B#: Toward a Synthesis between Z and B, 3nd International Conference of B and Z Users -ZB 2003, 2003. ,
DOI : 10.1007/3-540-44880-2_12
Click???n Prove: Interactive Proofs within Set Theory, 16th Intl. Conf. Theorem Proving in Higher Order Logics (TPHOLs'2003), pp.1-24, 2003. ,
DOI : 10.1007/10930755_1
URL : https://hal.archives-ouvertes.fr/inria-00099836
Who Is Enfranchised by Remote Voting?, 29th Annual International Computer Software and Applications Conference (COMPSAC'05), 2005. ,
DOI : 10.1109/COMPSAC.2005.170
Formal methods technology-transfer: a view from NASA, Proceedings of the ERCIM Workshop on Formal Methods for Industrial Critical Systems, 1996. ,
Refinement: A Constructive Approach to Formal Software Design for a Secure e-voting Interface, Proceedings, International Workshop on Formal Methods for Interactive Systems (FMIS), 2006. ,
DOI : 10.1016/j.entcs.2007.01.060
URL : https://hal.archives-ouvertes.fr/inria-00594892
Aix-en-Provence (France), B4FREE, 2004. ,
Fundamentals of software engineering, 1991. ,
Early Appraisals of Electronic Voting, Social Science Computer Review, vol.23, issue.3, pp.274-292, 2005. ,
DOI : 10.1177/0894439305275850
Perceived usefulness, personal experiences, risk perception and trust as determinants of adoption of e-government services in The Netherlands, Computers in Human Behavior, vol.23, issue.4, pp.1838-1852, 2007. ,
DOI : 10.1016/j.chb.2005.11.003
Formal requirements engineering: learning from the students, Proceedings 2000 Australian Software Engineering Conference, pp.171-180, 2000. ,
DOI : 10.1109/ASWEC.2000.844574
Insider risks in elections, Communications of the ACM, vol.47, issue.7, p.104, 2004. ,
DOI : 10.1145/1005817.1005846
Analysis of an electronic voting system, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, pp.27-40, 2004. ,
DOI : 10.1109/SECPRI.2004.1301313
E-Voting: A Safety Critical System, 2003. ,
Transparency and e-Voting: Democratic vs. Commercial Interests, Electronic Voting in Europe -Technology, Law, Politics and Society, pp.153-163, 2004. ,
Design for verification -using design patterns to build reliable systems, Proceedings of 6th ICSE workshop on component based software engineering, 2003. ,
Computer security: quality rather than quantity, Communications of the ACM, vol.45, issue.10, pp.11-14, 2002. ,
DOI : 10.1145/570907.570917
Tamperevident , history-independent, subliminal-free data structures on PROM storage ?or? how to store ballots on a voting machine, SP '06: Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P'06), pp.365-370, 2006. ,
Inside risks: risks in computerized elections, Communications of the ACM, vol.33, issue.11, p.170, 1990. ,
DOI : 10.1145/92755.92787
IT research, innovation, and e-government, Communications of the ACM, vol.46, issue.1, pp.67-68, 2003. ,
DOI : 10.1145/602421.602455
Data and computer communications, 1985. ,
E-voting in europe: Divergent democratic practice, Information Polity, vol.8, issue.1, pp.3-15, 2003. ,
Better voting methods through technology: The refinement-manageability trade-off in the single transferable vote, Public Choice, vol.103, issue.1/2, pp.13-34, 2000. ,
DOI : 10.1023/A:1005082925477