Génie logiciel formel : théorie, pratique et pédagogie (apprentissage a partir de l'expérience du vote électronique). (Formal software engineering: theory, practice and teaching (learning from the E-voting experience))
暂无分享,去创建一个
[1] Richard A. Kemmerer,et al. Formal Specification and Analysis of an E-voting System , 2010, 2010 International Conference on Availability, Reliability and Security.
[2] Kenneth R. Iversen. A Cryptographic Scheme for Computerized Elections , 1991, CRYPTO.
[3] Berry Schoenmakers,et al. A Simple Publicly Verifiable Secret Sharing Scheme and Its Application to Electronic , 1999, CRYPTO.
[4] Kai R. T. Larsen,et al. Voting technology implementation , 1999, CACM.
[5] Moti Yung,et al. Distributing the power of a government to enhance the privacy of voters , 1986, PODC '86.
[6] André Zúquete,et al. REVS – A ROBUST ELECTRONIC VOTING SYSTEM , 2003 .
[7] Jean-Raymond Abrial. A System Development Process with Event-B and the Rodin Platform , 2007, ICFEM.
[8] Bongshin Lee,et al. Electronic voting system usability issues , 2003, CHI '03.
[9] Atsushi Fujioka,et al. A Practical Secret Voting Scheme for Large Scale Elections , 1992, AUSCRYPT.
[10] Peter Brent,et al. The Australian ballot: Not the secret ballot , 2006 .
[11] J. Paul Gibson. Feature Requirements Models: Understanding Interactions , 1997, FIW.
[12] Tomasz Janowski,et al. Technological foundations of electronic governance , 2007, ICEGOV '07.
[13] Klaus Schmid,et al. PuLSE: a methodology to develop software product lines , 1999, SSR '99.
[14] Deborah A. Frincke,et al. Achieving Learning Objectives through E-Voting Case Studies , 2007, IEEE Security & Privacy.
[15] Sean Riddle,et al. An Analysis of the Hart Intercivic DAU eSlate , 2007, EVT.
[16] Borislava I. Simidchieva,et al. Specifying and verifying requirements for election processes , 2008, DG.O.
[17] Zhe Xia,et al. Analysis, Improvement, and Simplification of Prêt à Voter with Paillier Encryption , 2008, EVT.
[18] Brian Randell,et al. Voting Technologies and Trust , 2006, IEEE Security & Privacy.
[19] Mark Ryan,et al. Coercion-resistance and receipt-freeness in electronic voting , 2006, 19th IEEE Computer Security Foundations Workshop (CSFW'06).
[20] James Withey. Investment Analysis of Software Assets for Product Lines. , 1996 .
[21] Dan S. Wallach,et al. Analysis of an electronic voting system , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[22] S. Dunne,et al. Initial findings on the impact of an alternative approach to Problem Based Learning in Conputer Science , 2004 .
[23] Ted Selker,et al. The SAVE System — Secure Architecture for Voting Electronically , 2004 .
[24] Donald R. Woods,et al. Problem-based learning : how to gain the most from PBL , 1994 .
[25] Dimitris Gritzalis. Principles and requirements for a secure e-voting system , 2002 .
[26] J. Paul Gibson. Software reuse and plagiarism: a code of practice , 2009, ITiCSE '09.
[27] Dominique Méry,et al. Teaching Formal Methods: Lessons to Learn , 1998, IWFM.
[28] J. Paul Gibson,et al. Software engineering as a model of understanding for learning and problem solving , 2005, ICER '05.
[29] Jan Bosch,et al. Product-line architectures in industry: a case study , 1999, Proceedings of the 1999 International Conference on Software Engineering (IEEE Cat. No.99CB37002).
[30] Ann Macintosh,et al. Procedural security in electronic voting , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.
[31] Klaus Schmid,et al. A Requirements-Based Taxonomy of Software Product Line Evolution , 2007, Electron. Commun. Eur. Assoc. Softw. Sci. Technol..
