La volonté machinale: understanding the electronic voting controversy

ing from technology and law According to Niklas Luhmann, observation is distinguishing indication. This means that risks are perceived based on available distinctions. They are revealed in the interaction of existing distinctions with the environment. If existing distinctions are inadequate, monsters may appear, and these may lead to changes in our distinctions. We would like to be able to prevent monsters by pro-actively reflecting on our categories in risk assessment. Technology and law are externalisations of existing distinctions. They are therefore relevant if we wish to implement reflection on categories. We should write down which implicit distinctions are present in technology and law, and thereby get an overview of which sides of distinctions are being marked at present. Technology and law serve as mirrors of our distinctions in this approach: they tell us something about ourselves. Thereby, they can themselves contribute to updating our ethical framework to the developments they are part of. They can tell us that we could have made different choices, by presenting us with categorical challenges. Can we mark the other side? In order to reflect on our distinctions in technology assessment, we should investigate existing technological artifacts, scientific theories and legal arrangements. Then, we write down associations that categorise the specific legal or technological feature within our existing cultural framework. We try to find counterconcepts to the concepts that we wrote down, and thereby challenge the existing categorisation. On a general level, this chapter has shown how challenges to our concepts can be identified by looking into the “other side” of authenticity, or the “other side” of availability. Identity can be more than something to verify, and availability will mean a different thing in the context of multi-channel voting. However, this approach can also work on a lower level. For example, if we look at the RIES system, we find that one can verify how one’s vote has been counted. Possible associations with this procedure include the concept of proof from logic. In RIES, the presence of your vote is proved by providing a witness (your vote), as in constructive logic. As a counterconcept, we have a proof without a witness, as in classical logic. Could this be used as an alternative? Such systems already exist in the scientific literature. Are these more desirable, more practical or cheaper? An example from law is the Dutch e-voting regulation. There is a requirement that the way of storing the vote should not allow reconstruction of individual choices (see page 33). Possible associations with “way of storing” include memory and software. If we mark the other side of the distinctions, we may find something like processing and hardware. Is it relevant to include clauses on these aspects as well? Or instead a more general formulation? Such reasoning could have led to the idea of tempest attacks, associated with processing and hardware, or otherwise to a more general formulation of the requirements that would have covered the issue. 168 A Categorical Challenge to Democracy As categorical challenges, both new technological options and new legal options can emerge from this process. These constitute alternatives for existing arrangements. Finally, we evaluate the benefits of alternatives that are revealed by means of this process. This includes evaluation of desirability, feasibility and cost. Reconstructive technology assessment can help us to reveal pro-actively what existing distinctions hide, and how this affects our understanding of the new technology under consideration. Precise methods for implementing this process require further research. Of course, both technology and law need not be implemented in the real world before this process can take place. Letting go of Nature In reconstructive technology assessment, we recognise that technology is not merely an external reality, but rather part of a process to which we contribute by means of our categorisation of phenomena. This replaces the distinction between nature and culture by an interactive process, in which many stakeholders can have a role. Even scientists are no longer occupied with Nature, but they join forces in the replacement of confidence with trust. This makes possible different separations of powers, for which Latour already gave some indications (section 4.4). If this helps to reveal different risks by means of different distinctions or categories, instead of amplifying the Nature of existing ones, the discussion on e-voting and other technologies may take a quite different form.

[1]  Brian Randell,et al.  Voting Technologies and Trust , 2006, IEEE Security & Privacy.

[2]  K. Shadan,et al.  Available online: , 2012 .

[3]  R. Boumen,et al.  Integration and test plans for complex manufacturing systems , 2007 .

[4]  Martijn van Veelen,et al.  Considerations on modeling for early detection of abnormalities in locally autonomous distributed systems , 2007 .

[5]  Don Ihde,et al.  Technology and the lifeworld , 1990 .

[6]  Wolfgang Drechsler,et al.  Electronic Voting in Estonia , 2004 .

[7]  Eelco Dolstra,et al.  The purely functional software deployment model , 2006 .

[8]  Ben Shneiderman,et al.  Designing trust into online experiences , 2000, CACM.

[9]  Yee Wei Law,et al.  Key management and link-layer security of wireless sensor networks : Energy-efficient attack and defense , 2005 .

