Strategies for Voter-Initiated Election Audits
暂无分享,去创建一个
[1] Josh Benaloh,et al. Ballot Casting Assurance via Voter-Initiated Poll Station Auditing , 2007, EVT.
[2] Dan S. Wallach,et al. VoteBox: A Tamper-evident, Verifiable Electronic Voting System , 2008, USENIX Security Symposium.
[3] Jeremy Clark,et al. Scantegrity II: End-to-End Verifiability for Optical Scan Election Systems using Invisible Ink Confirmation Codes , 2008, EVT.
[4] Peter Eckersley,et al. How Unique Is Your Web Browser? , 2010, Privacy Enhancing Technologies.
[5] Aggelos Kiayias,et al. Ceremonies for End-to-End Verifiable Elections , 2015, IACR Cryptol. ePrint Arch..
[6] Ben Adida,et al. Helios: Web-based Open-Audit Voting , 2008, USENIX Security Symposium.
[7] Philip B. Stark,et al. STAR-Vote: A Secure, Transparent, Auditable, and Reliable Voting System , 2012, EVT/WOTE.
[8] Ben Riva,et al. A New Implementation of a Dual (Paper and Cryptographic) Voting System , 2012, Electronic Voting.
[9] Peter Y. A. Ryan,et al. Pretty Good Democracy , 2009, Security Protocols Workshop.
[10] Ronald L. Rivest,et al. Scratch & vote: self-contained paper-based cryptographic voting , 2006, WPES '06.
[11] Zhe Xia,et al. PrÊt À Voter: a Voter-Verifiable Voting System , 2009, IEEE Transactions on Information Forensics and Security.
[12] Josh Benaloh,et al. Simple Verifiable Elections , 2006, EVT.
[13] Philip B. Stark,et al. A Gentle Introduction to Risk-Limiting Audits , 2012, IEEE Security & Privacy.
[14] Melanie Volkamer,et al. Usability Analysis of Helios - An Open Source Verifiable Remote Electronic Voting System , 2011, EVT/WOTE.