Johnston, Roger G.; Jon S. Warner (July 31, 2012). "How to Choose and Use Seals". Army Sustainment. Retrieved May 4, 2018.
arxiv.org
Benaloh; et al. (2017). "Public Evidence from Secret Ballots". Proceedings of the Second International Conference on Electronic Voting. Cham, Switzerland. p. 122. arXiv:1707.08619. ISBN9783319686875. OCLC1006721597.
Lindeman, Mark; Bretschneider, Jennie; Flaherty, Sean; Goodman, Susannah; Halvorson, Mark; Johnston, Roger; Rivest, Ronald L.; Smith, Pam; Stark, Philip B. (October 1, 2012). "Risk-Limiting Post-Election Audits: Why and How"(PDF). University of California at Berkeley. pp. 3, 16. Retrieved April 9, 2018.
"With the new digital procedure, staff will be able to fix whatever race couldn’t be counted, instead of duplicating a voter’s entire ballot." White, Rebecca (2019-11-18). "One Washington County Plans to Speed Vote Counting with Tech". Government Technology. Retrieved 2020-05-17.
Organisation for Security and Cooperation in Europe (OSCE) policy calls for independent foreign officials to sleep with ballots, and allows parties to do so:
"observers from both political parties there... ballots have to be recreated in every election for a number of reasons, ranging from damaged mail-in ballots, to early voters who use pencils which can’t be read by ballot tabulators." Jordan, Ben (2018-11-07). "MKE Election Commission responds to criticism". WTMJ TV Milwaukee. Retrieved 2020-05-17.
Antonyan, Tigran; et al. (2013-06-21). "Computer Assisted Post Election Audits"(PDF). State Certification Testing of Voting Systems National Conference – via University of Connecticut.
Benaloh; et al. (2017). "Public Evidence from Secret Ballots". Proceedings of the Second International Conference on Electronic Voting. Cham, Switzerland. p. 122. arXiv:1707.08619. ISBN9783319686875. OCLC1006721597.