Page 238 - Towards Trustworthy Elections New Directions in Electronic Voting by Ed Gerck (auth.), David Chaum, Markus Jakobsson, Ronald L. Rivest, Peter Y. A. Ryan, Josh Benaloh, Miroslaw Kutylowski, Ben Adida ( (z-lib.org (1)
P. 238

H. Jonker and W. Pieters
                          230
                           3. Bhargava, M., Palamidessi, C.: Probabilistic anonymity. In: Abadi, M.,
                             de Alfaro, L. (eds.) CONCUR 2005. LNCS, vol. 3653, pp. 171–185. Springer,
                             Heidelberg (2005)
                           4. Brusco, V., Nazareno, M., Stokes, S.C.: Vote buying in Argentina. Latin American
                             Research Review 39(2), 66–88 (2004)
                           5. Delaune, S., Kremer, S., Ryan, M.D.: Receipt-freeness: Formal definition and fault
                             attacks (extended abstract). In: Proceedings of the Workshop Frontiers in Elec-
                             tronic Elections (FEE 2005), Milan, Italy (September 2005)
                           6. Delaune, S., Kremer, S., Ryan, M.D.: Coercion-resistance and receipt-freeness in
                             electronic voting. In: Proceedings of the 19th IEEE Computer Security Foundations
                             Workshop (CSFW 2006), Venice, Italy, July 2006. IEEE Computer Society Press,
                             Los Alamitos (2006)
                           7. Garcia, F.D., Hasuo, I., Pieters, W., van Rossum, P.: Provable anonymity. In:
                             K¨usters, R., Mitchell, J. (eds.) 3rd ACM Workshop on Formal Methods in Security
                             Engineering (FMSE 2005), pp. 63–72. ACM Press, New York (2005)
                           8. Hasen, R.L.: Vote buying. California Law Review 88(5), 1323–1371 (2000)
                           9. Hirt, M., Sako, K.: Efficient receipt-free voting based on homomorphic encryption.
                             In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 539–556. Springer,
                             Heidelberg (2000)
                          10. Jonker, H.L., de Vink, E.P.: Formalising receipt-freeness. In: Katsikas, S.K.,
                             L´opez, J., Backes, M., Gritzalis, S., Preneel, B. (eds.) ISC 2006. LNCS, vol. 4176,
                             pp. 476–488. Springer, Heidelberg (2006)
                          11. Juels, A., Catalano, D., Jakobsson, M.: Coercion-resistant electronic elections. In:
                             Proc. WPES 2005. ACM, New York (2005)
                          12. Kochin, M.S., Kochin, L.A.: When is buying votes wrong? Public Choice 97,
                             645–662 (1998)
                          13. Mauw, S., Oostdijk, M.: Foundations of attack trees. In: Won, D.H., Kim, S. (eds.)
                             ICISC 2005. LNCS, vol. 3935, pp. 186–198. Springer, Heidelberg (2006)
                          14. Mauw, S., Verschuren, J.H.S., de Vink, E.P.: A formalization of anonymity and
                             onion routing. In: Samarati, P., Ryan, P.Y.A., Gollmann, D., Molva, R. (eds.)
                             ESORICS 2004. LNCS, vol. 3193, pp. 109–124. Springer, Heidelberg (2004)
                          15. Pieters, W.: What proof do we prefer? variants of verifiability in voting. In:
                             Ryan, P., Anderson, S., Storer, T., Duncan, I., Bryans, J. (eds.) Workshop on
                             e-Voting and e-Government in the UK, Edinburgh, February 27-28, pp. 33–39.
                             e-Science Institute, University of St. Andrews (2006)
                                                e
                          16. Pieters, W.: La Volont´ Machinale – understanding the electronic voting contro-
                             versy. PhD thesis, Radboud University, Nijmegen, The Netherlands (2007)
                          17. Sako, K., Kilian, J.: Receipt-free mix-type voting scheme – a practical solution to
                             the implementation of a voting booth. In: Guillou, L.C., Quisquater, J.-J. (eds.)
                             EUROCRYPT 1995. LNCS, vol. 921, pp. 393–403. Springer, Heidelberg (1995)
                          18. Schaffer, F.C., Schedler, A.: What is vote buying? In: Schaffer, F.C. (ed.) Elections
                             for Sale: The Causes and Consequences of Vote Buying. Lynne Rienner, Boulder
                             CO (2007)
                          19. Schneier, B.: Attack trees: Modeling security threats. Dr. Dobb’s journal
                             (December 1999)
   233   234   235   236   237   238   239   240   241   242   243