[10]  Masayuki Abe,et al.  Universally Verifiable Mix-net with Verification Work Indendent of the Number of Mix-servers , 1998, EUROCRYPT.

[11]  W. Bijker Democratisering van de technologische cultuur : mogelijkheden en beperkingen van technology assessment , 1995 .

[12]  Fernando M. Ilharco Information technology as ontology : a phenomenological investigation into information technology and strategy in-the-world , 2002 .

[13]  I C M Ingrid Flinsenberg,et al.  Route Planning Algorithms for Car Navigation , 2009 .

[14]  Daniel R. Tauritz,et al.  Adaptive Information Filtering: Concepts and Algorithms , 2002 .

[15]  David Chaum,et al.  Secret-ballot receipts: True voter-verifiable elections , 2004, IEEE Security & Privacy Magazine.

[16]  A. Oostveen Context Matters. A Social Informatics Perspective on the Design and Implications of Large-Scale e-Government Systems , 2003 .

[17]  Jurgen Vinju,et al.  Analysis and transformation of source code by parsing and rewriting , 2005 .

[18]  Andres Löh,et al.  Exploring generic Haskell , 2004 .

[19]  Ann Macintosh,et al.  Procedural Security and Social Acceptance in E-Voting , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.

[20]  Albert L. Baker,et al.  Preliminary design of JML: a behavioral interface specification language for java , 2006, SOEN.

[21]  L. Floridi © 1999 Kluwer Academic Publishers. Printed in the Netherlands. Information ethics: On the philosophical foundation of computer ethics ⋆ , 2022 .

[22]  Gavin Lowe,et al.  Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR , 1996, Softw. Concepts Tools.

[23]  Hans A. von Spakovsky,et al.  Gauging the risks of internet elections , 2001, CACM.

[24]  Tim Storer,et al.  Practical Remote Electronic Elections for the UK , 2004, PST.

[25]  Donald P. Moynihan,et al.  Building Secure Elections: E-Voting, Security, and Systems Theory , 2004 .

[26]  Jjd Joep Aerts Random redundant storage for video on demand , 2003 .

[27]  Thomas Wolle,et al.  Computational aspects of treewidth : Lower bounds and network reliability , 2005 .

[28]  Joe Mohen,et al.  The case for internet voting , 2001, CACM.

[29]  H. H. Asquith The Ballot in England , 1888 .

[30]  Simona Orzan,et al.  On Distributed Verification and Verified Distribution , 2004 .

[31]  H. A. deJong Flexible Heterogeneous Software Systems , 2007 .

[32]  David Chaum,et al.  Blind Signatures for Untraceable Payments , 1982, CRYPTO.

[33]  Ana Sokolova,et al.  Coalgebraic analysis of probabilistic systems , 2005 .

[34]  M. Gerber Politics of Nature: How to Bring the Sciences into Democracy , 2005 .

[35]  Kazue Sako,et al.  Receipt-Free Mix-Type Voting Scheme - A Practical Solution to the Implementation of a Voting Booth , 1995, EUROCRYPT.

[36]  H. Maibom Social Systems , 2007 .

[37]  Martijn Hendriks,et al.  Model checking timed automata : techniques and applications , 2006 .

[38]  Wolter Pieters,et al.  Ethics of e-voting: an essay on requirements and values in Internet elections , 2005 .

[39]  R. Gibson,et al.  Elections Online: Assessing Internet Voting in Light of the Arizona Democratic Primary , 2001 .

[40]  Dino Salvo Distefano,et al.  On model checking the dynamics of object-based software : a foundational approach , 2003 .

[41]  R. Golembiewski Trust and Power Two Works by Niklas Luhmann . By Niklas Luhmann. (New York: John Wiley, 1980. Pp. xix + 208. $28.95.) , 1981, American Political Science Review.

[42]  David Chaum,et al.  A Practical Voter-Verifiable Election Scheme , 2005, ESORICS.

[43]  C.-B. Breunesse On JML: topics in tool-assisted verification of Java programs , 2006 .

[44]  Bart Jacobs,et al.  Counting Votes with Formal Methods , 2004, AMAST.

[45]  Y Yuechen Qian,et al.  Data synchronization and browsing for home environments , 2004 .

