M. Van-binnenlandse-zaken-en-koninkrijksrelaties, Netherland's Ministry of the Interior and Kingdom Relations) Stemmen met potlood en papier (voting with pencil andpaper), 2008.

B. Smyth and V. Cortier, Attacking and fixing helios: An analysis of ballot secrecy, CSF'11. IEEE, 2011.
URL : https://hal.archives-ouvertes.fr/hal-00732899

M. Abadi and C. Fournet, Mobile values, new names, and secure communication, POPL'01, pp.104-115, 2001.
URL : https://hal.archives-ouvertes.fr/hal-01423924

J. Dreier, P. Lafourcade, and Y. Lakhnech, Vote-Independence: A Powerful Privacy Notion for Voting Protocols, 4th Workshop on Foundations & Practice of Security (FPS), ser. LNCS, p.164, 2011.
DOI : 10.1007/978-3-642-27901-0_13

URL : https://hal.archives-ouvertes.fr/hal-01338071

S. Delaune, S. Kremer, and M. Ryan, Verifying privacy-type properties of electronic voting protocols, Journal of Computer Security, vol.17, issue.4, pp.435-487, 2009.
DOI : 10.3233/JCS-2009-0340

A. Fujioka, T. Okamoto, and K. Ohta, A practical secret voting scheme for large scale elections, Advances in Cryptology ? AUSCRYPT '92, ser, pp.244-251, 1992.
DOI : 10.1007/3-540-57220-1_66

T. Okamoto, An electronic voting scheme, Proceedings of the IFIP World Conference on IT Tools, 1996.
DOI : 10.1007/978-0-387-34979-4_3

A. Juels, D. Catalano, and M. Jakobsson, Coercion-resistant electronic elections, Proceedings of the 2005 ACM workshop on Privacy in the electronic society , WPES '05, pp.61-70, 2005.
DOI : 10.1145/1102199.1102213

J. Bohli, J. Müller-quade, and S. Röhrich, Bingo Voting: Secure and Coercion-Free Voting Using a Trusted Random Number Generator, E-Voting and Identity, ser, pp.111-124, 2007.
DOI : 10.1007/978-3-540-77493-8_10

P. Klus, B. Smyth, and M. D. Ryan, Proswapper: Improved equivalence verifier for proverif, 2010.

B. Blanchet, M. Abadi, and C. Fournet, Automated Verification of Selected Equivalences for Security Protocols, 20th Annual IEEE Symposium on Logic in Computer Science (LICS' 05), pp.3-51, 2008.
DOI : 10.1109/LICS.2005.8

T. Moran and M. Naor, Receipt-Free Universally-Verifiable Voting with Everlasting Privacy, CRYPTO 2006, ser, pp.373-392, 2006.
DOI : 10.1007/11818175_22

M. R. Clarkson, S. Chong, and A. C. Myers, Civitas: Toward a Secure Voting System, 2008 IEEE Symposium on Security and Privacy (sp 2008), pp.354-368, 2008.
DOI : 10.1109/SP.2008.32

M. Backes, C. Hritcu, and M. Maffei, Automated Verification of Remote Electronic Voting Protocols in the Applied Pi-Calculus, 2008 21st IEEE Computer Security Foundations Symposium, pp.195-209, 2008.
DOI : 10.1109/CSF.2008.26

B. Lee, C. Boyd, E. Dawson, K. Kim, J. Yang et al., Providing Receipt-Freeness in Mixnet-Based Voting Protocols, ICISC, ser. LNCS, 2004.
DOI : 10.1007/978-3-540-24691-6_19

R. Küsters and T. Truderung, An Epistemic Approach to Coercion-Resistance for Electronic Voting Protocols, 2009 30th IEEE Symposium on Security and Privacy, pp.251-266, 2009.
DOI : 10.1109/SP.2009.13

R. Canetti and R. Gennaro, Incoercible multiparty computation (extended abstract), FOCS, pp.504-513, 1996.

D. Unruh and J. Müller-quade, Universally Composable Incoercibility, CRYPTO 2010, ser, pp.411-428, 2010.
DOI : 10.1007/978-3-642-14623-7_22

J. Bohli and A. Pashalidis, Relations Among Privacy Notions, pp.362-380, 2009.

J. Dreier, P. Lafourcade, and Y. Lakhnech, A formal taxonomy of privacy in voting protocols, 2012 IEEE International Conference on Communications (ICC), 2011.
DOI : 10.1109/ICC.2012.6364938

URL : https://hal.archives-ouvertes.fr/hal-01338064