Netherland's Ministry of the Interior and Kingdom Relations) Stemmen met potlood en papier (voting with pencil andpaper), 2008. ,
Attacking and fixing helios: An analysis of ballot secrecy, CSF'11. IEEE, 2011. ,
URL : https://hal.archives-ouvertes.fr/hal-00732899
Mobile values, new names, and secure communication, POPL'01, pp.104-115, 2001. ,
URL : https://hal.archives-ouvertes.fr/hal-01423924
Vote-Independence: A Powerful Privacy Notion for Voting Protocols, 4th Workshop on Foundations & Practice of Security (FPS), ser. LNCS, p.164, 2011. ,
DOI : 10.1007/978-3-642-27901-0_13
URL : https://hal.archives-ouvertes.fr/hal-01338071
Verifying privacy-type properties of electronic voting protocols, Journal of Computer Security, vol.17, issue.4, pp.435-487, 2009. ,
DOI : 10.3233/JCS-2009-0340
A practical secret voting scheme for large scale elections, Advances in Cryptology ? AUSCRYPT '92, ser, pp.244-251, 1992. ,
DOI : 10.1007/3-540-57220-1_66
An electronic voting scheme, Proceedings of the IFIP World Conference on IT Tools, 1996. ,
DOI : 10.1007/978-0-387-34979-4_3
Coercion-resistant electronic elections, Proceedings of the 2005 ACM workshop on Privacy in the electronic society , WPES '05, pp.61-70, 2005. ,
DOI : 10.1145/1102199.1102213
Bingo Voting: Secure and Coercion-Free Voting Using a Trusted Random Number Generator, E-Voting and Identity, ser, pp.111-124, 2007. ,
DOI : 10.1007/978-3-540-77493-8_10
Proswapper: Improved equivalence verifier for proverif, 2010. ,
Automated Verification of Selected Equivalences for Security Protocols, 20th Annual IEEE Symposium on Logic in Computer Science (LICS' 05), pp.3-51, 2008. ,
DOI : 10.1109/LICS.2005.8
Receipt-Free Universally-Verifiable Voting with Everlasting Privacy, CRYPTO 2006, ser, pp.373-392, 2006. ,
DOI : 10.1007/11818175_22
Civitas: Toward a Secure Voting System, 2008 IEEE Symposium on Security and Privacy (sp 2008), pp.354-368, 2008. ,
DOI : 10.1109/SP.2008.32
Automated Verification of Remote Electronic Voting Protocols in the Applied Pi-Calculus, 2008 21st IEEE Computer Security Foundations Symposium, pp.195-209, 2008. ,
DOI : 10.1109/CSF.2008.26
Providing Receipt-Freeness in Mixnet-Based Voting Protocols, ICISC, ser. LNCS, 2004. ,
DOI : 10.1007/978-3-540-24691-6_19
An Epistemic Approach to Coercion-Resistance for Electronic Voting Protocols, 2009 30th IEEE Symposium on Security and Privacy, pp.251-266, 2009. ,
DOI : 10.1109/SP.2009.13
Incoercible multiparty computation (extended abstract), FOCS, pp.504-513, 1996. ,
Universally Composable Incoercibility, CRYPTO 2010, ser, pp.411-428, 2010. ,
DOI : 10.1007/978-3-642-14623-7_22
Relations Among Privacy Notions, pp.362-380, 2009. ,
A formal taxonomy of privacy in voting protocols, 2012 IEEE International Conference on Communications (ICC), 2011. ,
DOI : 10.1109/ICC.2012.6364938
URL : https://hal.archives-ouvertes.fr/hal-01338064