Helios: Web-based Open-Audit Voting, Proceedings of the 17th USENIX Security Symposium, pp.335-348, 2008. ,
Deciding Security for Protocols with Recursive Tests, Proceedings of the 23rd International Conference on Automated Deduction (CADE'11), pp.49-63, 2011. ,
DOI : 10.1007/11539452_19
URL : https://hal.archives-ouvertes.fr/inria-00638557
Automated Verification of Remote Electronic Voting Protocols in the Applied Pi-Calculus, 2008 21st IEEE Computer Security Foundations Symposium, pp.195-209, 2008. ,
DOI : 10.1109/CSF.2008.26
How Not to Prove Yourself: Pitfalls of the Fiat-Shamir Heuristic and Applications to Helios, Advances in Cryptology -ASIACRYPT 2012, pp.626-643, 2012. ,
DOI : 10.1007/978-3-642-34961-4_38
Automatic Verification of Security Protocols in the Symbolic Model: The Verifier ProVerif, Tutorial Lectures Lecture Notes in Computer Science, vol.299, issue.1-3, pp.54-87, 2013. ,
DOI : 10.1007/3-540-48660-7_29
URL : https://hal.archives-ouvertes.fr/hal-01102136
Modeling and verifying security protocols with the applied pi calculus and ProVerif. Foundations and Trends in Privacy and Security, pp.1-135, 2016. ,
DOI : 10.1561/3300000004
URL : https://hal.archives-ouvertes.fr/hal-01423760
Automated verification of selected equivalences for security protocols, 20th IEEE Symposium on Logic in Computer Science (LICS 2005), pp.331-340, 2005. ,
Automated Reasoning for Equivalences in the Applied Pi Calculus with Barriers, 2016 IEEE 29th Computer Security Foundations Symposium (CSF), 2016. ,
DOI : 10.1109/CSF.2016.29
URL : https://hal.archives-ouvertes.fr/hal-01423742
An overview of the ivote 2015 voting system Avaialable through https, 2015. ,
Decidable Analysis for a Class of Cryptographic Group Protocols with Unbounded Lists, 2009 22nd IEEE Computer Security Foundations Symposium, pp.277-289, 2009. ,
DOI : 10.1109/CSF.2009.10
URL : https://hal.archives-ouvertes.fr/inria-00426919
Civitas: Toward a Secure Voting System, 2008 IEEE Symposium on Security and Privacy (sp 2008), pp.354-368, 2008. ,
DOI : 10.1109/SP.2008.32
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.220.28
Election Verifiability for Helios under Weaker Trust Assumptions, Proceedings of the 19th European Symposium on Research in Computer Security (ESORICS'14), 2014. ,
DOI : 10.1007/978-3-319-11212-1_19
URL : https://hal.archives-ouvertes.fr/hal-01011294
Proverif model for the neuchâtel e-voting protocol. https://drive.google.com/open? ,
Machine-Checked Proofs of Privacy for Electronic Voting Protocols, 2017 IEEE Symposium on Security and Privacy (SP), 2017. ,
DOI : 10.1109/SP.2017.28
Attacking and fixing Helios: An analysis of ballot secrecy, Journal of Computer Security, vol.21, issue.1, pp.89-148, 2013. ,
DOI : 10.3233/JCS-2012-0458
URL : https://hal.archives-ouvertes.fr/hal-00732899
A formal analysis of the Norwegian E-voting protocol, Journal of Computer Security, vol.5, issue.1, pp.21-57, 2017. ,
DOI : 10.1109/CSF.2010.28
URL : https://hal.archives-ouvertes.fr/hal-00732907
Verifying privacy-type properties of electronic voting protocols, Journal of Computer Security, vol.17, issue.4, pp.435-487, 2009. ,
DOI : 10.3233/JCS-2009-0340
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.142.1731
2015 Neuch??tel???s Cast-as-Intended Verification Mechanism, 5th International Conference, pp.3-18, 2015. ,
DOI : 10.1007/978-3-319-22270-7_1
The norwegian internet voting protocol Cryptology ePrint Archive, 2013. ,
The Application of I-Voting for Estonian Parliamentary Elections of 2011, VoteID 2011, pp.208-223, 2012. ,
DOI : 10.1007/978-3-642-32747-6_13
Improving the Verifiability of the Estonian Internet Voting Scheme, E-Vote-ID 2016, pp.92-107, 2017. ,
DOI : 10.1007/978-3-642-12678-9_7
Coercion-Resistant Electronic Elections, Proceedings of Workshop on Privacy in the Eletronic Society, pp.61-70, 2005. ,
DOI : 10.1007/978-3-642-12980-3_2
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.11.8779
DEMOS-2, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS '15, pp.352-363, 2015. ,
DOI : 10.1007/978-3-662-46803-6_16
Ceremonies for End-to-End Verifiable Elections, Public-Key Cryptography -PKC 2017, pp.305-334, 2017. ,
DOI : 10.1007/978-3-642-38980-1_28
Analysis of an Electronic Voting Protocol in the Applied Pi Calculus, Programming Languages and Systems ? Proceedings of the 14th European Symposium on Programming, pp.186-200, 2005. ,
DOI : 10.1007/978-3-540-31987-0_14
sElect: A Lightweight Verifiable Remote Voting System, 2016 IEEE 29th Computer Security Foundations Symposium (CSF), pp.341-354, 2016. ,
DOI : 10.1109/CSF.2016.31
A hierarchy of authentication specifications, Proceedings 10th Computer Security Foundations Workshop, 1997. ,
DOI : 10.1109/CSFW.1997.596782
Verification of security protocols with lists: From length one to unbounded length, Journal of Computer Security (JCS), pp.781-816, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-00863387
E-voting at expatriates' mps elections in france, 5th International Conference on Electronic Voting 2012, pp.189-195, 2012. ,
Swiss post's e-voting solution. https://www.post.ch/ en/business/a-z-of-subjects/industry-solutions/swisspost-e-voting, 2017. ,
Swiss On-line Voting Protocol, 2016. ,
Security Analysis of the Estonian Internet Voting System, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, pp.703-715, 2014. ,
DOI : 10.1007/978-3-642-32946-3_10
Attacking the Washington, D.C. Internet Voting System, 16th Intl. Conference on Financial Cryptography and Data Security (FC'12), 2012. ,
DOI : 10.1007/978-3-642-32946-3_10
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.307.1859