Declared-strategy voting: an instrument for group decision-making

DECLARED-STRATEGY VOTING: AN INSTRUMENT FOR GROUP

[1]  E. Rowland Theory of Games and Economic Behavior , 1946, Nature.

[2]  L. A. Goodman,et al.  Social Choice and Individual Values , 1951 .

[3]  Voting in Democracies: A Study of Majority and Proportional Electoral Systems , 1955 .

[4]  William Vickrey,et al.  Utility, Strategy, and Social Decision Rules , 1960 .

[5]  G. Thompson,et al.  The Theory of Committees and Elections. , 1959 .

[6]  Michael Dummett,et al.  Stability in Voting , 1961 .

[7]  R. Buckminster Fuller No More Secondhand God: And Other Writings , 1963 .

[8]  W. Riker,et al.  A Theory of the Calculus of Voting , 1968, American Political Science Review.

[9]  A. Gibbard Manipulation of Voting Schemes: A General Result , 1973 .

[10]  P. Fishburn The Theory Of Social Choice , 1973 .

[11]  Enid Lakeman How democracies vote: A study of electoral systems , 1974 .

[12]  M. Satterthwaite Strategy-proofness and Arrow's conditions: Existence and correspondence theorems for voting procedures and social welfare functions , 1975 .

[13]  Televote; A New Civic Communication System. , 1975 .

[14]  P. Gärdenfors Manipulation of social choice functions , 1976 .

[15]  James S. Dyer,et al.  An Actual Application of Collective Choice Theory to the Selection of Trajectories for the Mariner Jupiter/Saturn 1977 Project , 1976, Oper. Res..

[16]  Gordon Tullock,et al.  A New and Superior Process for Making Social Choices , 1976, Journal of Political Economy.

[17]  Salvador Barberà,et al.  THE MANIPULATION OF SOCIAL CHOICE MECHANISMS THAT DO NOT LEAVE "TOO MUCH" TO CHANCE' , 1977 .

[18]  Practical problems and practical solutions , 1977 .

[19]  Gideon Doron,et al.  Single Transferrable Vote: An Example of a Perverse Social Choice Function , 1977 .

[20]  Jerome H. Black,et al.  The Multicandidate Calculus of Voting: Application to Canadian Federal Elections , 1978 .

[21]  Bruce E. Cain,et al.  Strategic voting in Britain , 1978 .

[22]  David S. Johnson,et al.  Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .

[23]  Cornelius O'Leary,et al.  Irish Elections, 1918-77: Parties, Voters, and Proportional Representation , 1979 .

[24]  David Chaum,et al.  Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.

[25]  S. Merrill,et al.  Strategic Voting in Multicandidate Elections under Uncertainty and under Risk , 1981 .

[26]  Steven J. Brams,et al.  Strategic information and voting behavior , 1982 .

[27]  Dale T. Hoffman,et al.  A MODEL FOR STRATEGIC VOTING , 1982 .

[28]  H. Nurmi Voting Procedures: A Summary Analysis , 1983, British Journal of Political Science.

[29]  Michael Merritt,et al.  Protocols for Data Security , 1983, Computer.

[30]  Peter C. Fishburn,et al.  Some Logical Defects of the Single Transferable Vote , 1984 .

[31]  Jack H. Nagel A Debut for Approval Voting , 1984 .

[32]  B. Grofman,et al.  Choosing an Electoral System: Issues and Alternatives , 1984 .

[33]  Michael J. Fischer,et al.  A robust and verifiable cryptographically secure election scheme , 1985, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985).

[34]  David Chaum,et al.  Security without identification: transaction systems to make big brother obsolete , 1985, CACM.

[35]  John R. Chamberlin An investigation into the relative manipulability of four voting systems , 1985 .

[36]  M. Gallagher The political consequences of the electoral system in the Republic of Ireland , 1986 .

[37]  Josh D. Cohen,et al.  Improving Privacy in Cryptographic Elections , 1986 .

[38]  Josh Benaloh Verifiable secret-ballot elections , 1987 .

[39]  Roy G. Saltman Accuracy, integrity and security in computerized vote-tallying , 1988, CACM.

[40]  David Chaum,et al.  Elections with Unconditionally-Secret Ballots and Disruption Equivalent to Breaking RSA , 1988, EUROCRYPT.

[41]  Peter C. Fishburn,et al.  Does Approval Voting Elect the Lowest Common Denominator , 1988 .

[42]  D. Mueller Public choice II , 1989 .

[43]  M. Trick,et al.  Voting schemes for which it can be difficult to tell who won the election , 1989 .

[44]  M. Trick,et al.  The computational difficulty of manipulating an election , 1989 .

[45]  Cincinnati's 1988 proportional representation initiative , 1990 .

[46]  Lila Kari,et al.  Secret ballot elections in computer networks , 1991, Computers & security.

[47]  Arto Salomaa,et al.  Verifying and Recasting Secret Ballots in Computer Networks , 1991, New Results and New Trends in Computer Science.

[48]  C. Slaton Televote: Expanding Citizen Participation in the Quantum Age , 1991 .

[49]  Steven J. Brams,et al.  Approval voting in practice , 1991 .

[50]  John J. Bartholdi,et al.  Single transferable vote resists strategic voting , 2015 .

[51]  Eric S. Raymond,et al.  The New Hacker's Dictionary , 1991 .

[52]  Arto Salomaa,et al.  A cryptographic approach to the secret ballot , 1991 .

[53]  Duff Spafford,et al.  The international almanac of electoral history , 1992 .

[54]  Atsushi Fujioka,et al.  A Practical Secret Voting Scheme for Large Scale Elections , 1992, AUSCRYPT.

[55]  R. Weber,et al.  A Theory of Voting Equilibria , 1993, American Political Science Review.

[56]  Areno Lijphart,et al.  A Study of Twenty-Seven Democracies 1945-1990 , 1995 .

[57]  S. Brams,et al.  Would Ross Perot Have Won the 1992 Presidential Election Under Approval Voting? , 1994, PS: Political Science & Politics.

[58]  Josh Benaloh,et al.  Receipt-Free Secret-Ballot Elections , 1994, STOC 1994.

[59]  J. Knight,et al.  Aggregation and Deliberation: On the Possibility of Democratic Legitimacy , 1994 .

[60]  Kazue Sako Electronic Voting Scheme Allowing Open Objection to the Tally , 1994 .

[61]  Kazue Sako,et al.  Secure Voting Using Partially Compatible Homomorphisms , 1994, CRYPTO.

[62]  G. Cox Strategic Voting Equilibria under the Single Nontransferable Vote , 1994, American Political Science Review.

[63]  Lorrie Faith Cranor,et al.  Design and Implementation of a Practical Security-Conscious Electronic Polling System , 1996 .

[64]  R. McAfee,et al.  Analyzing the Airwaves Auction , 1996 .

[65]  염흥렬,et al.  [서평]「Applied Cryptography」 , 1997 .

[66]  John B. Anderson,et al.  Proportional representation and election reform in Ohio , 1997 .

[67]  P. Fishburn,et al.  Voting Procedures , 2022 .