<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1405-5546</journal-id>
<journal-title><![CDATA[Computación y Sistemas]]></journal-title>
<abbrev-journal-title><![CDATA[Comp. y Sist.]]></abbrev-journal-title>
<issn>1405-5546</issn>
<publisher>
<publisher-name><![CDATA[Instituto Politécnico Nacional, Centro de Investigación en Computación]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1405-55462012000100005</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[Secure Architectures for a Three-Stage Polling Place Electronic Voting System]]></article-title>
<article-title xml:lang="es"><![CDATA[Arquitecturas de seguridad para un sistema de voto electrónico presencial de tres etapas]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Figueroa González]]></surname>
<given-names><![CDATA[Josué]]></given-names>
</name>
<xref ref-type="aff" rid="A01"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[González Brambila]]></surname>
<given-names><![CDATA[Silvia B]]></given-names>
</name>
<xref ref-type="aff" rid="A01"/>
</contrib>
</contrib-group>
<aff id="A01">
<institution><![CDATA[,Universidad Autónoma Metropolitana Departamento de Sistemas ]]></institution>
<addr-line><![CDATA[México DF]]></addr-line>
<country>México</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>03</month>
<year>2012</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>03</month>
<year>2012</year>
</pub-date>
<volume>16</volume>
<numero>1</numero>
<fpage>43</fpage>
<lpage>52</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S1405-55462012000100005&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S1405-55462012000100005&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S1405-55462012000100005&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[Security on electronic voting systems is fundamental; it must assure the integrity of all the elements involved or generated during a voting process. This paper presents a design of secure architectures for providing security, integrity and authenticity of the most important elements involved in an electoral process: configuration files, recorded votes and final result files. Also, different cryptographic protocols for assuring security properties of configuration and final result files are presented as a part of one of the layers of the architectures. We consider a polling place electronic voting system composed by three stages and the use of three different systems during the whole process. Our analysis of architectures and protocols shows that the designed elements assure the secure properties which an electronic voting system must fulfill.]]></p></abstract>
<abstract abstract-type="short" xml:lang="es"><p><![CDATA[La seguridad en los sistemas de voto electrónico es fundamental, esta debe asegurar la integridad de todos los elementos involucrados o generados durante el proceso de votación. Este trabajo muestra la creación de arquitecturas de seguridad para satisfacer la seguridad, integridad y autenticidad de los elementos más importantes involucrados en un proceso electoral: archivos de configuración, votos almacenados y archivo de resultados finales. Adicionalmente, como parte de una de las capas de las arquitecturas, se desarrollaron diferentes protocolos criptográficos que aseguran las propiedades de seguridad de los archivos de configuración y de resultados finales. Se considera un sistema de voto electrónico presencial formado por tres etapas y el uso de tres diferentes equipos durante todo el proceso. El análisis de las arquitecturas y de los protocolos muestra que los elementos diseñados aseguran las propiedades de seguridad que un sistema de voto electrónico debe satisfacer.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[Cryptographic protocol]]></kwd>
<kwd lng="en"><![CDATA[electronic voting]]></kwd>
<kwd lng="en"><![CDATA[integrity]]></kwd>
<kwd lng="en"><![CDATA[secure architecture]]></kwd>
<kwd lng="en"><![CDATA[security]]></kwd>
<kwd lng="es"><![CDATA[Protocolo criptográfico]]></kwd>
<kwd lng="es"><![CDATA[voto electrónico]]></kwd>
<kwd lng="es"><![CDATA[integridad]]></kwd>
<kwd lng="es"><![CDATA[arquitectura de seguridad]]></kwd>
<kwd lng="es"><![CDATA[seguridad]]></kwd>
</kwd-group>
</article-meta>
