Statistics about Internet voting in Estonia ,
Security Analysis of the Estonian Internet Voting System, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, pp.703-715, 2014. ,
DOI : 10.1145/2660267.2660315
The New South Wales iVote System: Security Failures and Verification Flaws in a Live Online Election, 1504. ,
DOI : 10.1007/978-3-319-22270-7_3
Comment mon ordinateur a votévoté`votéà ma place (etàet`età mon insu), 2012. ,
Verifying privacy-type properties of electronic voting protocols, Journal of Computer Security, vol.17, issue.4, pp.435-487, 2009. ,
DOI : 10.3233/JCS-2009-0340
Automated Verification of Remote Electronic Voting Protocols in the Applied Pi-Calculus, 2008 21st IEEE Computer Security Foundations Symposium, pp.195-209, 2008. ,
DOI : 10.1109/CSF.2008.26
Verifiability, Privacy, and Coercion-Resistance: New Insights from a Case Study, 2011 IEEE Symposium on Security and Privacy, pp.538-553, 2011. ,
DOI : 10.1109/SP.2011.21
SoK: A Comprehensive Analysis of Game-Based Ballot Privacy Definitions, 2015 IEEE Symposium on Security and Privacy ,
DOI : 10.1109/SP.2015.37
On the notion of 'software independence' in voting systems, Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences, vol.2, issue.1881, 2006. ,
DOI : 10.1098/rsta.2008.0149
Surevote: Technical overview, Proc. Workshop on Trustworthy Elections (WOTE'01), 2001. ,
Pretty good democracy, Proc. 17th International Workshop on Security Protocols. Revised Selected Papers, pp.111-130, 2009. ,
Simple verifiable elections, Proc ,
Helios: Web-based open-audit voting, Proc. 17th USENIX Security Symposium, pp.335-348, 2008. ,
Usability analysis of helios -an open source verifiable remote electronic voting system, Proc. Electronic Voting Technology Workshop / Workshop on Trustworthy Elections (EVT/WOTE'11), 2011. ,
Design, Development, and Use of Secure Electronic Voting Systems, 2014. ,
Du-Vote: Remote Electronic Voting with Untrusted Computers, 2015 IEEE 28th Computer Security Foundations Symposium, pp.155-169, 2015. ,
DOI : 10.1109/CSF.2015.18
Attacking and fixing helios: An analysis of ballot secrecy, Proc. 24th IEEE Computer Security Foundations Symposium (CSF'11, pp.297-311, 2011. ,
URL : https://hal.archives-ouvertes.fr/hal-00732899
Election Verifiability for Helios under Weaker Trust Assumptions, Proc. 19th European Symposium on Research in Computer Security (ES- ORICS'14), Part II, pp.327-344, 2014. ,
DOI : 10.1007/978-3-319-11212-1_19
URL : https://hal.archives-ouvertes.fr/hal-01080292
Proof systems for general statements about discrete logarithms, 1997. ,