Mobile Values, New Names, and Secure Communication, Proceedings of the 28th ACM Symposium on Principles of Programming Languages, pp.104-115, 2001. ,
URL : https://hal.archives-ouvertes.fr/hal-01423924
Helios: Web-based Open-Audit Voting, Proceedings of the 17th USENIX Security Symposium, pp.335-348, 2008. ,
Electing a University President Using Open-Audit Voting: Analysis of Real-World Use of Helios, USENIX/ACCURATE Electronic Voting Technology, 2009. ,
Publicly auditable secure multi-party computation. Cryptology ePrint Archive, 2014. ,
A New Implementation of a Dual (Paper and Cryptographic) Voting System, Kripp et al. [36], pp.315-329 ,
Simple verifiable elections, USENIX/ACCURATE Electronic Voting Technology Workshop, EVT'06, 2006. ,
Verifiable Secret-Ballot Elections, 1987. ,
Source Code Review of the Diebold Voting System Report commissioned as part of the California Secretary of State's Top-To-Bottom Review of California voting systems, 2007. ,
Scantegrity II: End-to- End Verifiability for Optical Scan Election Systems using Invisible Ink Confirmation Codes USENIX Association, USENIX/ACCURATE Electronic Voting Technology, 2008. ,
On Some Incompatible Properties of Voting Schemes, Towards Trustworthy Elections, New Directions in Electronic Voting, pp.191-199, 2010. ,
DOI : 10.1007/978-3-642-12980-3_11
URL : https://hal.archives-ouvertes.fr/inria-00539539
Civitas: Toward a Secure Voting System, 2008 IEEE Symposium on Security and Privacy (sp 2008), pp.354-368, 2008. ,
DOI : 10.1109/SP.2008.32
Type-Based Verification of Electronic Voting Protocols, Proceedings of the 4th Conference on Principles of Security and Trust (POST'15), 2015. ,
DOI : 10.1007/978-3-662-46666-7_16
URL : https://hal.archives-ouvertes.fr/hal-01103545
Election Verifiability for Helios under Weaker Trust Assumptions, Proceedings of the 19th European Symposium on Research in Computer Security (ESORICS'14), 2014. ,
DOI : 10.1007/978-3-319-11212-1_19
URL : https://hal.archives-ouvertes.fr/hal-01080292
SoK: Verifiability Notions for E-Voting Protocols, 2016 IEEE Symposium on Security and Privacy (SP), 2016. ,
DOI : 10.1109/SP.2016.52
URL : https://hal.archives-ouvertes.fr/hal-01280445
A Secure and Optimally Efficient Multi-Authority Election Scheme, Advances in Cryptology ? EUROCRYPT '97, International Conference on the Theory and Application of Cryptographic Techniques, volume 1233 of Lecture Notes in Computer Science, 1997. ,
vVote, ACM Transactions on Information and System Security, vol.18, issue.1, p.3, 2015. ,
DOI : 10.1145/2746338
A Peered Bulletin Board for Robust Use in Verifiable Voting Systems, 2014 IEEE 27th Computer Security Foundations Symposium, pp.19-22 ,
DOI : 10.1109/CSF.2014.20
Election Verifiability or Ballot Privacy: Do We Need to Choose?, Computer Security -ESORICS 2013 -18th European Symposium on Research in Computer Security Proceedings, pp.481-498, 2013. ,
DOI : 10.1007/978-3-642-40203-6_27
Weakness in Depth: A Voting Machine's Demise, IEEE Security & Privacy, vol.13, issue.3, pp.55-58, 2015. ,
DOI : 10.1109/MSP.2015.46
2015 Neuch??tel???s Cast-as-Intended Verification Mechanism ,
DOI : 10.1007/978-3-319-22270-7_1
Du-Vote: Remote Electronic Voting with Untrusted Computers, IEEE 28th Computer Security Foundations Symposium, CSF 2015, pp.13-17, 2015. ,
An information-theoretic model of voting systems, Mathematical and Computer Modelling, vol.48, issue.9-10 ,
DOI : 10.1016/j.mcm.2008.05.040
Frontiers of Electronic Voting, 29.07. -03.08, 07311 of Dagstuhl Seminar Proceedings. Internationales Begegnungs-und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, 2007. ,