</front><body><![CDATA[  	    <p align="justify"><font face="verdana" size="4">Art&iacute;culos</font></p>  	    <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>  	    <p align="center"><font face="verdana" size="4"><b>Secure Architectures for a Three&#150;Stage Polling Place Electronic Voting System</b></font></p>  	    <p align="center"><font face="verdana" size="2">&nbsp;</font></p>  	    <p align="center"><font face="verdana" size="3"><b>Arquitecturas de seguridad para un sistema de voto electr&oacute;nico presencial de tres etapas</b></font></p>  	    <p align="center"><font face="verdana" size="2">&nbsp;</font></p>  	    <p align="center"><font face="verdana" size="2"><b>Josu&eacute; Figueroa Gonz&aacute;lez and Silvia B. Gonz&aacute;lez Brambila</b></font></p>  	    <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>  	    <p align="justify"><font face="verdana" size="2">Departamento de Sistemas, Universidad Aut&oacute;noma Metropolitana, Azcapotzalco, M&eacute;xico DF, M&eacute;xico. Correo: <a href="mailto:josue.figueroa@gmail.com">josue.figueroa@gmail.com</a>, <a href="mailto:sgb@correo.azc.uam.mx">sgb@correo.azc.uam.mx</a></font></p>      ]]></body>
<body><![CDATA[<p align="justify"><font face="verdana" size="2">&nbsp;</font></p>  	    <p align="justify"><font face="verdana" size="2">Article received on 17/11/2010.    <br> 	Accepted on 29/09/2011.</font></p>  	    <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>  	    <p align="justify"><font face="verdana" size="2"><b>Abstract</b></font></p>  	    <p align="justify"><font face="verdana" size="2">Security on electronic voting systems is fundamental; it must assure the integrity of all the elements involved or generated during a voting process. This paper presents a design of secure architectures for providing security, integrity and authenticity of the most important elements involved in an electoral process: configuration files, recorded votes and final result files. Also, different cryptographic protocols for assuring security properties of configuration and final result files are presented as a part of one of the layers of the architectures. We consider a polling place electronic voting system composed by three stages and the use of three different systems during the whole process. Our analysis of architectures and protocols shows that the designed elements assure the secure properties which an electronic voting system must fulfill.</font></p>  	    <p align="justify"><font face="verdana" size="2"><b>Keywords:</b> Cryptographic protocol, electronic voting, integrity, secure architecture, security.</font></p>  	    <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>  	    <p align="justify"><font face="verdana" size="2"><b>Resumen</b></font></p>  	    <p align="justify"><font face="verdana" size="2">La seguridad en los sistemas de voto electr&oacute;nico es fundamental, esta debe asegurar la integridad de todos los elementos involucrados o generados durante el proceso de votaci&oacute;n. Este trabajo muestra la creaci&oacute;n de arquitecturas de seguridad para satisfacer la seguridad, integridad y autenticidad de los elementos m&aacute;s importantes involucrados en un proceso electoral: archivos de configuraci&oacute;n, votos almacenados y archivo de resultados finales. Adicionalmente, como parte de una de las capas de las arquitecturas, se desarrollaron diferentes protocolos criptogr&aacute;ficos que aseguran las propiedades de seguridad de los archivos de configuraci&oacute;n y de resultados finales. Se considera un sistema de voto electr&oacute;nico presencial formado por tres etapas y el uso de tres diferentes equipos durante todo el proceso. El an&aacute;lisis de las arquitecturas y de los protocolos muestra que los elementos dise&ntilde;ados aseguran las propiedades de seguridad que un sistema de voto electr&oacute;nico debe satisfacer.</font></p>  	    ]]></body>
<body><![CDATA[<p align="justify"><font face="verdana" size="2"><b>Palabras clave:</b> Protocolo criptogr&aacute;fico, voto electr&oacute;nico, integridad, arquitectura de seguridad, seguridad.</font></p>  	    <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>  	    <p align="justify"><font face="verdana" size="2"><a href="/pdf/cys/v16n1/v16n1a5.pdf" target="_blank">DESCARGAR ART&Iacute;CULO EN FORMATO PDF</a></font></p>  	    <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>  	    <p align="justify"><font face="verdana" size="2"><b>References</b></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2"><b>1. Clausen, D., Puryear, D., &amp; Rodriguez, A. (2000).</b> <i>Secure voting using disconnected distributed polling devices.</i> Palo Alto. CA: Standford university.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2055561&pid=S1405-5546201200010000500001&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2"><b>2. Cranor, L.F. &amp; Cytron, R.K. (1997).</b> A security&#150;conscious electronic polling system for the Internet. <i>Thirtieth Hawaii International Conference on System Sciences.</i> Wailea, HI, uSA, 3, 561&#150;570.