Electing a University President Using Open-Audit Voting: Analysis of Real-World Use of Helios, EVT/WOTE'09: Electronic Voting Technology Workshop/Workshop on Trustworthy Elections. USENIX, 2009. ,
Final Report of IACR Electronic Voting Committee. International Association for Cryptologic Research, 2010. ,
On the Robustness of Applications Based on the SSL and TLS Security Protocols, Public Key Infrastructure, pp.248-264, 2007. ,
DOI : 10.1007/978-3-540-73408-6_18
The Transport Layer Security (TLS) Protocol Version 1.2, 2008. ,
DOI : 10.17487/rfc5246
On the security of public key protocols, IEEE Transactions on Information Theory, vol.29, issue.2, pp.198-208, 1983. ,
DOI : 10.1109/TIT.1983.1056650
The Secure Sockets Layer (SSL) Protocol Version 3.0. RFC 6101, 2011. ,
Probabilistic encryption, Journal of Computer and System Sciences, vol.28, issue.2, pp.270-299, 1984. ,
DOI : 10.1016/0022-0000(84)90070-9
URL : http://doi.org/10.1016/0022-0000(84)90070-9
The Helios e-Voting Demo for the IACR. International Association for Cryptologic Research, 2010. ,
Feedlack detects missing feedback in web applications, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp.2177-2186, 2011. ,
Election Verifiability in Electronic Voting Protocols, ESORICS'10: 15th European Symposium on Research in Computer Security, pp.389-404, 2010. ,
DOI : 10.1007/978-3-642-15497-3_24
Accountability: Definition and relationship to verifiability, Proceedings of the 17th ACM Conference on Computer and Communications Security, pp.526-535, 2010. ,
Heuristic evaluation of user interfaces, Proceedings of the SIGCHI conference on Human factors in computing systems Empowering people, CHI '90, pp.249-256, 1990. ,
DOI : 10.1145/97243.97281
The design of everyday things. Basic Books, 1998. ,
Government Secrets and the Need for Whistle-blowers, 2013. ,
IT for Oppression, IEEE Security & Privacy, vol.11, issue.2, p.96, 2013. ,
DOI : 10.1109/MSP.2013.36
Computational Election Verifiability: Definitions and an Analysis of Helios and JCJ, 2014. ,
Attacking Helios: An authentication bug YouTube video, linked from http://www.bensmyth.com/publications/ 2013-truncation-attacks-to-violate-beliefs, p.2012 ,
Truncating TLS connections to access GMail accounts YouTube video, linked from http://www.bensmyth.com/publications/ 2013-truncation-attacks-to-violate-beliefs, p.2012 ,
Truncating TLS connections to steal Hotmail accounts YouTube video, linked from http://www.bensmyth.com/publications/ 2013-truncation-attacks-to-violate-beliefs, 2013. ,
Truncating TLS Connections to Violate Beliefs in Web Applications, 7th USENIX Workshop on Offensive Technologies (WOOT). USENIX, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-01102013
Session management vulnerabilities in today's web. Security Privacy, IEEE, vol.8, issue.5, pp.48-56, 2010. ,