[32] Michael Poppleton,et al. Towards Reuse with "Feature-Oriented Event-B" , 2008 .
[33] Mark Guzdial,et al. A multi-national, multi-institutional study of assessment of programming skills of first-year CS students , 2001, ITiCSE-WGR '01.
[34] David Lorge Parnas,et al. Basic Science for Software Developers , 2002 .
[35] Jackie O’KELLY,et al. YEAR ONE ANALYSIS — INTERPRETATION AND VALIDATION , 2005 .
[36] David Chaum,et al. Secret-ballot receipts: True voter-verifiable elections , 2004, IEEE Security & Privacy Magazine.
[37] Dan S. Wallach,et al. Hack-a-vote: Security issues with electronic voting systems , 2004, IEEE Security & Privacy Magazine.
[38] Joseph Kiniry. Formally Counting Electronic Votes (But Still Only Trusting Paper) , 2007, 12th IEEE International Conference on Engineering Complex Computer Systems (ICECCS 2007).
[39] Bongshin Lee,et al. Early Appraisals of Electronic Voting , 2005 .
[40] Jeannette M. Wing. Invited Talk: Weaving Formal Methods into the Undergraduate Computer Science Curriculum , 2000, AMAST.
[41] Ka-Ping Yee. Extending Prerendered-Interface Voting Software to Support Accessibility and Other Ballot Features , 2007, EVT.
[42] David A. Wagner,et al. Tamper-evident, history-independent, subliminal-free data structures on PROM storage -or- how to store ballots on a voting machine , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[43] Jürgen Börstler,et al. Software product line modeling made practical , 2006, CACM.
[44] Chao Zhang,et al. Evaluating Electronic Voting Systems Equipped with Voter-Verified Paper Records , 2008, IEEE Security & Privacy.
[45] Josh Benaloh,et al. Ballot Casting Assurance via Voter-Initiated Poll Station Auditing , 2007, EVT.
[46] Lee Naish,et al. Coercion-Resistant Tallying for STV Voting , 2008, EVT.
[47] J. Paul Gibson. E-Voting and the Need for Rigourous Software Engineering - The Past, Present and Future , 2007, B.
[48] Marek Klonowski,et al. Kleptographic Attacks on E-Voting Schemes , 2006, ETRICS.
[49] Ralph Morelli,et al. Teaching about the risks of electronic voting technology , 2005, ITiCSE '05.
[50] Jing Liu. Handling Safety-Related Feature Interaction in Safety-Critical Product Lines , 2007, 29th International Conference on Software Engineering (ICSE'07 Companion).
[51] Naveen Sastry. Designing Voting Machines for Verification , 2006, USENIX Security Symposium.
[52] Leila Jemni Ben Ayed,et al. Using UML Activity Diagrams and Event B for Distributed and Parallel Applications , 2007, 31st Annual International Computer Software and Applications Conference (COMPSAC 2007).
[53] J. Paul Gibson. E-Voting Requirements Modelling: An Algebraic Specification Approach (With CafeOBJ) , 2005 .
[54] Michael Poppleton,et al. Towards Feature-Oriented Specification and Development with Event-B , 2007, REFSQ.
[55] Sarah P. Everett. The usability of electronic voting machines and how votes can be changed without detection , 2007 .
[56] Peter Y. A. Ryan,et al. Prêt à Voter : a Systems Perspective , 2005 .
[57] Josh Benaloh,et al. Receipt-free secret-ballot elections (extended abstract) , 1994, STOC '94.
[58] Timothy C. Bell,et al. A low-cost high-impact computer science show for family audiences , 2000, Proceedings 23rd Australasian Computer Science Conference. ACSC 2000 (Cat. No.PR00518).
[59] Lorrie Faith Cranor,et al. Electronic voting: computerized polls may save money, protect privacy , 1996, CROS.
[60] Tim Storer,et al. Practical Remote Electronic Elections for the UK , 2004, PST.
