References
- R. Mercuri, "A Better Ballot Box?" IEEE Spectrum Online, 2002, pp. 46-50.
- M. Abe, "Mix-Networks on Permutation Networks," Proc. of Asiacrypt, LNCS 1716, 1999, pp. 258-273.
- M. Ohkubo et al., "An Improvement on a Practical Secret Voting Scheme," Proc. Int. Workshop Info. Security, 1999, pp. 225-234.
- D. Chaum, "Secret-Ballot Receipts: True Voter-Verifiable Elections," IEEE Security Privacy., vol. 2, no. 1, 2004, pp. 38-47.
- M. Naor and A. Shamir, "Visual Cryptography," Proc. Adv. Cryptology (Eurocrypt), LNCS 950, 1995, pp. 1-12.
- T.E. Carroll and D. Grosu, "A Secure and Efficient Voter- Controlled Anonymous Election Scheme," Proc. ITCC, 2005, pp. 721-726.
- A.C. Neff and J. Adler, "Verifiable e-Voting: Indisputable Electronic Elections at Polling Places," VoteHere Inc., 2003. Available: http://votehere.com/vhti/documentation/VH\_VHTi\_White Paper.pdf
- A.C. Neff, "Practical High Certainty Intent Verification for Encrypted Votes." VoteHere Inc., 2004. Availble: http://votehere.com/vhti/documentation/vsv-2.0.3638.pdf
- B. Adida and A.C. Neff, "Ballot Casting Assurance," Proc. Electron. Voting Technol. Workshop, USENIX, Aug. 2006.
- D. Chaum, P.Y.A. Ryan, and S. Schneider, "A Practical Voter- Verifiable Election Scheme," Proc. 10th Euro. Symp. Research Comput. Security, LNCS 3679, 2005, pp. 118-139.
- P.Y.A. Ryan and T. Peacock, "Prét à Voter: A Systems Perspective," Technical Report CS-TR:929, School of Computing Science, Newcastle University, 2005.
- Ben Adida, "Helios: Web-Based Open Audit Voting," Proc. 14th USENIX Security Symp., USENIX, 2008.
- R.L. Rivest and W.D. Smith, "Three Voting Protocols: ThreeBallot, VAV, and Twin," Proc. USENIX Workshop Accurate Electron. Voting Technol., 2007. Available: http://www.usenix.org/events/evt07/tech/
- M.R. Clarkson, S. Chong, and A.C. Myers, "Civitas: Toward a Secure Voting System," IEEE Symp. Security Privacy, 2008, pp. 354-368.
- D.R. Sandler, K. Derr, and D.S. Wallach, "VoteBox: A Tamper- Evident, Verifiable Electronic Voting System," Proc. 17th USENIX Security Symp., 2008.
- S. Popoveniuc, "SpeakUp: Remote Unsupervised Voting," Industrial Track ACNS, 2010.
- D. Chaum et al., "Scantegrity: End-to-End Voter-Verifiable Optical-Scan Voting," IEEE Security Privacy, vol. 6, no. 3, 2008, pp. 40-46.
- S. Popoveniuc and B. Hosp, "An Introduction to PunchScan," Proc. IAVoSS Workshop Trustworthy Elections, Cambridge, UK, 2006, pp. 27-34.
- Y. Lee et al., "Towards Trustworthy e-Voting Using Paper Receipts Original Research Article," Comput. Standards Interfaces, vol. 32, no. 5-6, 2010, pp. 305-311.
- Y. Lee et al., "Efficient Voter Verifiable E-Voting Schemes with Cryptographic Receipts," Proc. IAVoSS Workshop Trustworthy Elections, Cambridge, UK, 2006, pp. 145-152.
- M. Jakobsson, "A Practical Mix," Proc. Adv. Cryptology (Eurocrypt), LNCS 1403, 1998, pp. 448-461.
- M. Jakobsson and A. Juels, "Millimix: Mixing in Small Batches," DIMACS Technical Report 99-33, 1999.
- M. Jakobsson, A. Juels, and R.L. Rivest, "Making Mix Nets Robust for Electronic Voting by Randomized Partial Checking," Proc. 11th USENIX Security Symp., 2002, pp. 339-353.
- S. Popoveniuc et al., "Performance Requirements for End-to-End Verifiable Elections," Proc. IAVoSS Workshop Trustworthy Elections, Washington, USA, 2010.
- T. ElGamal, "A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms," IEEE Trans. Info. Theory, vol. IT-31, no. 4, 1985, pp. 469-472.
- L. Blum, M. Blum, and M. Shub, "A Simple Unpredictable Pseudo-Ramdom Number Generator," SIAM J. Comput., vol. 15, no. 2, 1986, pp. 364-383.
- J. Kelsey et al., "Attacking Paper-Based E2E Voting Systems," Towards Trustworthy Elections, LNCS 6000, 2010, pp. 370-387.