[46]  Wolter Pieters,et al.  Testing the eSTV program for the Scottish Local Government Elections , 2007 .

[47]  Wolter Pieters,et al.  Receipt-freeness as a special case of anonymity in epistemic logic , 2006 .

[48]  Fabio Martinelli,et al.  SEAS: A Secure E-Voting Applet System , 2003, ISSS.

[49]  Philip J. Dobson The Philosophy of Critical Realism—An Opportunity for Information Systems Research , 2001, Inf. Syst. Frontiers.

[50]  S. P. Luttik Choice quantification in process algebra , 2002 .

[51]  F. Bartels,et al.  On Generalised Coinduction and Probabilistic Specification Formats , 2004 .

[52]  Mohammad Ali Abam New data structures and algorithms for mobile data , 2007 .

[53]  M. F.,et al.  Bibliography , 1985, Experimental Gerontology.

[54]  Wolter Pieters,et al.  Acceptance of Voting Technology: Between Confidence and Trust , 2006, iTrust.

[55]  Mogens Nielsen,et al.  On the Formal Modelling of Trust in Reputation-Based Systems , 2004, Theory Is Forever.

[56]  Martijn Warnier,et al.  Language based security for Java and JML , 2006 .

[57]  Ragnar Andreas Audunson,et al.  Technology and Social Inclusion. Rethinking the Digital Divide , 2006, J. Documentation.

[58]  Pekka Nikander,et al.  Users and Trust in Cyberspace , 2000, Security Protocols Workshop.

[59]  Steve Woolgar,et al.  Ontological Gerrymandering: The Anatomy of Social Problems Explanations , 1985 .

[60]  Wolter Pieters,et al.  Provable anonymity , 2005, FMSE '05.

[61]  Charles Gross The Early History of the Ballot in England , 1898 .

[62]  Rebecca T. Mercuri A better ballot box , 2002 .

[63]  RJ Roy Willemen,et al.  School timetable construction : algorithms and complexity , 2002 .

[64]  Aviel D. Rubin,et al.  Security considerations for remote electronic voting , 2002, CACM.

[65]  Ansgar Fehnker,et al.  Citius, Vilius, Melius : guiding and cost-optimality in model checking of timed and hybrid systems , 2002 .

[66]  W. Pieters,et al.  Vote buying revisited : implications for receipt-freeness , 2007 .

[67]  W. Pieters Internet voting: a monstrous alliance between democracy and technology? , 2006 .

[68]  David A. Wagner,et al.  Cryptographic Voting Protocols: A Systems Perspective , 2005, USENIX Security Symposium.

[69]  Norbert Kersting,et al.  Electronic voting and democracy : a comparative analysis , 2004 .

[70]  Anders Hansen Tampering with nature: ‘nature’ and the ‘natural’ in media coverage of genetics and biotechnology , 2006 .

[71]  Bruno Blanchet,et al.  From Secrecy to Authenticity in Security Protocols , 2002, SAS.

[72]  Michel A. Reniers,et al.  Hybrid process algebra , 2005, J. Log. Algebraic Methods Program..

[73]  Roy G. Saltman The history and politics of voting technology , 2006 .

[74]  Ted Selker,et al.  Security Vulnerabilities and Problems with VVPT , 2004 .

[75]  Bastiaan Stephan Graaf,et al.  Model-Driven Evolution of Software Architectures , 2007, 11th European Conference on Software Maintenance and Reengineering (CSMR'07).

[76]  M. T. de Berg,et al.  Multi-functional geometric data structures , 2003 .

[77]  Dietrich Fahrenholtz,et al.  Towards a Sociological View of Trust in Computer Science , 2001 .

[78]  Dmitri Jarnikov,et al.  QoS framework for video streaming in home networks , 2007 .

[79]  F. Cunningham,et al.  Theories of Democracy: A Critical Introduction , 2001 .

[80]  N.J.M. van den Nieuwelaar,et al.  Supervisory machine control by predictive-reactive scheduling , 2004 .

[81]  Reinder J. Bril,et al.  Real-time scheduling for media processing using conditionally guaranteed budgets , 2004 .

[82]  Kazue Sako,et al.  Efficient Receipt-Free Voting Based on Homomorphic Encryption , 2000, EUROCRYPT.