[61] H. Gardner,et al. Frames of Mind: The Theory of Multiple Intelligences , 1983 .
[62] Dan S. Wallach,et al. Casting Votes in the Auditorium , 2007, EVT.
[63] David Lorge Parnas,et al. Software engineering programmes are not computer science programmes , 1999, Ann. Softw. Eng..
[64] Dan Craigen,et al. An International Survey of Industrial Applications of Formal Methods , 1992, Z User Workshop.
[65] Jan Bosch,et al. On the notion of variability in software product lines , 2001, Proceedings Working IEEE/IFIP Conference on Software Architecture.
[66] J. Paul Gibson,et al. Engineering a Distributed e-Voting System Architecture: Meeting Critical Requirements , 2010, ISARCS.
[67] David A. Wagner,et al. Cryptographic Voting Protocols: A Systems Perspective , 2005, USENIX Security Symposium.
[68] Ariel J. Feldman,et al. Security Analysis of the Diebold AccuVote-TS Voting Machine , 2007, EVT.
[69] Kyo Chul Kang,et al. Feature-Oriented Domain Analysis (FODA) Feasibility Study , 1990 .
[70] James Heather,et al. Implementing STV securely in Pret a Voter , 2007, 20th IEEE Computer Security Foundations Symposium (CSF'07).
[71] B. Bloom,et al. Taxonomy of Educational Objectives. Handbook I: Cognitive Domain , 1966 .
[72] Jörgen Svensson,et al. E-voting in Europe: Divergent democratic practice , 2003, Inf. Polity.
[73] Elspeth Cusack,et al. Refinement, conformance and inheritance , 1991, Formal Aspects of Computing.
[74] Douglas H. Clements,et al. Constructivist Learning and Teaching , 2007 .
[75] Joseph Lorenzo Hall. Improving the Security, Transparency and Efficiency of California's 1% Manual Tally Procedures , 2008, EVT.
[76] Daniel M. Zimmerman,et al. Secret Ninja Formal Methods , 2008, FM.
[77] Valtteri Niemi,et al. Efficient Voting with No Selling of Votes , 1999, Theor. Comput. Sci..
[78] J. Paul Gibson. Formal requirements engineering: learning from the students , 2000, Proceedings 2000 Australian Software Engineering Conference.
[79] Jean-Raymond Abrial,et al. The B-book - assigning programs to meanings , 1996 .
[80] Pierre-Yves Schobbens,et al. Model checking lots of systems: efficient verification of temporal properties in software product lines , 2010, 2010 ACM/IEEE 32nd International Conference on Software Engineering.
[81] Jim des Rivières,et al. Eclipse: A platform for integrating development tools , 2004, IBM Syst. J..
[82] Dermot Cochran,et al. Formal techniques in a remote voting system , 2006, SOEN.
[83] Joe McCarthy,et al. Transparency and e-Voting: Democratic vs. Commercial Interests , 2004, Electronic Voting in Europe.
[84] J. Paul Gibson,et al. Feature Interactions in a Software Product Line for E-voting , 2009, ICFI.
[85] J. Paul Gibson,et al. NUIM-CS-TR 2003-02 E-voting : a safety critical system , 2003 .
[86] Alec Yasinsac,et al. The Dynamics of Counting and Recounting Votes , 2008, IEEE Security & Privacy.
[87] David M. Weiss,et al. Defining Families: The Commonality Analysis , 1997, Proceedings of the (19th) International Conference on Software Engineering.
[88] David Lorge Parnas,et al. Software design , 2001 .
[89] David A. Wagner,et al. Analyzing internet voting security , 2004, CACM.
[90] Byoungcheon Lee,et al. Multiplicative Homomorphic E-Voting , 2004, INDOCRYPT.
[91] E. Hilgard,et al. Theories of Learning , 1981 .
[92] Tim Storer,et al. Electronic Voting in the UK: Current Trends in Deployment , Requirements and Technologies , 2005, PST.
