1. Adida, B., Neff, C.A.: Ballot casting assurance. Proc. Electron. Voting Technol. Workshop (EVT) 6, 7 (2006)
2. Benaloh, J.: Simple verifiable elections. EVT 6, 1–10 (2006)
3. Bernhard, M., et al.: Can voters detect malicious manipulation of ballot marking devices? In: 2020 IEEE Symposium on Security and Privacy (SP), pp. 679–694. IEEE (2020)
4. Lecture Notes in Computer Science;D Bernhard,2012
5. Benaloh, J., Tuinstra, D.: Receipt-free secret-ballot elections. In: Proceedings of the Twenty-Sixth Annual ACM Symposium on Theory of Computing, pp. 544–553 (1994)