1. Adida, B.: Helios: Web-based Open-Audit Voting. In: USENIX Security Symposium, pp. 335–348 (2008)
2. Adida, B., de Marneffe, O., Pereira, O., Quisquater, J.J.: Electing a University President using Open-Audit Voting: Analysis of real-world use of Helios. In: 2009 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections (EVT/WOTE 2009) (Online proceedings) (2009)
3. Arrow, K.J.: Social Choice and Individual Values, 2nd edn. Yale University Press, New Haven (1963)
4. Balzarotti, D., Banks, G., Cova, M., Felmetsger, V., Kemmerer, R., Robertson, W., Valeur, F., Vigna, G.: Are your votes really counted?: testing the security of real-world electronic voting systems. In: Proceedings of the 2008 International Symposium on Software Testing and Analysis, pp. 237–248. ACM (2008)
5. Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: Proceedings of the 1st ACM Conference on Computer and Communications Security, pp. 62–73. ACM (1993)