La volonté machinale: understanding the electronic voting controversy
暂无分享,去创建一个
[1] Brian Randell,et al. Voting Technologies and Trust , 2006, IEEE Security & Privacy.
[2] K. Shadan,et al. Available online: , 2012 .
[3] R. Boumen,et al. Integration and test plans for complex manufacturing systems , 2007 .
[4] Martijn van Veelen,et al. Considerations on modeling for early detection of abnormalities in locally autonomous distributed systems , 2007 .
[5] Don Ihde,et al. Technology and the lifeworld , 1990 .
[6] Wolfgang Drechsler,et al. Electronic Voting in Estonia , 2004 .
[7] Eelco Dolstra,et al. The purely functional software deployment model , 2006 .
[8] Ben Shneiderman,et al. Designing trust into online experiences , 2000, CACM.
[9] Yee Wei Law,et al. Key management and link-layer security of wireless sensor networks : Energy-efficient attack and defense , 2005 .
[10] Masayuki Abe,et al. Universally Verifiable Mix-net with Verification Work Indendent of the Number of Mix-servers , 1998, EUROCRYPT.
[11] W. Bijker. Democratisering van de technologische cultuur : mogelijkheden en beperkingen van technology assessment , 1995 .
[12] Fernando M. Ilharco. Information technology as ontology : a phenomenological investigation into information technology and strategy in-the-world , 2002 .
[13] I C M Ingrid Flinsenberg,et al. Route Planning Algorithms for Car Navigation , 2009 .
[14] Daniel R. Tauritz,et al. Adaptive Information Filtering: Concepts and Algorithms , 2002 .
[15] David Chaum,et al. Secret-ballot receipts: True voter-verifiable elections , 2004, IEEE Security & Privacy Magazine.
[16] A. Oostveen. Context Matters. A Social Informatics Perspective on the Design and Implications of Large-Scale e-Government Systems , 2003 .
[17] Jurgen Vinju,et al. Analysis and transformation of source code by parsing and rewriting , 2005 .
[18] Andres Löh,et al. Exploring generic Haskell , 2004 .
[19] Ann Macintosh,et al. Procedural Security and Social Acceptance in E-Voting , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.
[20] Albert L. Baker,et al. Preliminary design of JML: a behavioral interface specification language for java , 2006, SOEN.
[21] L. Floridi. © 1999 Kluwer Academic Publishers. Printed in the Netherlands. Information ethics: On the philosophical foundation of computer ethics ⋆ , 2022 .
[22] Gavin Lowe,et al. Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR , 1996, Softw. Concepts Tools.
[23] Hans A. von Spakovsky,et al. Gauging the risks of internet elections , 2001, CACM.
[24] Tim Storer,et al. Practical Remote Electronic Elections for the UK , 2004, PST.
[25] Donald P. Moynihan,et al. Building Secure Elections: E-Voting, Security, and Systems Theory , 2004 .
[26] Jjd Joep Aerts. Random redundant storage for video on demand , 2003 .
[27] Thomas Wolle,et al. Computational aspects of treewidth : Lower bounds and network reliability , 2005 .
[28] Joe Mohen,et al. The case for internet voting , 2001, CACM.
[29] H. H. Asquith. The Ballot in England , 1888 .
[30] Simona Orzan,et al. On Distributed Verification and Verified Distribution , 2004 .
[31] H. A. deJong. Flexible Heterogeneous Software Systems , 2007 .
[32] David Chaum,et al. Blind Signatures for Untraceable Payments , 1982, CRYPTO.
[33] Ana Sokolova,et al. Coalgebraic analysis of probabilistic systems , 2005 .
[34] M. Gerber. Politics of Nature: How to Bring the Sciences into Democracy , 2005 .
[35] Kazue Sako,et al. Receipt-Free Mix-Type Voting Scheme - A Practical Solution to the Implementation of a Voting Booth , 1995, EUROCRYPT.
[36] H. Maibom. Social Systems , 2007 .
[37] Martijn Hendriks,et al. Model checking timed automata : techniques and applications , 2006 .
[38] Wolter Pieters,et al. Ethics of e-voting: an essay on requirements and values in Internet elections , 2005 .
