R. Richmond, Facebook Tests the Power of, Democracy, 2009.

K. Design and . Inc, Facebook Poll http

B. Stelter, Facebook's Users Ask Who Owns Information, 2009.

M. Castro and B. Liskov, Practical byzantine fault tolerance and proactive recovery, ACM Transactions on Computer Systems, vol.20, issue.4, pp.398-461, 2002.
DOI : 10.1145/571637.571640

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.84.6725

H. Yu, P. Gibbons, M. Kaminsky, and F. Xiao, SybilLimit: A Near-Optimal Social Network Defense Against Sybil Attacks, IEEE/ACM Transactions on Networking, vol.18, issue.3, pp.3-17, 2008.
DOI : 10.1109/TNET.2009.2034047

C. Delporte-gallet, H. Fauconnier, R. Guerraoui, and E. Ruppert, Secretive Birds: Privacy in Population Protocols, In: OPODIS, pp.329-342, 2007.
DOI : 10.1007/978-3-540-77096-1_24

URL : https://hal.archives-ouvertes.fr/hal-00175536

R. Rivest and W. Smith, Three Vvoting Protocols: ThreeBallot, VAV, and twin, In: EVT, p.16, 2007.

R. Rivest, A. Shamir, and Y. Tauman, How to Share a Secret, CACM, vol.22, pp.612-613, 1979.

J. Benaloh, Secret Sharing Homomorphisms: Keeping Shares of a Secret Secret, In: CRYPTO, pp.251-260, 1986.

T. Rabin and M. Ben-or, Verifiable secret sharing and multiparty protocols with honest majority, Proceedings of the twenty-first annual ACM symposium on Theory of computing , STOC '89, pp.73-85, 1989.
DOI : 10.1145/73007.73014

D. Malkhi and E. Pavlov, Anonymity without ???Cryptography???, In: FC, pp.108-126, 2001.
DOI : 10.1007/3-540-46088-8_12

D. Malkhi, O. Margo, and E. Pavlov, E-voting without ???Cryptography???, In: FC, pp.1-15, 2002.
DOI : 10.1007/3-540-36504-4_1

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.12.3841