[93] Ghassan Z. Qadah,et al. Electronic voting systems: Requirements, design, and implementation , 2007, Comput. Stand. Interfaces.
[94] Patrick Donohoe,et al. Feature-Oriented Project Line Engineering , 2002, IEEE Softw..
[95] J. Paul Gibson,et al. Towards the development of a cognitive model of programming: a software engineering proposal , 2004, PPIG.
[96] Aidan Mooney,et al. An Overview of the Integration of Problem Based Learning into an existing Computer Science Programming Module , 2004 .
[97] Warren D. Smith. Three Voting Protocols: ThreeBallot, VAV, and Twin , 2007, EVT.
[98] Bev Littlewood,et al. E-voting: dependability requirements and design for dependability , 2006, First International Conference on Availability, Reliability and Security (ARES'06).
[99] Robert C. Martin. Agile Software Development, Principles, Patterns, and Practices , 2002 .
[100] Klaus Schmid,et al. A systematic approach to derive the scope of software product lines , 1999, Proceedings of the 1999 International Conference on Software Engineering (IEEE Cat. No.99CB37002).
[102] Rebecca T. Mercuri. A better ballot box , 2002 .
[103] Aviel D. Rubin,et al. Security considerations for remote electronic voting , 2002, CACM.
[104] Josep Rifà,et al. An implementable secure voting scheme , 1996, Comput. Secur..
[105] John Paul Gibson. Challenging the lecturer : learning from the teacher's mistakes , 2009 .
[106] Lorrie Faith Cranor,et al. Voting after Florida: no easy answers , 2001, UBIQ.
[107] Kazue Sako,et al. Receipt-Free Mix-Type Voting Scheme - A Practical Solution to the Implementation of a Voting Booth , 1995, EUROCRYPT.
[108] Nancy A. Lynch,et al. Cryptographic protocols , 1982, STOC '82.
[109] Dines Bjørner,et al. Formal specification and software development , 1982 .
[110] Marti A. Hearst,et al. Building reliable voting machine software , 2007 .
[111] David Chaum,et al. A Practical Voter-Verifiable Election Scheme , 2005, ESORICS.
[112] Lorrie Faith Cranor,et al. Sensus: a security-conscious electronic polling system for the Internet , 1997, Proceedings of the Thirtieth Hawaii International Conference on System Sciences.
[113] Antoni Diller,et al. Z - an introduction to formal methods , 1990 .
[114] Hwang Jing-Jang. A conventional approach to secret balloting in computer networks , 1996 .
[115] J. Paul Gibson,et al. A Critical Analysis of the Council of Europe Recommendations on E-Voting , 2006, EVT.
[116] Ann Macintosh,et al. Procedural security analysis of electronic voting , 2004, ICEC '04.
[117] Thomas P. Ryan,et al. GEMS Tabulation Database Design Issues in Relation to Voting Systems Certification Standards , 2007, EVT.
[118] Ann Macintosh,et al. E-electoral administration: organizational lessons learned from the deployment of e-voting in the UK , 2005, DG.O.
[119] Komminist Weldemariam,et al. Modeling and Analysis of Procedural Security in (e)Voting: The Trentino's Approach and Experiences , 2008, EVT.
[120] Aggelos Kiayias,et al. Tampering with Special Purpose Trusted Computing Devices: A Case Study in Optical Scan E-Voting , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).
[121] Krzysztof Czarnecki,et al. SAT-based analysis of feature models is easy , 2009, SPLC.
[122] Rebecca T. Mercuri. Florida 2002: sluggish systems, vanishing votes , 2002, CACM.
[123] Michael J. Butler,et al. A Roadmap for the Rodin Toolset , 2008, ABZ.
[124] Mark Ryan,et al. Analysis of an Electronic Voting Protocol in the Applied Pi Calculus , 2005, ESOP.
[125] William S. Curran. Teaching software engineering in the computer science curriculum , 2003, SGCS.
