Computer Systems Established, Maintained, and Trusted by Mutually Suspicious Groups

David Chaum