[39] R. Gibson,et al. Elections Online: Assessing Internet Voting in Light of the Arizona Democratic Primary , 2001 .
[40] Dino Salvo Distefano,et al. On model checking the dynamics of object-based software : a foundational approach , 2003 .
[41] R. Golembiewski. Trust and Power Two Works by Niklas Luhmann . By Niklas Luhmann. (New York: John Wiley, 1980. Pp. xix + 208. $28.95.) , 1981, American Political Science Review.
[42] David Chaum,et al. A Practical Voter-Verifiable Election Scheme , 2005, ESORICS.
[43] C.-B. Breunesse. On JML: topics in tool-assisted verification of Java programs , 2006 .
[44] Bart Jacobs,et al. Counting Votes with Formal Methods , 2004, AMAST.
[45] Y Yuechen Qian,et al. Data synchronization and browsing for home environments , 2004 .
[46] Wolter Pieters,et al. Testing the eSTV program for the Scottish Local Government Elections , 2007 .
[47] Wolter Pieters,et al. Receipt-freeness as a special case of anonymity in epistemic logic , 2006 .
[48] Fabio Martinelli,et al. SEAS: A Secure E-Voting Applet System , 2003, ISSS.
[49] Philip J. Dobson. The Philosophy of Critical Realism—An Opportunity for Information Systems Research , 2001, Inf. Syst. Frontiers.
[50] S. P. Luttik. Choice quantification in process algebra , 2002 .
[51] F. Bartels,et al. On Generalised Coinduction and Probabilistic Specification Formats , 2004 .
[52] Mohammad Ali Abam. New data structures and algorithms for mobile data , 2007 .
[53] M. F.,et al. Bibliography , 1985, Experimental Gerontology.
[54] Wolter Pieters,et al. Acceptance of Voting Technology: Between Confidence and Trust , 2006, iTrust.
[55] Mogens Nielsen,et al. On the Formal Modelling of Trust in Reputation-Based Systems , 2004, Theory Is Forever.
[56] Martijn Warnier,et al. Language based security for Java and JML , 2006 .
[57] Ragnar Andreas Audunson,et al. Technology and Social Inclusion. Rethinking the Digital Divide , 2006, J. Documentation.
[58] Pekka Nikander,et al. Users and Trust in Cyberspace , 2000, Security Protocols Workshop.
[59] Steve Woolgar,et al. Ontological Gerrymandering: The Anatomy of Social Problems Explanations , 1985 .
[60] Wolter Pieters,et al. Provable anonymity , 2005, FMSE '05.
[61] Charles Gross. The Early History of the Ballot in England , 1898 .
[62] Rebecca T. Mercuri. A better ballot box , 2002 .
[63] RJ Roy Willemen,et al. School timetable construction : algorithms and complexity , 2002 .
[64] Aviel D. Rubin,et al. Security considerations for remote electronic voting , 2002, CACM.
[65] Ansgar Fehnker,et al. Citius, Vilius, Melius : guiding and cost-optimality in model checking of timed and hybrid systems , 2002 .
[66] W. Pieters,et al. Vote buying revisited : implications for receipt-freeness , 2007 .
[67] W. Pieters. Internet voting: a monstrous alliance between democracy and technology? , 2006 .
[68] David A. Wagner,et al. Cryptographic Voting Protocols: A Systems Perspective , 2005, USENIX Security Symposium.
[69] Norbert Kersting,et al. Electronic voting and democracy : a comparative analysis , 2004 .
[70] Anders Hansen. Tampering with nature: ‘nature’ and the ‘natural’ in media coverage of genetics and biotechnology , 2006 .
[71] Bruno Blanchet,et al. From Secrecy to Authenticity in Security Protocols , 2002, SAS.
[72] Michel A. Reniers,et al. Hybrid process algebra , 2005, J. Log. Algebraic Methods Program..
[73] Roy G. Saltman. The history and politics of voting technology , 2006 .
[74] Ted Selker,et al. Security Vulnerabilities and Problems with VVPT , 2004 .
[75] Bastiaan Stephan Graaf,et al. Model-Driven Evolution of Software Architectures , 2007, 11th European Conference on Software Maintenance and Reengineering (CSMR'07).
[76] M. T. de Berg,et al. Multi-functional geometric data structures , 2003 .