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2055563&pid=S1405-5546201200010000500002&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2"><b>3. Garc&iacute;a, L., Morales, G., &amp; Gonz&aacute;lez, S.B. (2005).</b> Implementaci&oacute;n del algoritmo RSA para su uso en el voto electr&oacute;nico. <i>Simposio acerca de las urnas electr&oacute;nicas para la emisi&oacute;n del voto ciudadano,</i> M&eacute;xico, D.F, 59&#150;69.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2055565&pid=S1405-5546201200010000500003&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2"><b>4. Kohno, T., Stubblefield, A., Rubin, A.D., &amp; Wallach, D.S. (2004).</b> Analysis of an electronic voting system. 2004 <i>IEEE Symposium on Security and privacy.</i> Berkeley, CA., uSA, 27&#150;40.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2055567&pid=S1405-5546201200010000500004&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2"><b>5. Liaw, H.T. (2004).</b> A secure electronic voting protocol for general elections, <i>Computers &amp; Security.</i> 23(2), 107&#150;119.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2055569&pid=S1405-5546201200010000500005&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2"><b>6. Probst, S., Essmayr, W., &amp; Weippl, E. (2002).</b> Reusable Components for Developing Security&#150;Aware Applications. <i>18th Annual Computer Security Applications Conference,</i> Las Vegas, Nevada, uSA, 239&#150;248.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2055571&pid=S1405-5546201200010000500006&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2"><b>7. Rivest, R.L.</b> Electronic Voting, Retrieved from <a href="http://people.csail.mit.edu/rivest/Rivest-ElectronicVoting.pdf" target="_blank">http://theory.lcs.mit.edu/&#126;rivest/Rivest&#150;ElectronicVoting.pdf</a>.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2055573&pid=S1405-5546201200010000500007&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2"><b>8. Saltman, R.G. (2003).</b> Auditability of non&#150;ballot, poll&#150;site voting systems. Retrieved from <a href="http://vote.nist.gov/pospapers/Saltman-AuditabilityofDREs%28Revised%292003.pdf" target="_blank">http://vote.nist.gov/pospapers/Saltman&#150;AuditabilityofDREs%28Revised%292003.pdf</a>.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2055575&pid=S1405-5546201200010000500008&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2"><b>9. Selker, T. &amp; Goler, J. (2004).</b> The SAVE System: Secure Architecture for Voting Electronically, <i>BT Technology Journal,</i> 22(4), 89&#150;95.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2055577&pid=S1405-5546201200010000500009&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2"><b>10. Thomas, N. (2005).</b> Performability of a secure electronic voting algorithm. <i>Electronic Notes in Theoretical Computer Science,</i> 128(4), 45&#150;58.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2055579&pid=S1405-5546201200010000500010&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2"><b>11. Voting Technology Project (2004).</b> <i>Insuring the integrity of the electoral process: recommendations for consistent and complete reporting of election data.</i> Pasadena, CA, Caltech/MIT.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2055581&pid=S1405-5546201200010000500011&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2"><b>12. Williams, B.J. &amp; King, M.S. (2004).</b> Implementing voting systems: the Georgia method, <i>Communications of the ACM,</i> 47(10), 39&#150;42.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2055583&pid=S1405-5546201200010000500012&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>      ]]></body><back>
<ref-list>
<ref id="B1">
<label>1</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Clausen]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Puryear]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Rodriguez]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Secure voting using disconnected distributed polling devices]]></source>
<year>2000</year>
<publisher-loc><![CDATA[Palo Alto^eCA CA]]></publisher-loc>
<publisher-name><![CDATA[Standford university]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B2">
<label>2</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cranor]]></surname>
<given-names><![CDATA[L.F.]]></given-names>
</name>
<name>
<surname><![CDATA[Cytron]]></surname>
<given-names><![CDATA[R.K.]]></given-names>
</name>
</person-group>
<source><![CDATA[A security-conscious electronic polling system for the Internet]]></source>
<year>1997</year>
<conf-name><![CDATA[Thirtieth Hawaii International Conference on System Sciences]]></conf-name>
<conf-loc>Wailea HI</conf-loc>
