References 1. A. Rubin. Security Considerations for Remote Electronic Voting, Communications of the ACM (December, 2002). 2. A. Fujioka, T. Okamoto, and K. Ohta, "A practical secret voting scheme for large scale election", Advances in Cryptology -- Auscrypt'92, LNCS Vol.718, pages 244--260, Springer-Verlag, 1992 3. D. Chaum. Secret-Ballot Receipts and Transparent Integrity. 12/03. 4. R. Mercuri. “A Better Ballot Box?” IEEE Spectrum. October 2002. 5. Statement on Verifying the Vote and Auditing Elections, MIT/Caltech VTP Feb. 10, 2004 6. D. Chaum. Elections with unconditionally-secret ballots and disruption equivalent to breaking RSA. In Advances in Cryptology - EUROCRYPT '88 (Berlin, 1988), C. G. Gunther, Ed., vol. 330 of Lecture Notesin Computer Science, Springer-Verlag, pp. 177-182. 7. J. Cohen and M. Fischer, A Robust and Verifiable Cryptographically Secure Election Scheme., Proc. 26th IEEE Symp. on Foundations of Computer Science, Portland, OR (Oct. 1985), 372-382 8. Mark A. Herschberg. Secure Electronic Voting Using the World Wide Web, Master's Thesis,Massachusetts Institute of Technology, June 1997. MIT Voting Technology, Rachel Greenstadt compiled part of this list of references.