Aperio: High Integrity Elections for Developing Countries
暂无分享,去创建一个
[1] Ronald L Rivest,et al. On the notion of ‘software independence’ in voting systems , 2008, Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences.
[2] Jeremy Clark,et al. Scantegrity: End-to-End Voter-Verifiable Optical- Scan Voting , 2008, IEEE Security & Privacy.
[3] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[4] Markus Jakobsson,et al. Making Mix Nets Robust for Electronic Voting by Randomized Partial Checking , 2002, USENIX Security Symposium.
[5] Ronald L. Rivest,et al. Scratch & vote: self-contained paper-based cryptographic voting , 2006, WPES '06.
[6] Christopher J. Fewster. On the notion of , 2011 .
[7] Kevin J. Henry,et al. The Effectiveness of Receipt-Based Attacks on ThreeBallot , 2009, IEEE Transactions on Information Forensics and Security.
[8] Jeremy Clark,et al. Scantegrity II: End-to-End Verifiability for Optical Scan Election Systems using Invisible Ink Confirmation Codes , 2008, EVT.
[9] Stefan Popoveniuc,et al. Buying random votes is as hard as buying no-votes , 2008, IACR Cryptol. ePrint Arch..
[10] Warren D. Smith. Three Voting Protocols: ThreeBallot, VAV, and Twin , 2007, EVT.
[11] Stefan Popoveniuc,et al. An Introduction to PunchScan , 2010, Towards Trustworthy Elections.
[12] Merriam-Webster,et al. The Merriam Webster Dictionary , 1983 .
[13] David Chaum,et al. Secret Ballot Elections with Unconditional Integrity , 2007, IACR Cryptol. ePrint Arch..
[14] Jeremy Clark,et al. On the Security of Ballot Receipts in E 2 E Voting Systems , 2007 .
[15] David Chaum,et al. A Practical Voter-Verifiable Election Scheme , 2005, ESORICS.
[16] Stefan Popoveniuc,et al. Undervote and Pattern Voting : Vulnerability and a mitigation technique , 2007 .