Page 238 - Towards Trustworthy Elections New Directions in Electronic Voting by Ed Gerck (auth.), David Chaum, Markus Jakobsson, Ronald L. Rivest, Peter Y. A. Ryan, Josh Benaloh, Miroslaw Kutylowski, Ben Adida ( (z-lib.org (1)
P. 238
H. Jonker and W. Pieters
230
3. Bhargava, M., Palamidessi, C.: Probabilistic anonymity. In: Abadi, M.,
de Alfaro, L. (eds.) CONCUR 2005. LNCS, vol. 3653, pp. 171–185. Springer,
Heidelberg (2005)
4. Brusco, V., Nazareno, M., Stokes, S.C.: Vote buying in Argentina. Latin American
Research Review 39(2), 66–88 (2004)
5. Delaune, S., Kremer, S., Ryan, M.D.: Receipt-freeness: Formal definition and fault
attacks (extended abstract). In: Proceedings of the Workshop Frontiers in Elec-
tronic Elections (FEE 2005), Milan, Italy (September 2005)
6. Delaune, S., Kremer, S., Ryan, M.D.: Coercion-resistance and receipt-freeness in
electronic voting. In: Proceedings of the 19th IEEE Computer Security Foundations
Workshop (CSFW 2006), Venice, Italy, July 2006. IEEE Computer Society Press,
Los Alamitos (2006)
7. Garcia, F.D., Hasuo, I., Pieters, W., van Rossum, P.: Provable anonymity. In:
K¨usters, R., Mitchell, J. (eds.) 3rd ACM Workshop on Formal Methods in Security
Engineering (FMSE 2005), pp. 63–72. ACM Press, New York (2005)
8. Hasen, R.L.: Vote buying. California Law Review 88(5), 1323–1371 (2000)
9. Hirt, M., Sako, K.: Efficient receipt-free voting based on homomorphic encryption.
In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 539–556. Springer,
Heidelberg (2000)
10. Jonker, H.L., de Vink, E.P.: Formalising receipt-freeness. In: Katsikas, S.K.,
L´opez, J., Backes, M., Gritzalis, S., Preneel, B. (eds.) ISC 2006. LNCS, vol. 4176,
pp. 476–488. Springer, Heidelberg (2006)
11. Juels, A., Catalano, D., Jakobsson, M.: Coercion-resistant electronic elections. In:
Proc. WPES 2005. ACM, New York (2005)
12. Kochin, M.S., Kochin, L.A.: When is buying votes wrong? Public Choice 97,
645–662 (1998)
13. Mauw, S., Oostdijk, M.: Foundations of attack trees. In: Won, D.H., Kim, S. (eds.)
ICISC 2005. LNCS, vol. 3935, pp. 186–198. Springer, Heidelberg (2006)
14. Mauw, S., Verschuren, J.H.S., de Vink, E.P.: A formalization of anonymity and
onion routing. In: Samarati, P., Ryan, P.Y.A., Gollmann, D., Molva, R. (eds.)
ESORICS 2004. LNCS, vol. 3193, pp. 109–124. Springer, Heidelberg (2004)
15. Pieters, W.: What proof do we prefer? variants of verifiability in voting. In:
Ryan, P., Anderson, S., Storer, T., Duncan, I., Bryans, J. (eds.) Workshop on
e-Voting and e-Government in the UK, Edinburgh, February 27-28, pp. 33–39.
e-Science Institute, University of St. Andrews (2006)
e
16. Pieters, W.: La Volont´ Machinale – understanding the electronic voting contro-
versy. PhD thesis, Radboud University, Nijmegen, The Netherlands (2007)
17. Sako, K., Kilian, J.: Receipt-free mix-type voting scheme – a practical solution to
the implementation of a voting booth. In: Guillou, L.C., Quisquater, J.-J. (eds.)
EUROCRYPT 1995. LNCS, vol. 921, pp. 393–403. Springer, Heidelberg (1995)
18. Schaffer, F.C., Schedler, A.: What is vote buying? In: Schaffer, F.C. (ed.) Elections
for Sale: The Causes and Consequences of Vote Buying. Lynne Rienner, Boulder
CO (2007)
19. Schneier, B.: Attack trees: Modeling security threats. Dr. Dobb’s journal
(December 1999)

