M. Abadi and C. Fournet, Mobile values, new names, and secure communication, Proceedings of the 28th ACM SIGPLAN-SIGACT symposium on Principles of programming languages, POPL '01, pp.104-115, 2001.
URL : https://hal.archives-ouvertes.fr/hal-01423924

B. Adida, O. De-marneffe, O. Pereira, and J. Quisquater, Electing a university president using open-audit voting: analysis of real-world use of helios, Proceedings of the 2009 conference on Electronic voting technology/workshop on trustworthy elections, EVT/WOTE'09, pp.10-10, 2009.

B. Blanchet, M. Abadi, and C. Fournet, Automated Verification of Selected Equivalences for Security Protocols, 20th Annual IEEE Symposium on Logic in Computer Science (LICS' 05), pp.3-51, 2001.
DOI : 10.1109/LICS.2005.8

J. Bohli, J. Müller-quade, and S. Röhrich, Bingo Voting: Secure and Coercion-Free Voting Using a Trusted Random Number Generator, E-Voting and Identity, pp.111-124, 2007.
DOI : 10.1007/978-3-540-77493-8_10

S. Delaune, S. Kremer, and M. Ryan, Verifying privacy-type properties of electronic voting protocols, Journal of Computer Security, vol.17, issue.4, pp.435-487, 2009.
DOI : 10.3233/JCS-2009-0340

S. Delaune, S. Kremer, and M. D. Ryan, Verifying Privacy-Type Properties of Electronic Voting Protocols: A Taster, Towards Trustworthy Elections ? New Directions in Electronic Voting, pp.289-309, 2001.
DOI : 10.1007/978-3-642-12980-3_18

J. Dreier, P. Lafourcade, and Y. Lakhnech, Vote-Independence: A Powerful Privacy Notion for Voting Protocols, Proceedings of the 4th Workshop on Foundations & Practice of Security (FPS), Lecture Notes in Computer Science, 2011.
DOI : 10.1007/978-3-642-27901-0_13

URL : https://hal.archives-ouvertes.fr/hal-01338071

A. Fujioka, T. Okamoto, and K. Ohta, A practical secret voting scheme for large scale elections, Advances in Cryptology ? AUSCRYPT '92, pp.244-251, 1992.
DOI : 10.1007/3-540-57220-1_66

A. Juels, D. Catalano, and M. Jakobsson, Coercion-resistant electronic elections, Proceedings of the 2005 ACM workshop on Privacy in the electronic society , WPES '05, 2002.
DOI : 10.1145/1102199.1102213

A. Juels, D. Catalano, and M. Jakobsson, Coercion-resistant electronic elections, Proceedings of the 2005 ACM workshop on Privacy in the electronic society , WPES '05, pp.61-70, 2005.
DOI : 10.1145/1102199.1102213

S. Kremer and M. Ryan, Analysis of an Electronic Voting Protocol in the Applied Pi Calculus, Proceedings of the 14th European Symposium On Programming (ESOP'05), pp.186-200, 2005.
DOI : 10.1007/978-3-540-31987-0_14