B. Adida, O. Olivier-de-marneffe, J. Pereira, and . Quisquater, Electing a University President Using Open-Audit Voting: Analysis of Real-World Use of Helios, EVT/WOTE'09: Electronic Voting Technology Workshop/Workshop on Trustworthy Elections. USENIX, 2009.

J. Benaloh, S. Vaudenay, and J. Quisquater, Final Report of IACR Electronic Voting Committee. International Association for Cryptologic Research, 2010.

D. Berbecaru and A. Lioy, On the Robustness of Applications Based on the SSL and TLS Security Protocols, Public Key Infrastructure, pp.248-264, 2007.
DOI : 10.1007/978-3-540-73408-6_18

T. Dierks and E. Rescorla, The Transport Layer Security (TLS) Protocol Version 1.2, 2008.
DOI : 10.17487/rfc5246

D. Dolev and A. C. Yao, On the security of public key protocols, IEEE Transactions on Information Theory, vol.29, issue.2, pp.198-208, 1983.
DOI : 10.1109/TIT.1983.1056650

A. Freier, P. Karlton, and P. Kocher, The Secure Sockets Layer (SSL) Protocol Version 3.0. RFC 6101, 2011.

S. Goldwasser and S. Micali, Probabilistic encryption, Journal of Computer and System Sciences, vol.28, issue.2, pp.270-299, 1984.
DOI : 10.1016/0022-0000(84)90070-9

URL : http://doi.org/10.1016/0022-0000(84)90070-9

S. Haber, J. Benaloh, and S. Halevi, The Helios e-Voting Demo for the IACR. International Association for Cryptologic Research, 2010.

J. Andrew, X. Ko, and . Zhang, Feedlack detects missing feedback in web applications, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp.2177-2186, 2011.

S. Kremer, M. D. Ryan, and B. Smyth, Election Verifiability in Electronic Voting Protocols, ESORICS'10: 15th European Symposium on Research in Computer Security, pp.389-404, 2010.
DOI : 10.1007/978-3-642-15497-3_24

R. Küsters, T. Truderung, and A. Vogt, Accountability: Definition and relationship to verifiability, Proceedings of the 17th ACM Conference on Computer and Communications Security, pp.526-535, 2010.

J. Nielsen and R. Molich, Heuristic evaluation of user interfaces, Proceedings of the SIGCHI conference on Human factors in computing systems Empowering people, CHI '90, pp.249-256, 1990.
DOI : 10.1145/97243.97281

D. Norman, The design of everyday things. Basic Books, 1998.

B. Schneier, Government Secrets and the Need for Whistle-blowers, 2013.

B. Schneier, IT for Oppression, IEEE Security & Privacy, vol.11, issue.2, p.96, 2013.
DOI : 10.1109/MSP.2013.36

B. Smyth, S. Frink, and M. R. Clarkson, Computational Election Verifiability: Definitions and an Analysis of Helios and JCJ, 2014.

B. Smyth and A. Pironti, Attacking Helios: An authentication bug YouTube video, linked from http://www.bensmyth.com/publications/ 2013-truncation-attacks-to-violate-beliefs, p.2012

B. Smyth and A. Pironti, Truncating TLS connections to access GMail accounts YouTube video, linked from http://www.bensmyth.com/publications/ 2013-truncation-attacks-to-violate-beliefs, p.2012

B. Smyth and A. Pironti, Truncating TLS connections to steal Hotmail accounts YouTube video, linked from http://www.bensmyth.com/publications/ 2013-truncation-attacks-to-violate-beliefs, 2013.

B. Smyth and A. Pironti, Truncating TLS Connections to Violate Beliefs in Web Applications, 7th USENIX Workshop on Offensive Technologies (WOOT). USENIX, 2013.
URL : https://hal.archives-ouvertes.fr/hal-01102013

C. A. Vlsaggio and L. C. Blasio, Session management vulnerabilities in today's web. Security Privacy, IEEE, vol.8, issue.5, pp.48-56, 2010.