1. Adida, B., Neff, C.: Ballot casting assurance. In: USENIX/Accurate Electronic Voting Technology Workshop, p. 7. USENIX Association, Berkeley (2006)
2. Volkamer, M., Schryen, G., Langer, L., Schmidt, A., Buchmann, J.: Elektronische Wahlen: Verifizierung vs. Zertifizierung. In: GI Jahrestagung, pp. 1827–1836 (2009)
3. Common criteria for information technology security evaluation, and common methodology for information technology security evaluation, version 3.1 (2006)
4. Volkamer, M., Vogt, R.: Common criteria protection profile for basic set of security requirements for online voting products. BSI-CC-PP-0037, Version 1.0 (April 18, 2008),
https://www.bsi.bund.de/SharedDocs/Zertifikate/PP/aktuell/PP_0037.html
(May 02, 2013)
5. Mantel, H., Stephan, W., Ullmann, M., Vogt, R.: Guideline for the development and evaluation of formal security policy models in the scope of itsec and common criteria. BSI, DFKI, Tech. Rep. (2004)