[77] Dietrich Fahrenholtz,et al. Towards a Sociological View of Trust in Computer Science , 2001 .
[78] Dmitri Jarnikov,et al. QoS framework for video streaming in home networks , 2007 .
[79] F. Cunningham,et al. Theories of Democracy: A Critical Introduction , 2001 .
[80] N.J.M. van den Nieuwelaar,et al. Supervisory machine control by predictive-reactive scheduling , 2004 .
[81] Reinder J. Bril,et al. Real-time scheduling for media processing using conditionally guaranteed budgets , 2004 .
[82] Kazue Sako,et al. Efficient Receipt-Free Voting Based on Homomorphic Encryption , 2000, EUROCRYPT.
[83] Frank B. Cross. The Risk of Reliance on Perceived Risk , 1992 .
[84] Michael Tunstall,et al. Cache Based Power Analysis Attacks on AES , 2006, ACISP.
[85] Bastiaan Heeren,et al. Top quality type error Messages , 2005 .
[86] Andreu Riera,et al. Bringing Confidence to Electronic Voting , 2003 .
[87] N. Luhmann. Familiarity, Confidence, Trust: Problems and Alternatives , 2000 .
[88] H. H. Williams. Reconstruction in Philosophy , 1921 .
[89] Bart Jacobs,et al. The LOOP Compiler for Java and JML , 2001, TACAS.
[90] Charles B. Nutting. Freedom of Silence: Constitutional Protection against Governmental Intrusions in Political Affairs , 1948 .
[91] EO Esko Dijk. Indoor ultrasonic position estimation using a single base station , 2004 .
[92] Survey of Vote-by-Mail Senate Election in the State of Oregon , 1997 .
[93] Kenneth R. van Wyk,et al. SECURE CODING PRINCIPLES & PRACTICES , 2003 .
[94] H.M.A. van Beek,et al. Specification and analysis of Internet applications , 2005 .
[95] B. Johnson,et al. The Social and Cultural Construction of Risk , 1987 .
[96] Lee Garber. Melissa Virus Creates a New Type of Threat , 1999, Computer.
[97] Valeria Brusco,et al. Vote Buying in Argentina , 2004 .
[98] Tac Tim Willemse. Semantics and verification in process algebras with data and timing , 2003 .
[99] Ari-Veikko Anttiroiko,et al. Building strong e-democracy: the role of technology in developing democracy for the information age , 2003, CACM.
[100] Mark Ryan,et al. Coercion-resistance and receipt-freeness in electronic voting , 2006, 19th IEEE Computer Security Foundations Workshop (CSFW'06).
[101] Maria Eva Magdalena Lijding,et al. Real-Time Scheduling of Tertiary Storage , 2003 .
[102] Nathanael Paul,et al. Election security: Perception and reality , 2004, IEEE Security & Privacy Magazine.
[103] M. A. Valero Espada,et al. Modal Abstraction and Replication of Processes with Data , 2005 .
[104] Dan S. Wallach,et al. Analysis of an electronic voting system , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[105] Hui Gao,et al. Design and verification of lock-free parallel algorithms , 2005 .
[106] B. Gebremichael-Tesfagiorgis,et al. Expressivity of Timed Automata Models , 2006 .
[107] Siegfried Nijssen. Mining Structured Data , 2006 .
[108] Hartmut Peter Benz,et al. Casual Multimedia Process Annotations -- CoMPAs , 2003 .
[109] Sheila Jasanoff,et al. The political science of risk perception , 1998 .
[110] Lauren Weinstein. Risks of Internet Voting. , 2000 .
[111] Daniel Kroening,et al. Decision Procedures for Equality Logic and Uninterpreted Functions , 2008 .
[112] Pedro A. D. Rezende. Electronic Voting Systems Is Brazil ahead of its time , 2004 .
[113] Laura Brandán Briones,et al. Theories for Model-based Testing: Real-time and Coverage , 2007 .
[114] B. Lampson,et al. Authentication in distributed systems: theory and practice , 1991, TOCS.
[115] Cruz Filipe,et al. Constructive real analysis : a type-theoretical formalization and applications , 2004 .
[116] Ka Lok Man,et al. Formal specification and analysis of hybrid systems , 2006 .
