M. Abadi and C. Fournet, Mobile Values, New Names, and Secure Communication, Proceedings of the 28th ACM Symposium on Principles of Programming Languages, pp.104-115, 2001.
URL : https://hal.archives-ouvertes.fr/hal-01423924

B. Adida, Helios: Web-based Open-Audit Voting, Proceedings of the 17th USENIX Security Symposium, pp.335-348, 2008.

B. Adida, O. Olivier-de-marneffe, J. Pereira, and . Quisquater, Electing a University President Using Open-Audit Voting: Analysis of Real-World Use of Helios, USENIX/ACCURATE Electronic Voting Technology, 2009.

C. Baum, I. Damgård, and C. Orlandi, Publicly auditable secure multi-party computation. Cryptology ePrint Archive, 2014.

J. Ben-nun, N. Fahri, M. Llewellyn, B. Riva, A. Rosen et al., A New Implementation of a Dual (Paper and Cryptographic) Voting System, Kripp et al. [36], pp.315-329

J. Benaloh, Simple verifiable elections, USENIX/ACCURATE Electronic Voting Technology Workshop, EVT'06, 2006.

J. Daniel and C. Benaloh, Verifiable Secret-Ballot Elections, 1987.

J. A. Calandrino, A. J. Feldman, J. A. Halderman, D. Wagner, H. Yu et al., Source Code Review of the Diebold Voting System Report commissioned as part of the California Secretary of State's Top-To-Bottom Review of California voting systems, 2007.

D. Chaum, R. Carback, J. Clark, A. Essex, S. Popoveniuc et al., Scantegrity II: End-to- End Verifiability for Optical Scan Election Systems using Invisible Ink Confirmation Codes USENIX Association, USENIX/ACCURATE Electronic Voting Technology, 2008.

B. Chevallier-mames, P. Fouque, D. Pointcheval, J. Stern, and J. Traoré, On Some Incompatible Properties of Voting Schemes, Towards Trustworthy Elections, New Directions in Electronic Voting, pp.191-199, 2010.
DOI : 10.1007/978-3-642-12980-3_11

URL : https://hal.archives-ouvertes.fr/inria-00539539

M. R. Clarkson, S. Chong, and A. C. Myers, Civitas: Toward a Secure Voting System, 2008 IEEE Symposium on Security and Privacy (sp 2008), pp.354-368, 2008.
DOI : 10.1109/SP.2008.32

V. Cortier, F. Eigner, S. Kremer, M. Maffei, and C. Wiedling, Type-Based Verification of Electronic Voting Protocols, Proceedings of the 4th Conference on Principles of Security and Trust (POST'15), 2015.
DOI : 10.1007/978-3-662-46666-7_16

URL : https://hal.archives-ouvertes.fr/hal-01103545

V. Cortier, D. Galindo, S. Glondu, and M. Izabachene, Election Verifiability for Helios under Weaker Trust Assumptions, Proceedings of the 19th European Symposium on Research in Computer Security (ESORICS'14), 2014.
DOI : 10.1007/978-3-319-11212-1_19

URL : https://hal.archives-ouvertes.fr/hal-01080292

V. Cortier, D. Galindo, R. Küsters, J. Müller, and T. Truderung, SoK: Verifiability Notions for E-Voting Protocols, 2016 IEEE Symposium on Security and Privacy (SP), 2016.
DOI : 10.1109/SP.2016.52

URL : https://hal.archives-ouvertes.fr/hal-01280445

R. Cramer, R. Gennaro, and B. Schoenmakers, A Secure and Optimally Efficient Multi-Authority Election Scheme, Advances in Cryptology ? EUROCRYPT '97, International Conference on the Theory and Application of Cryptographic Techniques, volume 1233 of Lecture Notes in Computer Science, 1997.

C. Culnane, Y. A. Peter, S. A. Ryan, V. Schneider, and . Teague, vVote, ACM Transactions on Information and System Security, vol.18, issue.1, p.3, 2015.
DOI : 10.1145/2746338

C. Culnane and S. A. Schneider, A Peered Bulletin Board for Robust Use in Verifiable Voting Systems, 2014 IEEE 27th Computer Security Foundations Symposium, pp.19-22
DOI : 10.1109/CSF.2014.20

E. Cuvelier, O. Pereira, and T. Peters, Election Verifiability or Ballot Privacy: Do We Need to Choose?, Computer Security -ESORICS 2013 -18th European Symposium on Research in Computer Security Proceedings, pp.481-498, 2013.
DOI : 10.1007/978-3-642-40203-6_27

J. Epstein, Weakness in Depth: A Voting Machine's Demise, IEEE Security & Privacy, vol.13, issue.3, pp.55-58, 2015.
DOI : 10.1109/MSP.2015.46

D. Galindo, S. Guasch, and J. Puiggali, 2015 Neuch??tel???s Cast-as-Intended Verification Mechanism
DOI : 10.1007/978-3-319-22270-7_1

S. Gurchetan, M. Grewal, L. Dermot-ryan, M. R. Chen, and . Clarkson, Du-Vote: Remote Electronic Voting with Untrusted Computers, IEEE 28th Computer Security Foundations Symposium, CSF 2015, pp.13-17, 2015.

B. Hosp and P. L. Vora, An information-theoretic model of voting systems, Mathematical and Computer Modelling, vol.48, issue.9-10
DOI : 10.1016/j.mcm.2008.05.040

P. Y. Rivest and . Ryan, Frontiers of Electronic Voting, 29.07. -03.08, 07311 of Dagstuhl Seminar Proceedings. Internationales Begegnungs-und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, 2007.