<page-range>561-570</page-range></nlm-citation>
</ref>
<ref id="B3">
<label>3</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[García]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Morales]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[González]]></surname>
<given-names><![CDATA[S.B.]]></given-names>
</name>
</person-group>
<source><![CDATA[Implementación del algoritmo RSA para su uso en el voto electrónico]]></source>
<year>2005</year>
<conf-name><![CDATA[ Simposio acerca de las urnas electrónicas para la emisión del voto ciudadano,]]></conf-name>
<conf-loc>México D.F</conf-loc>
<page-range>59-69</page-range></nlm-citation>
</ref>
<ref id="B4">
<label>4</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kohno]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Stubblefield]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Rubin]]></surname>
<given-names><![CDATA[A.D.]]></given-names>
</name>
<name>
<surname><![CDATA[Wallach]]></surname>
<given-names><![CDATA[D.S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Analysis of an electronic voting system]]></source>
<year>2004</year>
<conf-name><![CDATA[ IEEE Symposium on Security and privacy]]></conf-name>
<conf-date>2004</conf-date>
<conf-loc>Berkeley CA</conf-loc>
<page-range>27-40</page-range></nlm-citation>
</ref>
<ref id="B5">
<label>5</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Liaw]]></surname>
<given-names><![CDATA[H.T.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[A secure electronic voting protocol for general elections]]></article-title>
<source><![CDATA[Computers & Security]]></source>
<year>2004</year>
<volume>23</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>107-119</page-range></nlm-citation>
</ref>
<ref id="B6">
<label>6</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Probst]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Essmayr]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Weippl]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<source><![CDATA[Reusable Components for Developing Security-Aware Applications]]></source>
<year>2002</year>
<conf-name><![CDATA[18 Annual Computer Security Applications Conference]]></conf-name>
<conf-loc>Las Vegas Nevada</conf-loc>
<page-range>239-248</page-range></nlm-citation>
</ref>
<ref id="B7">
<label>7</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rivest]]></surname>
<given-names><![CDATA[R.L.]]></given-names>
</name>
</person-group>
<source><![CDATA[Electronic Voting]]></source>
<year></year>
</nlm-citation>
</ref>
<ref id="B8">
<label>8</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Saltman]]></surname>
<given-names><![CDATA[R.G.]]></given-names>
</name>
</person-group>
<source><![CDATA[Auditability of non-ballot, poll-site voting systems]]></source>
<year>2003</year>
</nlm-citation>
</ref>
<ref id="B9">
<label>9</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Selker]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
<name>
<surname><![CDATA[Goler]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[The SAVE System: Secure Architecture for Voting Electronically]]></article-title>
<source><![CDATA[BT Technology Journal]]></source>
<year>2004</year>
<volume>22</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>89-95</page-range></nlm-citation>
</ref>
<ref id="B10">
<label>10</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Thomas]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Performability of a secure electronic voting algorithm]]></article-title>
<source><![CDATA[Electronic Notes in Theoretical Computer Science]]></source>
<year>2005</year>
<volume>128</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>45-58</page-range></nlm-citation>
</ref>
<ref id="B11">
<label>11</label><nlm-citation citation-type="book">
<collab>Voting Technology Project</collab>
<source><![CDATA[Insuring the integrity of the electoral process: recommendations for consistent and complete reporting of election data]]></source>
<year>2004</year>
<publisher-loc><![CDATA[Pasadena^eCA CA]]></publisher-loc>
<publisher-name><![CDATA[CaltechMIT]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B12">
<label>12</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Williams]]></surname>
<given-names><![CDATA[B.J.]]></given-names>
</name>
<name>
<surname><![CDATA[King]]></surname>
<given-names><![CDATA[M.S.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Implementing voting systems: the Georgia method]]></article-title>
<source><![CDATA[Communications of the ACM]]></source>
<year>2004</year>
<volume>47</volume>
<numero>10</numero>
<issue>10</issue>
<page-range>39-42</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