[117] Kåre Vollan. OBSERVING ELECTRONIC VOTING , 2005 .
[118] Understanding John Dewey: Nature and Cooperative Intelligence , 1997 .
[119] Atze Dijkstra. Stepping through Haskell , 2000 .
[120] Leon Moonen,et al. Exploring software systems , 2003, International Conference on Software Maintenance, 2003. ICSM 2003. Proceedings..
[121] Martijn M. Schrage,et al. Proxima: a presentation-oriented editor for structured documents , 2000 .
[122] André Zúquete,et al. REVS – A ROBUST ELECTRONIC VOTING SYSTEM , 2003 .
[123] Enrico H. Gerding,et al. Autonomous Agents in Bargaining Games , 2009 .
[124] Maurice H. ter Beek,et al. Team Automata: A Formal Approach to the Modeling of Collaboration Between System Components , 2003 .
[125] Wolter Pieters,et al. What proof do we prefer? Variants of verifiability in voting , 2006 .
[126] Bart Jacobs,et al. Statically checking confidentiality via dynamic labels , 2005, WITS '05.
[127] Berry Schoenmakers. Compensating for a lack of transparency , 2000, CFP '00.
[128] Mohammad Reza Mousavi,et al. Structuring structural operational semantics , 2005 .
[129] Daan Leijen,et al. The λ Abroad - A Functional Approach to Software Components , 2003 .
[130] V. Sundramoorthy,et al. At Home in Service Discovery , 2006 .
[131] P. Zoeteweij,et al. Composing constraint solvers , 2005 .
[132] Lawrence Pratchett,et al. Electronic Voting in the United Kingdom: Lessons and Limitations from the UK Experience , 2004 .
[133] Ivan Kurtev Ivanov,et al. Adaptability of model transformations , 2005 .
[134] Wolter Pieters,et al. E-voting discourses in the UK and the Netherlands , 2007 .
[135] Gabriele Lenzini,et al. Integration of Analysis Techniques in Security and Fault-Tolerance , 2005 .
[136] Wim van Eck,et al. Electromagnetic radiation from video display units: An eavesdropping risk? , 1985, Comput. Secur..
[137] Bengt Jonsson,et al. Probabilistic Process Algebra , 2001 .
[138] Tim Storer,et al. Electronic Voting in the UK: Current Trends in Deployment , Requirements and Technologies , 2005, PST.
[139] de Hayco Jong. Flexible heterogeneous software systems , 2007 .
[140] William A. Wallace,et al. Trust in electronic environments , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.
[141] Pekka Nikander,et al. Users and Trust in Cyberspace (Transcript of Discussion) , 2000, Security Protocols Workshop.
[142] Haukur Arnþórsson. Brave New Ballot. The Battle to Safeguard Democracy in the Age of Electronic Voting , 2006 .
[143] Aad Mathssen,et al. Logical Calculi for Reasoning with Binding , 2008 .
[144] Wolfgang Drechsler,et al. The Estonian E-Voting Laws Discourse: Paradigmatic Benchmarking for Central and Eastern Europe , 2003 .
[145] Dermot Cochran,et al. The KOA Remote Voting System: A Summary of Work to Date , 2006, TGC.
[146] J. Ketema,et al. Bohm-Like Trees for Rewriting , 2006 .
[147] Cfj Christian Lange,et al. Assessing and improving the quality of modeling : a series of empirical studies about the UML , 2007 .
[148] Peter Verbaan,et al. The Computational Complexity of Evolving Systems , 2006 .
[149] T. van deStorm. Component-Based Configuration, Integration and Delivery , 2007 .
[150] Anton Wijs,et al. Silent steps in transition systems and Markov chains , 2007 .
[151] Wolter Pieters,et al. Vulnerabilities as monsters: the cultural foundations of computer security (extended abstract) , 2006 .
[152] T. D. Vu,et al. Semantics and applications of process and program algebra , 2007 .
[153] G Giovanni Russello,et al. Separation and adaptation of concerns in a shared data space , 2006 .
[154] Wolter Pieters,et al. Internet Voting: A Conceptual Challenge to Democracy , 2006, Social Inclusion.
[155] Sarah Gordon,et al. Real world anti-virus product reviews and evaluations - Part 2 , 1997 .
