M. Abadi and C. Fournet, Mobile values, new names, and secure communication, 28th Symposium on Principles of Programming Languages (POPL'01, 2001.
DOI : 10.1145/373243.360213

URL : https://hal.archives-ouvertes.fr/hal-01423924

B. Adida, Helios: web-based open-audit voting, 17th conference on Security symposium (SS'08). USENIX Association, 2008.

M. Backes, C. Hritcu, and M. Maffei, Automated Verification of Remote Electronic Voting Protocols in the Applied Pi-Calculus, 2008 21st IEEE Computer Security Foundations Symposium, 2008.
DOI : 10.1109/CSF.2008.26

B. Blanchet, An efficient cryptographic protocol verifier based on prolog rules, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001., 2001.
DOI : 10.1109/CSFW.2001.930138

B. Blanchet, M. Abadi, and C. Fournet, Automated Verification of Selected Equivalences for Security Protocols, 20th Annual IEEE Symposium on Logic in Computer Science (LICS' 05), 2008.
DOI : 10.1109/LICS.2005.8

R. Chadha, S. ¸. Ciobâc?, and S. Kremer, Automated verification of equivalence properties of cryptographic protocols, 21th European Symposium on Programming, 2012.
URL : https://hal.archives-ouvertes.fr/inria-00632564

D. Chaum, P. Ryan, and S. Schneider, A Practical Voter-Verifiable Election Scheme, 10th European Symposium On Research In Computer Security (ESORICS'05), 2005.
DOI : 10.1007/11555827_8

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.456.7748

M. Clarkson, S. Chong, and A. Myers, Civitas: Toward a Secure Voting System, 2008 IEEE Symposium on Security and Privacy (sp 2008), 2008.
DOI : 10.1109/SP.2008.32

V. Cortier and B. Smyth, Attacking and fixing helios: An analysis of ballot secrecy, 24th IEEE Computer Security Foundations Symposium (CSF'11), 2011.
URL : https://hal.archives-ouvertes.fr/hal-00732899

E. Cuvelier, T. Peters, and O. Pereira, Election verifiabilty or ballot privacy: Do we need to choose? SecVote

S. Delaune, S. Kremer, and M. D. Ryan, Verifying privacy-type properties of electronic voting protocols, Journal of Computer Security, vol.17, issue.4, pp.435-487, 2009.
DOI : 10.3233/JCS-2009-0340

D. Demirel, J. Van-de-graaf, and R. Araújo, Improving helios with everlasting privacy towards the public, International conference on Electronic Voting Technology/Workshop on Trustworthy Elections (EVT/WOTE'12). USENIX Association, 2012.

J. Dreier, P. Lafourcade, and Y. Lakhnech, Defining Privacy for Weighted Votes, Single and Multi-voter Coercion, 17th European Symposium on Research in Computer Security (ES- ORICS 2012), 2012.
DOI : 10.1007/978-3-642-33167-1_26

URL : https://hal.archives-ouvertes.fr/hal-01338037

A. Juels, D. Catalano, and M. Jakobsson, Coercion-resistant electronic elections, Proceedings of the 2005 ACM workshop on Privacy in the electronic society , WPES '05, 2005.
DOI : 10.1145/1102199.1102213

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.11.8779

S. Kremer and M. D. Ryan, Analysis of an electronic voting protocol in the applied picalculus, 14th European Symposium on Programming (ESOP'05), 2005.

S. Kremer, M. D. Ryan, and B. Smyth, Election Verifiability in Electronic Voting Protocols, 15th European Symposium on Research in Computer Security (ESORICS'10), 2010.
DOI : 10.1007/978-3-642-15497-3_24

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.154.3424

R. Küsters, T. Truderung, and A. Vogt, Accountability: definition and relationship to verifiability, ACM Conference on Computer and Communications Security, 2010.

T. Moran and M. Naor, Receipt-Free Universally-Verifiable Voting with Everlasting Privacy, Advances in Cryptology -CRYPTO 2006, 2006.
DOI : 10.1007/11818175_22

T. P. Pedersen, Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing, Advances in Cryptology -CRYPTO '91, 1991.
DOI : 10.1007/3-540-46766-1_9