[83]  Frank B. Cross The Risk of Reliance on Perceived Risk , 1992 .

[84]  Michael Tunstall,et al.  Cache Based Power Analysis Attacks on AES , 2006, ACISP.

[85]  Bastiaan Heeren,et al.  Top quality type error Messages , 2005 .

[86]  Andreu Riera,et al.  Bringing Confidence to Electronic Voting , 2003 .

[87]  N. Luhmann Familiarity, Confidence, Trust: Problems and Alternatives , 2000 .

[88]  H. H. Williams Reconstruction in Philosophy , 1921 .

[89]  Bart Jacobs,et al.  The LOOP Compiler for Java and JML , 2001, TACAS.

[90]  Charles B. Nutting Freedom of Silence: Constitutional Protection against Governmental Intrusions in Political Affairs , 1948 .

[91]  EO Esko Dijk Indoor ultrasonic position estimation using a single base station , 2004 .

[92]  Survey of Vote-by-Mail Senate Election in the State of Oregon , 1997 .

[93]  Kenneth R. van Wyk,et al.  SECURE CODING PRINCIPLES & PRACTICES , 2003 .

[94]  H.M.A. van Beek,et al.  Specification and analysis of Internet applications , 2005 .

[95]  B. Johnson,et al.  The Social and Cultural Construction of Risk , 1987 .

[96]  Lee Garber Melissa Virus Creates a New Type of Threat , 1999, Computer.

[97]  Valeria Brusco,et al.  Vote Buying in Argentina , 2004 .

[98]  Tac Tim Willemse Semantics and verification in process algebras with data and timing , 2003 .

[99]  Ari-Veikko Anttiroiko,et al.  Building strong e-democracy: the role of technology in developing democracy for the information age , 2003, CACM.

[100]  Mark Ryan,et al.  Coercion-resistance and receipt-freeness in electronic voting , 2006, 19th IEEE Computer Security Foundations Workshop (CSFW'06).

[101]  Maria Eva Magdalena Lijding,et al.  Real-Time Scheduling of Tertiary Storage , 2003 .

[102]  Nathanael Paul,et al.  Election security: Perception and reality , 2004, IEEE Security & Privacy Magazine.

[103]  M. A. Valero Espada,et al.  Modal Abstraction and Replication of Processes with Data , 2005 .

[104]  Dan S. Wallach,et al.  Analysis of an electronic voting system , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[105]  Hui Gao,et al.  Design and verification of lock-free parallel algorithms , 2005 .

[106]  B. Gebremichael-Tesfagiorgis,et al.  Expressivity of Timed Automata Models , 2006 .

[107]  Siegfried Nijssen Mining Structured Data , 2006 .

[108]  Hartmut Peter Benz,et al.  Casual Multimedia Process Annotations -- CoMPAs , 2003 .

[109]  Sheila Jasanoff,et al.  The political science of risk perception , 1998 .

[110]  Lauren Weinstein Risks of Internet Voting. , 2000 .

[111]  Daniel Kroening,et al.  Decision Procedures for Equality Logic and Uninterpreted Functions , 2008 .

[112]  Pedro A. D. Rezende Electronic Voting Systems Is Brazil ahead of its time , 2004 .

[113]  Laura Brandán Briones,et al.  Theories for Model-based Testing: Real-time and Coverage , 2007 .

[114]  B. Lampson,et al.  Authentication in distributed systems: theory and practice , 1991, TOCS.

[115]  Cruz Filipe,et al.  Constructive real analysis : a type-theoretical formalization and applications , 2004 .

[116]  Ka Lok Man,et al.  Formal specification and analysis of hybrid systems , 2006 .

[117]  Kåre Vollan OBSERVING ELECTRONIC VOTING , 2005 .

[118]  Understanding John Dewey: Nature and Cooperative Intelligence , 1997 .

[119]  Atze Dijkstra Stepping through Haskell , 2000 .

[120]  Leon Moonen,et al.  Exploring software systems , 2003, International Conference on Software Maintenance, 2003. ICSM 2003. Proceedings..

[121]  Martijn M. Schrage,et al.  Proxima: a presentation-oriented editor for structured documents , 2000 .