Analyzing internet voting security Special issue: The problems and potentials of voting systems, Communications of the ACM, issue.10, pp.4759-64, 2004. ,
Privacy and verifiability in voting systems: Methods, developments and trends, Computer Science Review, vol.10, pp.1-30, 2013. ,
DOI : 10.1016/j.cosrev.2013.08.002
Coercion-resistant electronic elections, Proceedings of the 2005 ACM workshop on Privacy in the electronic society , WPES '05, pp.61-70, 2005. ,
DOI : 10.1145/1102199.1102213
Coercion-resistant electronic elections, Proceedings of the 2005 ACM workshop on Privacy in the electronic society , WPES '05, pp.37-63, 2010. ,
DOI : 10.1145/1102199.1102213
DEMOS-2, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS '15, pp.352-363, 2015. ,
DOI : 10.1145/2810103.2813727
End-to-End Verifiable Elections in the Standard Model, Advances in Cryptology - EUROCRYPT 2015, pp.468-498, 2015. ,
DOI : 10.1007/978-3-662-46803-6_16
Election Verifiability in Electronic Voting Protocols, 15th European Symposium on Research in Computer Security (ESORICS2010), pp.389-404, 2010. ,
DOI : 10.1007/978-3-642-15497-3_24
Co-organized by the Council of Europe, Gesellschaft für Informatik and E-Voting.CC, 5th International Conference on Electronic Voting 2012, 2012. ,
Accountability: Definition and Relationship to Verifiability, Proceedings of the 17th ACM Conference on Computer and Communications Security, pp.526-535, 2010. ,
Verifiability, Privacy, and Coercion-Resistance: New Insights from a Case Study, 2011 IEEE Symposium on Security and Privacy, pp.538-553, 2011. ,
DOI : 10.1109/SP.2011.21
Clash Attacks on the Verifiability of E-Voting Systems, 2012 IEEE Symposium on Security and Privacy, pp.395-409, 2012. ,
DOI : 10.1109/SP.2012.32
Formal Analysis of Chaumian Mix Nets with Randomized Partial Checking, 2014 IEEE Symposium on Security and Privacy, pp.343-358, 2014. ,
DOI : 10.1109/SP.2014.29
Privacy and verifiability in electronic voting, 2010. ,
Verifiable voting systems. Computer and Information Security Handbook, pp.1103-1125, 2013. ,
Performance Requirements for End-to-End Verifiable Elections, Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2010. ,
Cast-as-Intended Verification in Norway, pp.49-63 ,
Three Voting Protocols: ThreeBallot, VAV and Twin, USENIX/ACCURATE Electronic Voting Technology, 2007. ,
Receipt-Free Mix-Type Voting Scheme, Advances in Cryptology -EUROCRYPT '95, International Conference on the Theory and Application of Cryptographic Techniques, Proceeding, pp.393-403, 1995. ,
DOI : 10.1007/3-540-49264-X_32
Computational Election Verifiability: Definitions and an Analysis of Helios and JCJ, Cryptology ePrint Archive, vol.233233, 2015. ,
Security Analysis of the Estonian Internet Voting System, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, pp.703-715, 2014. ,
DOI : 10.1145/2660267.2660315
New Techniques for Electronic Voting, USENIX Journal of Election Technology and Systems (JETS), vol.3809, issue.2, pp.46-69, 2015. ,
Panos Louridas, and Panayiotis Tsanakas. From Helios to Zeus, Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, vol.13, 2013. ,
A Sender Verifiable Mix-Net and a New Proof of a Shuffle, Advances in Cryptology -ASIACRYPT 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings, pp.273-292, 2005. ,
DOI : 10.1007/11593447_15
Security analysis of India's electronic voting machines, Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, pp.1-14, 2010. ,
DOI : 10.1145/1866307.1866309
Attacking the Washington, D.C. Internet Voting System, 16th Intl. Conference on Financial Cryptography and Data Security (FC'12), 2012. ,
DOI : 10.1007/978-3-642-32946-3_10