Automated Verification of Remote Electronic Voting Protocols in the Applied Pi-Calculus, 2008 21st IEEE Computer Security Foundations Symposium, pp.195-209, 2008. ,
DOI : 10.1109/CSF.2008.26
Verifying privacy-type properties of electronic voting protocols, Journal of Computer Security, vol.17, issue.4, pp.435-487, 2009. ,
DOI : 10.3233/JCS-2009-0340
Verifying Privacy-Type Properties of Electronic Voting Protocols: A Taster, Towards Trustworthy Elections ? New Directions in Electronic Voting, pp.289-309, 2010. ,
DOI : 10.1007/978-3-642-12980-3_18
Vote-Independence: A Powerful Privacy Notion for Voting Protocols, Proceedings of the 4th Workshop on Foundations & Practice of Security (FPS), 2011. ,
DOI : 10.1007/978-3-642-27901-0_13
URL : https://hal.archives-ouvertes.fr/hal-01338071
A formal taxonomy of privacy in voting protocols, 2012 IEEE International Conference on Communications (ICC), 2012. ,
DOI : 10.1109/ICC.2012.6364938
URL : https://hal.archives-ouvertes.fr/hal-01338064
An Epistemic Approach to Coercion-Resistance for Electronic Voting Protocols, 2009 30th IEEE Symposium on Security and Privacy, pp.251-266, 2009. ,
DOI : 10.1109/SP.2009.13
Receipt-Free Universally-Verifiable Voting with Everlasting Privacy, LNCS, vol.4117, pp.373-392, 2006. ,
DOI : 10.1007/11818175_22
Attacking and fixing helios: An analysis of ballot secrecy, Proceedings of the 24th IEEE Computer Security Foundations Symposium (CSF'11), pp.297-311, 2011. ,
URL : https://hal.archives-ouvertes.fr/hal-00732899
Election Verifiability in Electronic Voting Protocols, Proceedings of the 15th European Symposium on Research in Computer Security, ESORICS 2010, pp.389-404, 2010. ,
DOI : 10.1007/978-3-642-15497-3_24
Towards Automatic Analysis of Election Verifiability Properties, Proceedings of the Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security (ARSPA-WITS'10, pp.146-163, 2010. ,
DOI : 10.1007/978-3-642-16074-5_11
Coercion-resistant electronic elections, Proceedings of the 2005 ACM workshop on Privacy in the electronic society , WPES '05, pp.61-70, 2005. ,
DOI : 10.1145/1102199.1102213
Analysis of an Electronic Voting Protocol in the Applied Pi Calculus, Proceedings of the 14th European Symposium On Programming (ESOP'05, pp.186-200, 2005. ,
DOI : 10.1007/978-3-540-31987-0_14
An electronic voting system supporting vote weights, Internet Research, vol.16, issue.5, pp.507-518, 2006. ,
DOI : 10.1108/10662240610710987
Revs -a robust electronic voting system, IADIS International Conference e-Society, 2003. ,
A practical secret voting scheme for large scale elections, Advances in Cryptology ? AUSCRYPT '92, pp.244-251, 1992. ,
DOI : 10.1007/3-540-57220-1_66
Mobile values, new names, and secure communication, Proceedings of the 28th ACM SIGPLAN-SIGACT symposium on Principles of programming languages. POPL '01, pp.104-115, 2001. ,
URL : https://hal.archives-ouvertes.fr/hal-01423924
Automated Verification of Selected Equivalences for Security Protocols, 20th Annual IEEE Symposium on Logic in Computer Science (LICS' 05), pp.3-51, 2008. ,
DOI : 10.1109/LICS.2005.8
Proswapper: Improved equivalence verifier for proverif, 2010. ,
A game-based definition of coercionresistance and its applications, Proceedings of the 2010 23rd IEEE Computer Security Foundations Symposium. CSF '10, pp.122-136, 2010. ,
Anonymity and Verifiability in Voting: Understanding (Un)Linkability, Proceedings of the 12th international conference on Information and communications security. ICICS'10, pp.296-310, 2010. ,
DOI : 10.1007/978-3-642-17650-0_21
On defining privacy in the presence of weighted votes and the equivalence of single and multi-voter coercion, Verimag Research Report, 2012. ,
The code and scripts used to automatically verify the examples is available at http://www-verimag.imag.fr, 2011. ,
Bingo voting: Secure and coercionfree voting using a trusted random number generator. In: E-Voting and Identity, pp.111-124, 2007. ,
An electronic voting scheme, Proceedings of the IFIP World Conference on IT Tools, pp.21-30, 1996. ,
DOI : 10.1007/978-0-387-34979-4_3
Providing receiptfreeness in mixnet-based voting protocols. In: Information Security and Cryptology -ICISC 2003, LNCS, vol.2971, pp.245-258, 2004. ,
Masked Ballot Voting for Receipt-Free Online Elections, Proceedings of the 2nd International Conference on E-Voting and Identity. VOTE- ID '09, pp.18-36, 2009. ,
DOI : 10.1007/3-540-49264-X_32