Mobile values, new names, and secure communication, POPL 2001, POPL '01, pp.104-115, 2001. ,
URL : https://hal.archives-ouvertes.fr/hal-01423924
Receipt-Free Sealed-Bid Auction, Proceedings of the 5th International Conference on Information Security, ISC '02, pp.191-199, 2002. ,
DOI : 10.1007/3-540-45811-5_14
Statverif: Verification of stateful processes, CSF 2011, pp.33-47, 2011. ,
Automated Verification of Remote Electronic Voting Protocols in the Applied Pi-Calculus, 2008 21st IEEE Computer Security Foundations Symposium, pp.195-209, 2008. ,
DOI : 10.1109/CSF.2008.26
An efficient cryptographic protocol verifier based on prolog rules, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001., pp.82-96, 2001. ,
DOI : 10.1109/CSFW.2001.930138
From Secrecy to Authenticity in Security Protocols, 9th International Static Analysis Symposium (SAS'02), pp.342-359, 2002. ,
DOI : 10.1007/3-540-45789-5_25
Automated Verification of Selected Equivalences for Security Protocols, 20th Annual IEEE Symposium on Logic in Computer Science (LICS' 05), pp.3-51, 2008. ,
DOI : 10.1109/LICS.2005.8
A verifiable, bidder-resolved auction protocol, Proceedings of the 5th AAMAS Workshop on Deception, Fraud and Trust in Agent Societies, pp.18-25, 2002. ,
How to obtain full privacy in auctions, International Journal of Information Security, vol.16, issue.1, pp.201-216, 2005. ,
DOI : 10.1007/s10207-006-0001-y
On the Existence of Unconditionally Privacy-Preserving Auction Protocols, ACM Transactions on Information and System Security, vol.11, issue.2, pp.1-6, 2008. ,
DOI : 10.1145/1330332.1330338
An Efficient eAuction Protocol, The Second International Conference on Availability, Reliability and Security (ARES'07), pp.417-421, 2005. ,
DOI : 10.1109/ARES.2007.37
Verifying privacy-type properties of electronic voting protocols, Journal of Computer Security, vol.17, issue.4, pp.435-487, 2009. ,
DOI : 10.3233/JCS-2009-0340
Analysis of a Receipt-Free Auction Protocol in the Applied Pi Calculus, FAST 2010, pp.223-238, 2010. ,
DOI : 10.1016/j.jlap.2007.06.002
The proverif code used to automatically verify the examples is available at http:// www-verimag.imag.fr/~dreier ,
Vote-Independence: A Powerful Privacy Notion for Voting Protocols, Proceedings of the 4th Workshop on Foundations & Practice of Security (FPS), 2011. ,
DOI : 10.1007/978-3-642-27901-0_13
URL : https://hal.archives-ouvertes.fr/hal-01338071
Defining Privacy for Weighted Votes, Single and Multi-voter Coercion, ESORICS 2012, pp.3-3, 2012. ,
DOI : 10.1007/978-3-642-33167-1_26
URL : https://hal.archives-ouvertes.fr/hal-01338037
A formal taxonomy of privacy in voting protocols, 2012 IEEE International Conference on Communications (ICC), 2012. ,
DOI : 10.1109/ICC.2012.6364938
URL : https://hal.archives-ouvertes.fr/hal-01338064
The design and implementation of a secure auction service, Security and Privacy IEEE Symposium on, pp.2-14, 1995. ,
Electronic auctions with private bids, Proceedings of the 3rd USENIX Workshop on Electronic Commerce, pp.61-74, 1998. ,
Accountability: definition and relationship to verifiability, Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, pp.526-535, 2010. ,
Multi-round anonymous auction protocols, Proceedings of the First IEEE Workshop on Dependable and Real-Time E-Commerce Systems, pp.62-69, 1998. ,
Formal aspects in security and trust. chapter Automatic Methods for Analyzing Non-repudiation Protocols with an Active Intruder, pp.192-209, 2009. ,
Proswapper: Improved equivalence verifier for proverif ,
Auction Theory, 2002. ,
An Epistemic Approach to Coercion-Resistance for Electronic Voting Protocols, 2009 30th IEEE Symposium on Security and Privacy, pp.251-266, 2009. ,
DOI : 10.1109/SP.2009.13
Efficient Public Auction with One-Time Registration and Public Verifiability, Proceedings of the Second International Conference on Cryptology in India: Progress in Cryptology, INDOCRYPT '01, pp.162-174, 2001. ,
DOI : 10.1007/3-540-45311-3_16
Design and verification of a non-repudiation protocol based on receiver-side smart card, IET Information Security, vol.4, issue.1, pp.15-29, 2010. ,
DOI : 10.1049/iet-ifs.2009.0086
A Practical English Auction with One-Time Registration, Proceedings of the 6th Australasian Conference on Information Security and Privacy, ACISP '01, pp.221-234, 2001. ,
DOI : 10.1007/3-540-47719-5_19
Online Auction Protocols: A Comparative Study, Proceedings of the Second International Symposium on Topics in Electronic Commerce, ISEC '01, pp.170-186, 2001. ,
DOI : 10.1007/3-540-45415-2_14
Attacking and fixing helios: An analysis of ballot secrecy, CSF 2011, pp.297-311, 2011. ,
URL : https://hal.archives-ouvertes.fr/hal-00732899
Fair on-line auctions without special trusted parties, Proceedings of Financial Cryptography, FC'99, pp.230-240, 1999. ,
Design and verification of a secure electronic auction protocol, Proceedings Seventeenth IEEE Symposium on Reliable Distributed Systems (Cat. No.98CB36281), p.204, 1998. ,
DOI : 10.1109/RELDIS.1998.740497