[122]  André Zúquete,et al.  REVS – A ROBUST ELECTRONIC VOTING SYSTEM , 2003 .

[123]  Enrico H. Gerding,et al.  Autonomous Agents in Bargaining Games , 2009 .

[124]  Maurice H. ter Beek,et al.  Team Automata: A Formal Approach to the Modeling of Collaboration Between System Components , 2003 .

[125]  Wolter Pieters,et al.  What proof do we prefer? Variants of verifiability in voting , 2006 .

[126]  Bart Jacobs,et al.  Statically checking confidentiality via dynamic labels , 2005, WITS '05.

[127]  Berry Schoenmakers Compensating for a lack of transparency , 2000, CFP '00.

[128]  Mohammad Reza Mousavi,et al.  Structuring structural operational semantics , 2005 .

[129]  Daan Leijen,et al.  The λ Abroad - A Functional Approach to Software Components , 2003 .

[130]  V. Sundramoorthy,et al.  At Home in Service Discovery , 2006 .

[131]  P. Zoeteweij,et al.  Composing constraint solvers , 2005 .

[132]  Lawrence Pratchett,et al.  Electronic Voting in the United Kingdom: Lessons and Limitations from the UK Experience , 2004 .

[133]  Ivan Kurtev Ivanov,et al.  Adaptability of model transformations , 2005 .

[134]  Wolter Pieters,et al.  E-voting discourses in the UK and the Netherlands , 2007 .

[135]  Gabriele Lenzini,et al.  Integration of Analysis Techniques in Security and Fault-Tolerance , 2005 .

[136]  Wim van Eck,et al.  Electromagnetic radiation from video display units: An eavesdropping risk? , 1985, Comput. Secur..

[137]  Bengt Jonsson,et al.  Probabilistic Process Algebra , 2001 .

[138]  Tim Storer,et al.  Electronic Voting in the UK: Current Trends in Deployment , Requirements and Technologies , 2005, PST.

[139]  de Hayco Jong Flexible heterogeneous software systems , 2007 .

[140]  William A. Wallace,et al.  Trust in electronic environments , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.

[141]  Pekka Nikander,et al.  Users and Trust in Cyberspace (Transcript of Discussion) , 2000, Security Protocols Workshop.

[142]  Haukur Arnþórsson Brave New Ballot. The Battle to Safeguard Democracy in the Age of Electronic Voting , 2006 .

[143]  Aad Mathssen,et al.  Logical Calculi for Reasoning with Binding , 2008 .

[144]  Wolfgang Drechsler,et al.  The Estonian E-Voting Laws Discourse: Paradigmatic Benchmarking for Central and Eastern Europe , 2003 .

[145]  Dermot Cochran,et al.  The KOA Remote Voting System: A Summary of Work to Date , 2006, TGC.

[146]  J. Ketema,et al.  Bohm-Like Trees for Rewriting , 2006 .

[147]  Cfj Christian Lange,et al.  Assessing and improving the quality of modeling : a series of empirical studies about the UML , 2007 .

[148]  Peter Verbaan,et al.  The Computational Complexity of Evolving Systems , 2006 .

[149]  T. van deStorm Component-Based Configuration, Integration and Delivery , 2007 .

[150]  Anton Wijs,et al.  Silent steps in transition systems and Markov chains , 2007 .

[151]  Wolter Pieters,et al.  Vulnerabilities as monsters: the cultural foundations of computer security (extended abstract) , 2006 .

[152]  T. D. Vu,et al.  Semantics and applications of process and program algebra , 2007 .

[153]  G Giovanni Russello,et al.  Separation and adaptation of concerns in a shared data space , 2006 .

[154]  Wolter Pieters,et al.  Internet Voting: A Conceptual Challenge to Democracy , 2006, Social Inclusion.

[155]  Sarah Gordon,et al.  Real world anti-virus product reviews and evaluations - Part 2 , 1997 .

[156]  Marcel Kyas,et al.  Verifying OCL specifications of UML models: tool support and compositionakity , 2006 .

[157]  L. Gerlach,et al.  Protest Movements and the Construction of Risk , 1987 .

[158]  Sebastian Maneth,et al.  Models of tree translation , 2004 .

[159]  P. Verbeek What Things Do: Philosophical Reflections on Technology, Agency, and Design , 2005 .