[126] R. Tamblyn,et al. Problem-based learning : an approach to medical education , 1980 .
[127] Des Traynor,et al. Implementing Cognitive Modellig in CS Education: Aligning Theory and Practice of Learning to Program , 2004, CELDA.
[128] Merle S. King,et al. Implementing voting systems: the Georgia method , 2004, CACM.
[129] John Paul Gibson,et al. Verification and maintenance of e-voting systems and standards , 2008 .
[130] Alan H. Schoenfeld,et al. Mathematical Problem Solving , 1985 .
[131] Peter G. Neumann,et al. Inside risks: risks in computerized elections , 1990, CACM.
[132] Epp Maaten,et al. Towards Remote E-Voting: Estonian case , 2004, Electronic Voting in Europe.
[133] Michael J. Butler,et al. An Open Extensible Tool Environment for Event-B , 2006, ICFEM.
[134] Michael Poppleton,et al. The Composition of Event-B Models , 2008, ABZ.
[135] Peter G. Neumann. Responsibilities of technologists , 2005, CACM.
[136] Jean-Raymond Abrial,et al. Refinement, Decomposition, and Instantiation of Discrete Models: Application to Event-B , 2007, Fundam. Informaticae.
[137] Aggelos Kiayias,et al. The Vector-Ballot e-Voting Approach , 2004, Financial Cryptography.
[138] Ricky E. Sward,et al. Learning styles across the curriculum , 2005, ITiCSE '05.
[139] Jeremy Clark,et al. Scantegrity: End-to-End Voter-Verifiable Optical- Scan Voting , 2008, IEEE Security & Privacy.
[140] J. Paul Gibson,et al. RoboCode & problem-based learning: a non-prescriptive approach to teaching programming , 2006, ITICSE '06.
[141] Susan Bergin,et al. Automated assessment in CS1 , 2006 .
[142] Michael J. Butler,et al. Linking Event-B and Concurrent Object-Oriented Programs , 2008, Refine@FM.
[143] Donald Gotterbarn. E-voting: a failure of professionalism? , 2006, ACM SIGCSE Bull..
[144] Armin Eberlein,et al. Aspect-oriented requirements engineering for software product lines , 2003, 10th IEEE International Conference and Workshop on the Engineering of Computer-Based Systems, 2003. Proceedings..
[145] Daniel Richardson,et al. Better Voting Methods Through Technology: The Refinement-Manageability Trade-Off in the Single Transferable Vote , 2000 .
[146] Michael Poppleton. The Single Transferable Voting System: Functional Decomposition in Formal Specification , 1997, IWFM.
[147] Chin-Ling Chen,et al. The design of a secure anonymous Internet voting system , 2004, Comput. Secur..
[148] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[149] Giovanni Vigna,et al. Are your votes really counted?: testing the security of real-world electronic voting systems , 2008, ISSTA '08.
[150] Andrew Chi-Chih Yao,et al. Protocols for Secure Computations (Extended Abstract) , 1982, FOCS.
[151] Dermot Cochran,et al. Verification-Centric Realization of Electronic Vote Counting , 2007, EVT.
[152] Arto Salomaa,et al. Conducting secret ballot elections in computer networks: Problems and solutions , 1994, Ann. Oper. Res..
[153] Fabio Martinelli,et al. Mobile Implementation and Formal Verification of an e-Voting System , 2008, 2008 Third International Conference on Internet and Web Applications and Services.
[154] Bruce Schneier,et al. Insider risks in elections , 2004, CACM.
[155] Allison Druin,et al. The design of children's technology , 1998 .
[156] David C. Sharp. Component-based product line development of avionics software , 2000 .
[157] Rop Gonggrijp,et al. Studying the Nedap/Groenendaal ES3B Voting Computer: A Computer Security Perspective , 2007, EVT.
[158] J. Paul Gibson. Towards a Feature Interaction Algebra , 1998, FIW.
