1. M. Atallah, M. Blanton, Techniques for Secure and Reliable Computational Outsourcing, Technical Report, DTIC Document, 2013.
2. Benaloh, J., 1994. In: Proceedings of the Workshop on Selected Areas of Cryptography, pp. 120–128.
3. Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing;Ben-Or,1988
4. Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing;Chaum,1988