[156] Marcel Kyas,et al. Verifying OCL specifications of UML models: tool support and compositionakity , 2006 .
[157] L. Gerlach,et al. Protest Movements and the Construction of Risk , 1987 .
[158] Sebastian Maneth,et al. Models of tree translation , 2004 .
[159] P. Verbeek. What Things Do: Philosophical Reflections on Technology, Agency, and Design , 2005 .
[160] J. Dewey,et al. The Public and its Problems , 1927 .
[161] Johan Schot,et al. Experimenting for Sustainable Transport: The Approach of Strategic Niche Management , 2002 .
[162] Dahlia Malkhi,et al. E-Voting Without 'Cryptography' , 2002, Financial Cryptography.
[163] V Victor Bos,et al. Formal specification and analysis of industrial systems , 2002 .
[164] G. Munnichs. Whom to Trust? Public Concerns, Late Modern Risks, and Expert Trustworthiness , 2004 .
[165] Wpaj Wil Michiels. Performance ratios for the differencing method , 2004 .
[166] N. Luhmann. Risk: A Sociological Theory , 1993 .
[167] Josh Benaloh,et al. Receipt-free secret-ballot elections (extended abstract) , 1994, STOC '94.
[168] Catholijn M. Jonker,et al. Modelling Trade and Trust Across Cultures , 2006, iTrust.
[169] R Ronald Ruimerman,et al. Modeling and remodeling in bone tissue , 2005 .
[170] Reinhard Riedl,et al. Rethinking Trust and Confidence in European E-Government Linking the Public Sector with Post-Modern Society , 2004, I3E.
[171] Joost Visser,et al. Generic traversal over typed source code representations , 2003 .
[172] Ling Cheung,et al. Reconciling nondeterministic and probabilistic choices , 2006 .
[173] Eu-Jin Goh,et al. Searching on Encrypted Data , 2003 .
[174] Mariëlle Stoelinga,et al. Alea jacta est : verification of probabilistic, real-time and parametric systems , 2002 .
[175] Andrei Sabelfeld,et al. Gradual Release: Unifying Declassification, Encryption and Key Release Policies , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[176] Jeroen Doumen,et al. Searching in encrypted data , 2004 .
[177] Anton Wijs,et al. What to do next? Analysing and optimising system behaviour in time , 2007 .
[178] Peter van den Besselaar,et al. Security as belief user's perceptions on the security of electronic voting systems , 2004 .
[179] Andy K. Bissett,et al. Some human dimensions of computer virus creation and infection , 2000, Int. J. Hum. Comput. Stud..
[180] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[181] Wolter Pieters,et al. RIES - Internet Voting in Action , 2005, COMPSAC.
[182] Carl E. Landwehr,et al. Basic concepts and taxonomy of dependable and secure computing , 2004, IEEE Transactions on Dependable and Secure Computing.
[183] T. Kuipers,et al. Techniques for understanding legacy software systems , 2002 .
[184] H. Achterhuis. Introduction: American Philosophers of Technology. , 2001 .
[185] Robert H. Sloan,et al. Examining Smart-Card Security under the Threat of Power Analysis Attacks , 2002, IEEE Trans. Computers.
[186] Bruno Latour,et al. A Relativistic Account of Einstein's Relativity , 1988 .
[187] Goran Frehse,et al. Compositional verification of hybrid systems using simulation relations , 2005 .
[188] Iris Loeb. Natural Deduction, Sharing By Presentation , 2007 .
[189] A. Rip,et al. The past and future of constructive technology assessment , 1997 .
[190] J. Meseguer,et al. Security Policies and Security Models , 1982, 1982 IEEE Symposium on Security and Privacy.
[191] Cjf Cas Cremers. Scyther : semantics and verification of security protocols , 2006 .
[192] T. Kuhn,et al. The Structure of Scientific Revolutions. , 1964 .
[193] R.J.F. Hoogma,et al. Experimenting with sustainable transport innovations : a workbook for strategic niche management , 1999 .
[194] J. Bradbury. The Policy Implications of Differing Concepts of Risk , 1989 .
[195] Cheun Ngen Chong. Experiments in rights control : expression and enforcement , 2005 .