[159] Robert Krimmer. Electronic Voting 2006: 2nd International Workshop, Co-organized by Council of Europe, ESF TED, IFIP WG 8.6 and E-Voting.CC, August, 2nd - 4th, 2006 in Castle Hofen, Bregenz, Austria , 2006, Electronic Voting.
[160] Pavol Cerný,et al. Security Evaluation of ES&S Voting Machines and Election Management System , 2008, EVT.
[161] Berry Schoenmakers. Compensating for a lack of transparency , 2000, CFP '00.
[162] Scott A. Smolka,et al. Fundamental Results for the Verification of Observational Equivalence: A Survey , 1987, PSTV.
[163] Colin F. Snook,et al. Language and Tool Support for Class and State Machine Refinement in UML-B , 2009, FM.
[164] Thomas W. Lauer. The Risk of e-Voting , 2004 .
[165] Ann Macintosh,et al. Procedural Security and Social Acceptance in E-Voting , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.
[166] Aggelos Kiayias,et al. An Authentication and Ballot Layout Attack Against an Optical Scan Voting Terminal , 2007, EVT.
[167] Sylvia da Rosa. Designing Algorithms in High School Mathematics , 2004, TFM.
[168] Ronald Cramer,et al. A secure and optimally efficient multi-authority election scheme , 1997, Eur. Trans. Telecommun..
[169] Michael J. Fischer,et al. A robust and verifiable cryptographically secure election scheme , 1985, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985).
[170] Seymour Papert,et al. Mindstorms: Children, Computers, and Powerful Ideas , 1981 .
[171] Gordon Harvey,et al. Writing with Sources: A Guide for Students , 1998 .
[172] Jens Groth. Evaluating Security of Voting Schemes in the Universal Composability Framework , 2004, ACNS.
[173] Michael J. Butler,et al. Combining CSP and B for Specification and Property Verification , 2005, FM.
[174] Markus Jakobsson,et al. Coercion-resistant electronic elections , 2005, WPES '05.
[175] David Lorge Parnas,et al. On the Design and Development of Program Families , 2001, IEEE Transactions on Software Engineering.
[176] J. Paul Gibson. A noughts and crosses Java applet to teach programming to primary school children , 2003, PPPJ.
[177] Ken Robinson. Embedding Formal Development in Software Engineering , 2004, TFM.
[178] J. Paul Gibson,et al. Weaving a Formal Methods Education with Problem-Based Learning , 2008, ISoLA.
[179] L. Jean Camp,et al. The code of elections , 2004, CACM.
[180] Jim Buckley,et al. Preliminary Study to Empirically Investigate the Comprehensibility of Requirements Specifications , 2005, PPIG.
[181] Michael D. Byrne,et al. Usability of voting systems: baseline data for paper, punch cards, and lever machines , 2007, CHI.
[182] J. Paul Gibson,et al. Synthesis and analysis of automatic assessment methods in CS1: generating intelligent MCQs , 2005, SIGCSE.
[183] Dominique Cansell,et al. Refinement: A Constructive Approach to Formal Software Design for a Secure e-voting Interface , 2007, Electron. Notes Theor. Comput. Sci..
[184] Aggelos Kiayias,et al. Pre-Election Testing and Post-Election Audit of Optical Scan Voting Terminal Memory Cards , 2008, EVT.
[185] Robert Laurence Baber. The spine of software - designing provably correct software: theory and practice: or a mathematical introduction to the semantics of computer programs , 1986 .
[186] Rebecca T. Mercuri,et al. COTS and other electronic voting backdoors , 2006, CACM.
[187] Colin F. Snook,et al. UML-B: A Plug-in for the Event-B Tool Set , 2008, ABZ.
[188] Melanie Volkamer,et al. The Development of Remote E-Voting Around the World: A Review of Roads and Directions , 2007, VOTE-ID.
[189] O. Cetinkaya,et al. Verification and Validation Issues in Electronic Voting , 2007 .
