M. Backes, C. Hritcu, and M. Maffei, Automated Verification of Remote Electronic Voting Protocols in the Applied Pi-Calculus, 2008 21st IEEE Computer Security Foundations Symposium, pp.195-209, 2008.
DOI : 10.1109/CSF.2008.26

S. Delaune, S. Kremer, and M. Ryan, Verifying privacy-type properties of electronic voting protocols, Journal of Computer Security, vol.17, issue.4, pp.435-487, 2009.
DOI : 10.3233/JCS-2009-0340

S. Delaune, S. Kremer, and M. D. Ryan, Verifying Privacy-Type Properties of Electronic Voting Protocols: A Taster, Towards Trustworthy Elections ? New Directions in Electronic Voting, pp.289-309, 2010.
DOI : 10.1007/978-3-642-12980-3_18

J. Dreier, P. Lafourcade, and Y. Lakhnech, Vote-Independence: A Powerful Privacy Notion for Voting Protocols, Proceedings of the 4th Workshop on Foundations & Practice of Security (FPS), 2011.
DOI : 10.1007/978-3-642-27901-0_13

URL : https://hal.archives-ouvertes.fr/hal-01338071

J. Dreier, P. Lafourcade, and Y. Lakhnech, A formal taxonomy of privacy in voting protocols, 2012 IEEE International Conference on Communications (ICC), 2012.
DOI : 10.1109/ICC.2012.6364938

URL : https://hal.archives-ouvertes.fr/hal-01338064

R. Küsters and T. Truderung, An Epistemic Approach to Coercion-Resistance for Electronic Voting Protocols, 2009 30th IEEE Symposium on Security and Privacy, pp.251-266, 2009.
DOI : 10.1109/SP.2009.13

T. Moran and M. Naor, Receipt-Free Universally-Verifiable Voting with Everlasting Privacy, LNCS, vol.4117, pp.373-392, 2006.
DOI : 10.1007/11818175_22

B. Smyth and V. Cortier, Attacking and fixing helios: An analysis of ballot secrecy, Proceedings of the 24th IEEE Computer Security Foundations Symposium (CSF'11), pp.297-311, 2011.
URL : https://hal.archives-ouvertes.fr/hal-00732899

S. Kremer, M. Ryan, and B. Smyth, Election Verifiability in Electronic Voting Protocols, Proceedings of the 15th European Symposium on Research in Computer Security, ESORICS 2010, pp.389-404, 2010.
DOI : 10.1007/978-3-642-15497-3_24

B. Smyth, M. D. Ryan, S. Kremer, and M. Kourjieh, Towards Automatic Analysis of Election Verifiability Properties, Proceedings of the Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security (ARSPA-WITS'10, pp.146-163, 2010.
DOI : 10.1007/978-3-642-16074-5_11

A. Juels, D. Catalano, and M. Jakobsson, Coercion-resistant electronic elections, Proceedings of the 2005 ACM workshop on Privacy in the electronic society , WPES '05, pp.61-70, 2005.
DOI : 10.1145/1102199.1102213

S. Kremer and M. Ryan, Analysis of an Electronic Voting Protocol in the Applied Pi Calculus, Proceedings of the 14th European Symposium On Programming (ESOP'05, pp.186-200, 2005.
DOI : 10.1007/978-3-540-31987-0_14

C. Eliasson and A. Zúquete, An electronic voting system supporting vote weights, Internet Research, vol.16, issue.5, pp.507-518, 2006.
DOI : 10.1108/10662240610710987

R. Joaquim, A. Zúquete, and P. Ferreira, Revs -a robust electronic voting system, IADIS International Conference e-Society, 2003.

A. Fujioka, T. Okamoto, and K. Ohta, A practical secret voting scheme for large scale elections, Advances in Cryptology ? AUSCRYPT '92, pp.244-251, 1992.
DOI : 10.1007/3-540-57220-1_66

M. Abadi and C. Fournet, Mobile values, new names, and secure communication, Proceedings of the 28th ACM SIGPLAN-SIGACT symposium on Principles of programming languages. POPL '01, pp.104-115, 2001.
URL : https://hal.archives-ouvertes.fr/hal-01423924

B. Blanchet, M. Abadi, and C. Fournet, Automated Verification of Selected Equivalences for Security Protocols, 20th Annual IEEE Symposium on Logic in Computer Science (LICS' 05), pp.3-51, 2008.
DOI : 10.1109/LICS.2005.8

P. Klus, B. Smyth, and M. D. Ryan, Proswapper: Improved equivalence verifier for proverif, 2010.

R. Küsters, T. Truderung, and A. Vogt, A game-based definition of coercionresistance and its applications, Proceedings of the 2010 23rd IEEE Computer Security Foundations Symposium. CSF '10, pp.122-136, 2010.

L. Langer, H. Jonker, and W. Pieters, Anonymity and Verifiability in Voting: Understanding (Un)Linkability, Proceedings of the 12th international conference on Information and communications security. ICICS'10, pp.296-310, 2010.
DOI : 10.1007/978-3-642-17650-0_21

J. Dreier, P. Lafourcade, and Y. Lakhnech, On defining privacy in the presence of weighted votes and the equivalence of single and multi-voter coercion, Verimag Research Report, 2012.

J. Dreier, The code and scripts used to automatically verify the examples is available at http://www-verimag.imag.fr, 2011.

J. M. Bohli, J. Müller-quade, and S. Röhrich, Bingo voting: Secure and coercionfree voting using a trusted random number generator. In: E-Voting and Identity, pp.111-124, 2007.

T. Okamoto, An electronic voting scheme, Proceedings of the IFIP World Conference on IT Tools, pp.21-30, 1996.
DOI : 10.1007/978-0-387-34979-4_3

B. Lee, C. Boyd, E. Dawson, K. Kim, J. Yang et al., Providing receiptfreeness in mixnet-based voting protocols. In: Information Security and Cryptology -ICISC 2003, LNCS, vol.2971, pp.245-258, 2004.

R. Wen and R. Buckland, Masked Ballot Voting for Receipt-Free Online Elections, Proceedings of the 2nd International Conference on E-Voting and Identity. VOTE- ID '09, pp.18-36, 2009.
DOI : 10.1007/3-540-49264-X_32