[196] Erika Ábrahám,et al. An Assertional Proof System for Multithreaded Java - Theory and Tool Support , 2005 .
[197] P R Yarnold,et al. Effects of actual waiting time, perceived waiting time, information delivery, and expressive quality on patient satisfaction in the emergency department. , 1996, Annals of emergency medicine.
[198] M. B. van der Zwaag,et al. Models and logics for process algebra , 2002 .
[199] Nikolay Kavaldjiev,et al. A run-time reconfigurable Network-on-Chip for streaming DSP applications , 2006 .
[200] R. Hepburn,et al. BEING AND TIME , 2010 .
[201] David A. Wagner,et al. Analyzing internet voting security , 2004, CACM.
[202] Joseph H. Park,et al. England's Controversy over the Secret Ballot , 1931 .
[203] G. Rozenberg,et al. Effective models for the structure of ð-calculus processes with replication , 2001 .
[204] Juan Visente Guillen Scholten,et al. Mobile Channels for Exogenous Coordination of Distributed Systems: Semantics, Implementation and Composition , 2007 .
[205] Jun Pang,et al. Weak Probabilistic Anonymity , 2007, SecCO@CONCUR.
[206] A. J. Markvoort. Towards hybrid molecular simulations , 2006 .
[207] David R. Cok,et al. ESC/Java2: Uniting ESC/Java and JML , 2004, CASSIS.
[208] Sander M. Bohte,et al. Spiking Neural Networks , 2003 .
[209] Tomas Krilavicius,et al. Hybrid Techniques for Hybrid Systems , 2006 .
[210] M. T. Ionita,et al. Scenario-based system architecting : a systematic approach to developing future-proof system architectures , 2005 .
[211] Kristin Shrader-Frechette,et al. Perceived Risks Versus Actual Risks: Managing Hazards through Negotiation , 1990 .
[212] Natarajan Shankar,et al. PVS: A Prototype Verification System , 1992, CADE.
[213] Brian S. Krueger. Point, Click, & Vote: The Future of Internet Voting and The Politics of Internet Communication , 2004, Perspectives on Politics.
[214] Andrea Pasquinucci. Web voting, security and cryptography , 2007 .
[215] Patrick L. Bourgeois,et al. Pragmatism and Phenomenology: A Philosophic Encounter , 1980 .
[216] Sangjin Kim,et al. A New Universally Verifiable and Receipt-Free Electronic Voting Scheme Using One-Way Untappable Channels , 2004, AWCC.
[217] Jeroen Eggermont,et al. Data Mining using Genetic Programming : Classification and Symbolic Regression , 2005 .
[218] M. Heidegger. The Question Concerning Technology and Other Essays , 1977 .
[219] M. Niqui,et al. Formalising Exact Arithmetic. Representations, Algorithms and Proofs , 2004 .
[220] Ricardo Corin,et al. Analysis Models for Security Protocols , 2006 .
[221] L. Jean Camp,et al. The code of elections , 2004, CACM.
[222] Ivan Kurtev,et al. Adaptability of model transformations , 2005 .
[223] Stefan Mangard,et al. An AES Smart Card Implementation Resistant to Power Analysis Attacks , 2006, ACNS.
[224] Sachin Lodha,et al. Probabilistic Anonymity , 2007, PinKDD.
[225] AJ Arjan Mooij,et al. Constructive formal methods and protocol standardization , 2006 .
[226] L. Winner. Autonomous Technology: Technics-out-of-Control as a Theme in Political Thought , 1977 .
[227] Matthew K. Franklin,et al. Multi-Autority Secret-Ballot Elections with Linear Work , 1996, EUROCRYPT.
[228] Bahareh Badban,et al. Verification Techniques for Extensions of Equality Logic , 2006 .
[229] Andrew D. Gordon,et al. Authenticity by typing for security protocols , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..
[230] Ronald Cramer,et al. A Secure and Optimally Efficient Multi-Authority Election Scheme ( 1 ) , 2000 .
[231] M. de Jonge,et al. To reuse or to be reused. Techniques for component composition and construction , 2003 .
[232] Marinella Petrocchi,et al. SEAS, a secure e-voting protocol: Design and implementation , 2005, Comput. Secur..
[233] Arjen van Weelden,et al. Putting Types To Good Use , 2007 .