1. Lecture Notes in Computer Science;K. Ables,2010
2. Alkassar, A., Sadeghi, A.R., Schultz, S., Volkamer, M.: Towards Trustworthy Online Voting. In: Proceedings WISSec 2006 (2006)
3. Arbaugh, W.A.: The Real Risk of Digital Voting? Computer 37(12), 124–125 (2004)
4. Balfe, S., Lakhani, A.D., Paterson, K.G.: Trusted Computing: Providing Security for Peer-to-Peer Networks. In: Proceedings of Fifth IEEE Conference on Peer-to-Peer Computing, pp. 117–124. IEEE, Los Alamitos (2005)
5. Benaloh, J., Tuinstra, D.: Receipt-Free Secret-Ballot Elections (Extended Abstract). In: Proceedings of 26th ACM Symposium on the Theory of Computing, pp. 544–553. ACM, Montreal (1994)