Computer Systems Established, Maintained, and Trusted by Mutually Suspicious GroupsDavid ChaumJune 1982PDFExternal link