Verifiable Voting Systems [chapter]

Thea Peacock, Peter Y.A. Ryan, Steve Schneider, Zhe Xia
2013 Computer and Information Security Handbook  
doi:10.1016/b978-0-12-394397-2.00069-6 fatcat:zkeycuez2ndvhkz5esjsenv74q