1. Adida, B., de Marneffe, O., Pereira, O., Quisquater, J.: Electing a university president using open-audit voting: analysis of real-world use of Helios. In: 2009 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections, EVT/WOTE 2009. USENIX Association (2009)
2. Bellare, M., Goldwasser, S.: Verifiable partial key escrow. In: Proceedings of the 4th ACM Conference on Computer and Communications Security, CCS 1997, pp. 78–91. ACM (1997)
3. Benaloh, J., et al.: Star-vote: a secure, transparent, auditable, and reliable voting system. In: 2013 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections, EVT/WOTE 2013. USENIX Association (2013)
4. Benaloh, J., Foote, K., Stark, P.B., Teague, V., Wallach, D.S.: VAULT-style risk-limiting audits and the Inyo county pilot. IEEE Secur. Priv. 19(4), 8–18 (2021)
5. Benaloh, J.C., Yung, M.: Distributing the power of a government to enhance the privacy of voters (extended abstract). In: Proceedings of the 5th Annual ACM Symposium on Principles of Distributed Computing, pp. 52–62. ACM (1986)