Page 104 - Towards Trustworthy Elections New Directions in Electronic Voting by Ed Gerck (auth.), David Chaum, Markus Jakobsson, Ronald L. Rivest, Peter Y. A. Ryan, Josh Benaloh, Miroslaw Kutylowski, Ben Adida ( (z-lib.org (1)
P. 104
J.A. Goler and E.J. Selker
96
9. MIT CalTech: Voting Technology Project. Voting: What is, what could be (2001)
10. Chaum, D.: Blind signatures for untraceable payments. In: Advances in Cryptology:
Proceedings of Crypto, vol. 82, pp. 23–25 (1982)
11. Chaum, D.: Secret-ballot receipts: True voter-verifiable elections. IEEE Security &
Privacy Magazine 2(1), 38–47 (2004)
12. Chaum, D., Ryan, P.Y.A., Schneider, S.: A Practical Voter-Verifiable Election
Scheme. In: Proceedings of Computer Security-Esorics 2005: 10th European Sym-
posium on Research in Computer Security, Milan, Italy, September 12-14 (2005)
13. Feldman, A.J., Halderman, J.A., Felten, E.W.: Security Analysis of the Diebold
AccuVote-TS Voting Machine. Center for Information Technology Policy. Princeton
University, Princeton (September 13, 2006)
14. Fujioka, A., Okamoto, T., Ohta, K.: A practical secret voting scheme for large
scale elections. In: Zheng, Y., Seberry, J. (eds.) AUSCRYPT 1992. LNCS, vol. 718,
pp. 244–251. Springer, Heidelberg (1993)
15. Jefferson, D., Rubin, A.D., Simons, B., Wagner, D.A.: A Security Analysis of the
Secure Electronic Registration and Voting Experiment, SERVE (2004)
16. Jones, D.W.: Problems with Voting Systems and the Applicable Standards (2001)
17. Kovalev, I.V., Grosspietsch, K.E.: An Approach for the Reliability Optimization
of N-Version Software under Resource and Cost/Timing Constraints. Institut f¨ur
Autonome intelligente Systeme (1999)
18. Liburd, S.S.D.: An N-version electronic voting system (2004)
19. Mercuri, R.: A better ballot box? IEEE Spectrum 39(10), 46–50 (2002)
20. Mitrou, L., Gritzalis, D., Katsikas, S.: Revisiting legal and regulatory requirements
for secure e-voting. In: el Hadidi, M., et al. (eds.) Proc. of the 16th International
Information Society Conference (IFIP/SEC-2002), Egypt, pp. 6–8 (2002)
21. Mitrou, L., Gritzalis, D., Katsikas, S., Quirchmayr, G.: Electronic Voting: Consti-
tutional And Legal Requirements, And Their Technical Implications. In: Secure
Electronic Voting (2003)
22. Moynihan, D.P.: Building Secure Elections: E-Voting, Security, and Systems The-
ory. Public Administration Review 64(5), 515–528 (2004)
23. Nickerson, D.W., Friedrichs, R.D., King, D.C.: Partisan Mobilization Campaigns
in the Field: Results from a Statewide Turnout Experiment in Michigan. Political
Research Quarterly 59(1), 85 (2006)
24. Penha-Lopes, J.M.: Why use an open source e-voting system? In: Proceedings of
the 10th annual SIGCSE conference on Innovation and technology in computer
science education, pp. 412–412 (2005)
25. Plag, I.: Morphological Productivity: Structural Constraints in English Derivation.
Walter de Gruyter, Berlin (1999)
26. Pointcheval, D.: Security Arguments for Digital Signatures and Blind Signatures.
Journal of Cryptology 13(3), 361–396 (2000)
27. Rubin, A.: Security Considerations for Remote Electronic Voting over the Inter-
net. Communications Policy and Information Technology: Promises, Problems,
Prospects (2002)
28. Xenakis, A., Macintosh, A.: Procedural security in electronic voting. In: Proceed-
ings of the 37th Annual Hawaii International Conference on System Sciences,
pp. 116–123 (2004)
29. Yamamoto, T., Matsushita, M., Kamiya, T., Inoue, K.: Measuring Similarity of
Large Software Systems Based on Source Code Correspondence. In: Bomarius, F.,
Komi-Sirvi¨o, S. (eds.) PROFES 2005. LNCS, vol. 3547, pp. 530–544. Springer,
Heidelberg (2005)

