M. Abadi and C. Fournet, Mobile values, new names, and secure communication, POPL 2001, POPL '01, pp.104-115, 2001.
URL : https://hal.archives-ouvertes.fr/hal-01423924

M. Abe and K. Suzuki, Receipt-Free Sealed-Bid Auction, Proceedings of the 5th International Conference on Information Security, ISC '02, pp.191-199, 2002.
DOI : 10.1007/3-540-45811-5_14

M. Arapinis, E. Ritter, and M. D. Ryan, Statverif: Verification of stateful processes, CSF 2011, pp.33-47, 2011.

M. Backes, C. Hritcu, and M. Maffei, Automated Verification of Remote Electronic Voting Protocols in the Applied Pi-Calculus, 2008 21st IEEE Computer Security Foundations Symposium, pp.195-209, 2008.
DOI : 10.1109/CSF.2008.26

B. Blanchet, An efficient cryptographic protocol verifier based on prolog rules, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001., pp.82-96, 2001.
DOI : 10.1109/CSFW.2001.930138

B. Blanchet, From Secrecy to Authenticity in Security Protocols, 9th International Static Analysis Symposium (SAS'02), pp.342-359, 2002.
DOI : 10.1007/3-540-45789-5_25

B. Blanchet, M. Abadi, and C. Fournet, Automated Verification of Selected Equivalences for Security Protocols, 20th Annual IEEE Symposium on Logic in Computer Science (LICS' 05), pp.3-51, 2008.
DOI : 10.1109/LICS.2005.8

F. Brandt, A verifiable, bidder-resolved auction protocol, Proceedings of the 5th AAMAS Workshop on Deception, Fraud and Trust in Agent Societies, pp.18-25, 2002.

F. Brandt, How to obtain full privacy in auctions, International Journal of Information Security, vol.16, issue.1, pp.201-216, 2005.
DOI : 10.1007/s10207-006-0001-y

F. Brandt and T. Sandholm, On the Existence of Unconditionally Privacy-Preserving Auction Protocols, ACM Transactions on Information and System Security, vol.11, issue.2, pp.1-6, 2008.
DOI : 10.1145/1330332.1330338

B. Curtis, J. Pieprzyk, and J. Seruga, An Efficient eAuction Protocol, The Second International Conference on Availability, Reliability and Security (ARES'07), pp.417-421, 2005.
DOI : 10.1109/ARES.2007.37

S. Delaune, S. Kremer, and M. Ryan, Verifying privacy-type properties of electronic voting protocols, Journal of Computer Security, vol.17, issue.4, pp.435-487, 2009.
DOI : 10.3233/JCS-2009-0340

N. Dong, H. L. Jonker, and J. Pang, Analysis of a Receipt-Free Auction Protocol in the Applied Pi Calculus, FAST 2010, pp.223-238, 2010.
DOI : 10.1016/j.jlap.2007.06.002

J. Dreier, The proverif code used to automatically verify the examples is available at http:// www-verimag.imag.fr/~dreier

J. Dreier, P. Lafourcade, and Y. Lakhnech, Vote-Independence: A Powerful Privacy Notion for Voting Protocols, Proceedings of the 4th Workshop on Foundations & Practice of Security (FPS), 2011.
DOI : 10.1007/978-3-642-27901-0_13

URL : https://hal.archives-ouvertes.fr/hal-01338071

J. Dreier, P. Lafourcade, and Y. Lakhnech, Defining Privacy for Weighted Votes, Single and Multi-voter Coercion, ESORICS 2012, pp.3-3, 2012.
DOI : 10.1007/978-3-642-33167-1_26

URL : https://hal.archives-ouvertes.fr/hal-01338037

J. Dreier, P. Lafourcade, and Y. Lakhnech, A formal taxonomy of privacy in voting protocols, 2012 IEEE International Conference on Communications (ICC), 2012.
DOI : 10.1109/ICC.2012.6364938

URL : https://hal.archives-ouvertes.fr/hal-01338064

M. K. Franklin and M. K. Reiter, The design and implementation of a secure auction service, Security and Privacy IEEE Symposium on, pp.2-14, 1995.

M. Harkavy, J. D. Tygar, and H. Kikuchi, Electronic auctions with private bids, Proceedings of the 3rd USENIX Workshop on Electronic Commerce, pp.61-74, 1998.

K. Ralf, T. Truderung, and A. Vogt, Accountability: definition and relationship to verifiability, Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, pp.526-535, 2010.

H. Kikuchi, M. Harkavy, and J. D. Tygar, Multi-round anonymous auction protocols, Proceedings of the First IEEE Workshop on Dependable and Real-Time E-Commerce Systems, pp.62-69, 1998.

F. Klay and L. Vigneron, Formal aspects in security and trust. chapter Automatic Methods for Analyzing Non-repudiation Protocols with an Active Intruder, pp.192-209, 2009.

P. Klus, B. Smyth, and M. D. Ryan, Proswapper: Improved equivalence verifier for proverif

V. Krishna, Auction Theory, 2002.

R. Küsters and T. Truderung, An Epistemic Approach to Coercion-Resistance for Electronic Voting Protocols, 2009 30th IEEE Symposium on Security and Privacy, pp.251-266, 2009.
DOI : 10.1109/SP.2009.13

B. Lee, K. Kim, and J. Ma, Efficient Public Auction with One-Time Registration and Public Verifiability, Proceedings of the Second International Conference on Cryptology in India: Progress in Cryptology, INDOCRYPT '01, pp.162-174, 2001.
DOI : 10.1007/3-540-45311-3_16

J. Liu and L. Vigneron, Design and verification of a non-repudiation protocol based on receiver-side smart card, IET Information Security, vol.4, issue.1, pp.15-29, 2010.
DOI : 10.1049/iet-ifs.2009.0086

K. Omote and A. Miyaji, A Practical English Auction with One-Time Registration, Proceedings of the 6th Australasian Conference on Information Security and Privacy, ACISP '01, pp.221-234, 2001.
DOI : 10.1007/3-540-47719-5_19

C. Passch, W. Song, W. Kou, and C. Tan, Online Auction Protocols: A Comparative Study, Proceedings of the Second International Symposium on Topics in Electronic Commerce, ISEC '01, pp.170-186, 2001.
DOI : 10.1007/3-540-45415-2_14

B. Smyth and V. Cortier, Attacking and fixing helios: An analysis of ballot secrecy, CSF 2011, pp.297-311, 2011.
URL : https://hal.archives-ouvertes.fr/hal-00732899

G. Stuart, P. F. Stubblebine, and . Syverson, Fair on-line auctions without special trusted parties, Proceedings of Financial Cryptography, FC'99, pp.230-240, 1999.

S. Subramanian, Design and verification of a secure electronic auction protocol, Proceedings Seventeenth IEEE Symposium on Reliable Distributed Systems (Cat. No.98CB36281), p.204, 1998.
DOI : 10.1109/RELDIS.1998.740497