[160]  J. Dewey,et al.  The Public and its Problems , 1927 .

[161]  Johan Schot,et al.  Experimenting for Sustainable Transport: The Approach of Strategic Niche Management , 2002 .

[162]  Dahlia Malkhi,et al.  E-Voting Without 'Cryptography' , 2002, Financial Cryptography.

[163]  V Victor Bos,et al.  Formal specification and analysis of industrial systems , 2002 .

[164]  G. Munnichs Whom to Trust? Public Concerns, Late Modern Risks, and Expert Trustworthiness , 2004 .

[165]  Wpaj Wil Michiels Performance ratios for the differencing method , 2004 .

[166]  N. Luhmann Risk: A Sociological Theory , 1993 .

[167]  Josh Benaloh,et al.  Receipt-free secret-ballot elections (extended abstract) , 1994, STOC '94.

[168]  Catholijn M. Jonker,et al.  Modelling Trade and Trust Across Cultures , 2006, iTrust.

[169]  R Ronald Ruimerman,et al.  Modeling and remodeling in bone tissue , 2005 .

[170]  Reinhard Riedl,et al.  Rethinking Trust and Confidence in European E-Government Linking the Public Sector with Post-Modern Society , 2004, I3E.

[171]  Joost Visser,et al.  Generic traversal over typed source code representations , 2003 .

[172]  Ling Cheung,et al.  Reconciling nondeterministic and probabilistic choices , 2006 .

[173]  Eu-Jin Goh,et al.  Searching on Encrypted Data , 2003 .

[174]  Mariëlle Stoelinga,et al.  Alea jacta est : verification of probabilistic, real-time and parametric systems , 2002 .

[175]  Andrei Sabelfeld,et al.  Gradual Release: Unifying Declassification, Encryption and Key Release Policies , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[176]  Jeroen Doumen,et al.  Searching in encrypted data , 2004 .

[177]  Anton Wijs,et al.  What to do next? Analysing and optimising system behaviour in time , 2007 .

[178]  Peter van den Besselaar,et al.  Security as belief user's perceptions on the security of electronic voting systems , 2004 .

[179]  Andy K. Bissett,et al.  Some human dimensions of computer virus creation and infection , 2000, Int. J. Hum. Comput. Stud..

[180]  Siva Sai Yerubandi,et al.  Differential Power Analysis , 2002 .

[181]  Wolter Pieters,et al.  RIES - Internet Voting in Action , 2005, COMPSAC.

[182]  Carl E. Landwehr,et al.  Basic concepts and taxonomy of dependable and secure computing , 2004, IEEE Transactions on Dependable and Secure Computing.

[183]  T. Kuipers,et al.  Techniques for understanding legacy software systems , 2002 .

[184]  H. Achterhuis Introduction: American Philosophers of Technology. , 2001 .

[185]  Robert H. Sloan,et al.  Examining Smart-Card Security under the Threat of Power Analysis Attacks , 2002, IEEE Trans. Computers.

[186]  Bruno Latour,et al.  A Relativistic Account of Einstein's Relativity , 1988 .

[187]  Goran Frehse,et al.  Compositional verification of hybrid systems using simulation relations , 2005 .

[188]  Iris Loeb Natural Deduction, Sharing By Presentation , 2007 .

[189]  A. Rip,et al.  The past and future of constructive technology assessment , 1997 .

[190]  J. Meseguer,et al.  Security Policies and Security Models , 1982, 1982 IEEE Symposium on Security and Privacy.

[191]  Cjf Cas Cremers Scyther : semantics and verification of security protocols , 2006 .

[192]  T. Kuhn,et al.  The Structure of Scientific Revolutions. , 1964 .

[193]  R.J.F. Hoogma,et al.  Experimenting with sustainable transport innovations : a workbook for strategic niche management , 1999 .

[194]  J. Bradbury The Policy Implications of Differing Concepts of Risk , 1989 .

[195]  Cheun Ngen Chong Experiments in rights control : expression and enforcement , 2005 .

[196]  Erika Ábrahám,et al.  An Assertional Proof System for Multithreaded Java - Theory and Tool Support , 2005 .

