Facebook Tests the Power of, Democracy, 2009. ,
Facebook Poll http ,
Facebook's Users Ask Who Owns Information, 2009. ,
Practical byzantine fault tolerance and proactive recovery, ACM Transactions on Computer Systems, vol.20, issue.4, pp.398-461, 2002. ,
DOI : 10.1145/571637.571640
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.84.6725
SybilLimit: A Near-Optimal Social Network Defense Against Sybil Attacks, IEEE/ACM Transactions on Networking, vol.18, issue.3, pp.3-17, 2008. ,
DOI : 10.1109/TNET.2009.2034047
Secretive Birds: Privacy in Population Protocols, In: OPODIS, pp.329-342, 2007. ,
DOI : 10.1007/978-3-540-77096-1_24
URL : https://hal.archives-ouvertes.fr/hal-00175536
Three Vvoting Protocols: ThreeBallot, VAV, and twin, In: EVT, p.16, 2007. ,
How to Share a Secret, CACM, vol.22, pp.612-613, 1979. ,
Secret Sharing Homomorphisms: Keeping Shares of a Secret Secret, In: CRYPTO, pp.251-260, 1986. ,
Verifiable secret sharing and multiparty protocols with honest majority, Proceedings of the twenty-first annual ACM symposium on Theory of computing , STOC '89, pp.73-85, 1989. ,
DOI : 10.1145/73007.73014
Anonymity without ???Cryptography???, In: FC, pp.108-126, 2001. ,
DOI : 10.1007/3-540-46088-8_12
E-voting without ???Cryptography???, In: FC, pp.1-15, 2002. ,
DOI : 10.1007/3-540-36504-4_1
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.12.3841