                             Research Quarterly 59(1), 85 (2006)
                          24. Penha-Lopes, J.M.: Why use an open source e-voting system? In: Proceedings of
                             the 10th annual SIGCSE conference on Innovation and technology in computer
                             science education, pp. 412–412 (2005)
                          25. Plag, I.: Morphological Productivity: Structural Constraints in English Derivation.
                             Walter de Gruyter, Berlin (1999)
                          26. Pointcheval, D.: Security Arguments for Digital Signatures and Blind Signatures.
                             Journal of Cryptology 13(3), 361–396 (2000)
                          27. Rubin, A.: Security Considerations for Remote Electronic Voting over the Inter-
                             net. Communications Policy and Information Technology: Promises, Problems,
                             Prospects (2002)
                          28. Xenakis, A., Macintosh, A.: Procedural security in electronic voting. In: Proceed-
                             ings of the 37th Annual Hawaii International Conference on System Sciences,
                             pp. 116–123 (2004)
                          29. Yamamoto, T., Matsushita, M., Kamiya, T., Inoue, K.: Measuring Similarity of
                             Large Software Systems Based on Source Code Correspondence. In: Bomarius, F.,
                             Komi-Sirvi¨o, S. (eds.) PROFES 2005. LNCS, vol. 3547, pp. 530–544. Springer,
                             Heidelberg (2005)
   99   100   101   102   103   104   105   106   107   108   109