[197]  P R Yarnold,et al.  Effects of actual waiting time, perceived waiting time, information delivery, and expressive quality on patient satisfaction in the emergency department. , 1996, Annals of emergency medicine.

[198]  M. B. van der Zwaag,et al.  Models and logics for process algebra , 2002 .

[199]  Nikolay Kavaldjiev,et al.  A run-time reconfigurable Network-on-Chip for streaming DSP applications , 2006 .

[200]  R. Hepburn,et al.  BEING AND TIME , 2010 .

[201]  David A. Wagner,et al.  Analyzing internet voting security , 2004, CACM.

[202]  Joseph H. Park,et al.  England's Controversy over the Secret Ballot , 1931 .

[203]  G. Rozenberg,et al.  Effective models for the structure of ð-calculus processes with replication , 2001 .

[204]  Juan Visente Guillen Scholten,et al.  Mobile Channels for Exogenous Coordination of Distributed Systems: Semantics, Implementation and Composition , 2007 .

[205]  Jun Pang,et al.  Weak Probabilistic Anonymity , 2007, SecCO@CONCUR.

[206]  A. J. Markvoort Towards hybrid molecular simulations , 2006 .

[207]  David R. Cok,et al.  ESC/Java2: Uniting ESC/Java and JML , 2004, CASSIS.

[208]  Sander M. Bohte,et al.  Spiking Neural Networks , 2003 .

[209]  Tomas Krilavicius,et al.  Hybrid Techniques for Hybrid Systems , 2006 .

[210]  M. T. Ionita,et al.  Scenario-based system architecting : a systematic approach to developing future-proof system architectures , 2005 .

[211]  Kristin Shrader-Frechette,et al.  Perceived Risks Versus Actual Risks: Managing Hazards through Negotiation , 1990 .

[212]  Natarajan Shankar,et al.  PVS: A Prototype Verification System , 1992, CADE.

[213]  Brian S. Krueger Point, Click, & Vote: The Future of Internet Voting and The Politics of Internet Communication , 2004, Perspectives on Politics.

[214]  Andrea Pasquinucci Web voting, security and cryptography , 2007 .

[215]  Patrick L. Bourgeois,et al.  Pragmatism and Phenomenology: A Philosophic Encounter , 1980 .

[216]  Sangjin Kim,et al.  A New Universally Verifiable and Receipt-Free Electronic Voting Scheme Using One-Way Untappable Channels , 2004, AWCC.

[217]  Jeroen Eggermont,et al.  Data Mining using Genetic Programming : Classification and Symbolic Regression , 2005 .

[218]  M. Heidegger The Question Concerning Technology and Other Essays , 1977 .

[219]  M. Niqui,et al.  Formalising Exact Arithmetic. Representations, Algorithms and Proofs , 2004 .

[220]  Ricardo Corin,et al.  Analysis Models for Security Protocols , 2006 .

[221]  L. Jean Camp,et al.  The code of elections , 2004, CACM.

[222]  Ivan Kurtev,et al.  Adaptability of model transformations , 2005 .

[223]  Stefan Mangard,et al.  An AES Smart Card Implementation Resistant to Power Analysis Attacks , 2006, ACNS.

[224]  Sachin Lodha,et al.  Probabilistic Anonymity , 2007, PinKDD.

[225]  AJ Arjan Mooij,et al.  Constructive formal methods and protocol standardization , 2006 .

[226]  L. Winner Autonomous Technology: Technics-out-of-Control as a Theme in Political Thought , 1977 .

[227]  Matthew K. Franklin,et al.  Multi-Autority Secret-Ballot Elections with Linear Work , 1996, EUROCRYPT.

[228]  Bahareh Badban,et al.  Verification Techniques for Extensions of Equality Logic , 2006 .

[229]  Andrew D. Gordon,et al.  Authenticity by typing for security protocols , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..

[230]  Ronald Cramer,et al.  A Secure and Optimally Efficient Multi-Authority Election Scheme ( 1 ) , 2000 .

[231]  M. de Jonge,et al.  To reuse or to be reused. Techniques for component composition and construction , 2003 .

[232]  Marinella Petrocchi,et al.  SEAS, a secure e-voting protocol: Design and implementation , 2005, Comput. Secur..

[233]  Arjen van Weelden,et al.  Putting Types To Good Use , 2007 .