D. Jefferson, A. D. Rubin, B. Simons, and D. Wagner, Analyzing internet voting security Special issue: The problems and potentials of voting systems, Communications of the ACM, issue.10, pp.4759-64, 2004.

H. Jonker, S. Mauw, and J. Pang, Privacy and verifiability in voting systems: Methods, developments and trends, Computer Science Review, vol.10, pp.1-30, 2013.
DOI : 10.1016/j.cosrev.2013.08.002

A. Juels, D. Catalano, and M. Jakobsson, Coercion-resistant electronic elections, Proceedings of the 2005 ACM workshop on Privacy in the electronic society , WPES '05, pp.61-70, 2005.
DOI : 10.1145/1102199.1102213

A. Juels, D. Catalano, and M. Jakobsson, Coercion-resistant electronic elections, Proceedings of the 2005 ACM workshop on Privacy in the electronic society , WPES '05, pp.37-63, 2010.
DOI : 10.1145/1102199.1102213

A. Kiayias, T. Zacharias, and B. Zhang, DEMOS-2, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS '15, pp.352-363, 2015.
DOI : 10.1145/2810103.2813727

A. Kiayias, T. Zacharias, and B. Zhang, End-to-End Verifiable Elections in the Standard Model, Advances in Cryptology - EUROCRYPT 2015, pp.468-498, 2015.
DOI : 10.1007/978-3-662-46803-6_16

S. Kremer, M. Ryan, and B. Smyth, Election Verifiability in Electronic Voting Protocols, 15th European Symposium on Research in Computer Security (ESORICS2010), pp.389-404, 2010.
DOI : 10.1007/978-3-642-15497-3_24

J. Manuel, M. Kripp, R. Volkamer, and . Grimm, Co-organized by the Council of Europe, Gesellschaft für Informatik and E-Voting.CC, 5th International Conference on Electronic Voting 2012, 2012.

R. Küsters, T. Truderung, and A. Vogt, Accountability: Definition and Relationship to Verifiability, Proceedings of the 17th ACM Conference on Computer and Communications Security, pp.526-535, 2010.

R. Küsters, T. Truderung, and A. Vogt, Verifiability, Privacy, and Coercion-Resistance: New Insights from a Case Study, 2011 IEEE Symposium on Security and Privacy, pp.538-553, 2011.
DOI : 10.1109/SP.2011.21

R. Küsters, T. Truderung, and A. Vogt, Clash Attacks on the Verifiability of E-Voting Systems, 2012 IEEE Symposium on Security and Privacy, pp.395-409, 2012.
DOI : 10.1109/SP.2012.32

R. Küsters, T. Truderung, and A. Vogt, Formal Analysis of Chaumian Mix Nets with Randomized Partial Checking, 2014 IEEE Symposium on Security and Privacy, pp.343-358, 2014.
DOI : 10.1109/SP.2014.29

L. Langer, Privacy and verifiability in electronic voting, 2010.

T. Peacock, Y. Peter, S. Ryan, Z. Schneider, and . Xia, Verifiable voting systems. Computer and Information Security Handbook, pp.1103-1125, 2013.

S. Popoveniuc, J. Kelsey, A. Regenscheid, and P. L. Vora, Performance Requirements for End-to-End Verifiable Elections, Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2010.

J. Puigalli and S. Guasch, Cast-as-Intended Verification in Norway, pp.49-63

R. L. Rivest and W. D. Smith, Three Voting Protocols: ThreeBallot, VAV and Twin, USENIX/ACCURATE Electronic Voting Technology, 2007.

K. Sako and J. Kilian, Receipt-Free Mix-Type Voting Scheme, Advances in Cryptology -EUROCRYPT '95, International Conference on the Theory and Application of Cryptographic Techniques, Proceeding, pp.393-403, 1995.
DOI : 10.1007/3-540-49264-X_32

B. Smyth, S. Frink, and M. R. Clarkson, Computational Election Verifiability: Definitions and an Analysis of Helios and JCJ, Cryptology ePrint Archive, vol.233233, 2015.

D. Springall, T. Finkenauer, Z. Durumeric, J. Kitcat, H. Hursti et al., Security Analysis of the Estonian Internet Voting System, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, pp.703-715, 2014.
DOI : 10.1145/2660267.2660315

A. Szepieniec and B. Preneel, New Techniques for Electronic Voting, USENIX Journal of Election Technology and Systems (JETS), vol.3809, issue.2, pp.46-69, 2015.

G. Tsoukalas and K. Papadimitriou, Panos Louridas, and Panayiotis Tsanakas. From Helios to Zeus, Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, vol.13, 2013.

D. Wikström, A Sender Verifiable Mix-Net and a New Proof of a Shuffle, Advances in Cryptology -ASIACRYPT 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings, pp.273-292, 2005.
DOI : 10.1007/11593447_15

S. Wolchok, E. Wustrow, J. A. Halderman, H. K. Prasad, A. Kankipati et al., Security analysis of India's electronic voting machines, Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, pp.1-14, 2010.
DOI : 10.1145/1866307.1866309

S. Wolchok, E. Wustrow, D. Isabel, and J. A. Halderman, Attacking the Washington, D.C. Internet Voting System, 16th Intl. Conference on Financial Cryptography and Data Security (FC'12), 2012.
DOI : 10.1007/978-3-642-32946-3_10