1. A. Kiayias, M. K. (2006). An internet voting system supporting user privacy. in Proceedings - Annual Computer Security Applications Conference, ACSAC, 2006, pp. 165–174. .
2. Academy, L. (2019). Cryptography. Retrieved 09 Monday, 2019, from www.lisk.io/academy: https://lisk.io/academy/blockchain-basics/how-does-blockchain-work/blockchain-cryptography-explained
3. Alia M, S. A. (2007). A New Public-Key Cryptosystem Based on Mandelbrot and Julia Fractal Sets. Asian Journal of Information Technology, AJIT, 6(5), pp. 567-575.
4. Ayed, A. B. (May, 2017). A CONCEPTUAL SECURE BLOCKCHAIN- BASED ELECTRONIC VOTING SYSTEM. International Journal of Network Security & Its Applications (IJNSA) Vol.9, No.3.
5. Bagnoli, L. (2017, 10 13). E-VOTING or E-RIGGING? Why technology cannot not solve Kenya’s corruption problem. Retrieved 09 23, 2019, from www.theelephant.info: https://www.theelephant.info/features/2017/10/13/e-voting-or-e-rigging-why-technology-cannot-not-solve-kenyas-corruption-problem/