[190] Geoff W. Hamilton. Composing fair objects , 2000 .
[191] William Stallings,et al. Data and Computer Communications , 1985 .
[192] Ryan W. Gardner,et al. On the Difficulty of Validating Voting Machine Software with Software , 2007, EVT.
[193] S.G. Decker,et al. Software Product Lines Beyond Software Development , 2007, 11th International Software Product Line Conference (SPLC 2007).
[194] Georgios Theodoropoulos,et al. e-Voting Requirements and Implementation , 2007, The 9th IEEE International Conference on E-Commerce Technology and The 4th IEEE International Conference on Enterprise Computing, E-Commerce and E-Services (CEC-EEE 2007).
[195] Eric Lallet,et al. How Do I Know If My Design Is Correct ? , 2008 .
[196] André Zúquete,et al. Verifiable anonymous vote submission , 2008, SAC '08.
[197] J. Paul Gibson,et al. Analysis of a Distributed e-Voting System Architecture against Quality of Service Requirements , 2008, 2008 The Third International Conference on Software Engineering Advances.
[198] Ben Riva,et al. Bare-Handed Electronic Voting with Pre-processing , 2007, EVT.
[199] C. Brainerd. Piaget's theory of intelligence , 1978 .
[200] Deepak Dhungana,et al. Integrated Variability Modeling of Features and Architecture in Software Product Line Engineering , 2006, 21st IEEE/ACM International Conference on Automated Software Engineering (ASE'06).
[201] Volha Bryl,et al. Evaluating Procedural Alternatives in an e-Voting Domain: Lesson Learned , 2007 .
[202] Ülle Madise,et al. E-voting in Estonia 2005. The first Practice of Country-wide binding Internet Voting in the World , 2006, Electronic Voting.
[203] Bernd Carsten Stahl,et al. Does Ontology Influence Technological Projects? The Case of Irish Electronic Voting , 2005, Wissensmanagement.
[204] Valtteri Niemi,et al. How to Prevent Buying of Votes in Computer Elections , 1994, ASIACRYPT.
[205] C. Neville Dean,et al. Teaching Formal Methods: CoLogNET/FME Symposium, TFM 2004, Ghent, Belgium, November 18-19, 2004. Proceedings (Lecture Notes in Computer Science) , 2004 .
[206] David A. Wagner,et al. Prerendered User Interfaces for Higher-Assurance Electronic Voting , 2006, EVT.
[207] Patrick Traynor,et al. Systemic Issues in the Hart InterCivic and Premier Voting Systems: Reflections on Project EVEREST , 2008, EVT.
[208] Jean-Marc Jézéquel,et al. Modélisation de lignes de produits en UML , 2003, Obj. Logiciel Base données Réseaux.
[209] Robert Balzer,et al. Principles of good software specification and their implications for specification languages , 1981, AFIPS '81.
[210] Radha Poovendran,et al. A framework and taxonomy for comparison of electronic voting schemes , 2006, Comput. Secur..
[211] Robert L. Nord,et al. Software Product Lines , 2004, Lecture Notes in Computer Science.
[212] John Paul Gibson. Formal Methods : Never Too Young to Start , 2008 .
[213] Dan S. Wallach,et al. The Case for Networked Remote Voting Precincts , 2008, EVT.
[214] Gilda Pour,et al. The push to make software engineering respectable , 2000, Computer.
[215] Michel Diaz,et al. Formal Description Technique Estelle: Results of the Esprit Sedos Project , 1989 .
[216] Dominique Cansell,et al. Formal verification of tamper-evident storage for e-voting , 2007, Fifth IEEE International Conference on Software Engineering and Formal Methods (SEFM 2007).
[217] C. Andrew Neff,et al. A verifiable secret shuffle and its application to e-voting , 2001, CCS '01.
[218] Ronald L. Rivest,et al. Scratch & vote: self-contained paper-based cryptographic voting , 2006, WPES '06.