B. Adida, Helios: Web-based Open-Audit Voting, Proceedings of the 17th USENIX Security Symposium, pp.335-348, 2008.

M. Arnaud, V. Cortier, and S. Delaune, Deciding Security for Protocols with Recursive Tests, Proceedings of the 23rd International Conference on Automated Deduction (CADE'11), pp.49-63, 2011.
DOI : 10.1007/11539452_19

URL : https://hal.archives-ouvertes.fr/inria-00638557

M. Backes, C. Hritcu, and M. Maffe, Automated Verification of Remote Electronic Voting Protocols in the Applied Pi-Calculus, 2008 21st IEEE Computer Security Foundations Symposium, pp.195-209, 2008.
DOI : 10.1109/CSF.2008.26

D. Bernhard, O. Pereira, and B. Warinschi, How Not to Prove Yourself: Pitfalls of the Fiat-Shamir Heuristic and Applications to Helios, Advances in Cryptology -ASIACRYPT 2012, pp.626-643, 2012.
DOI : 10.1007/978-3-642-34961-4_38

B. Blanchet, Automatic Verification of Security Protocols in the Symbolic Model: The Verifier ProVerif, Tutorial Lectures Lecture Notes in Computer Science, vol.299, issue.1-3, pp.54-87, 2013.
DOI : 10.1007/3-540-48660-7_29

URL : https://hal.archives-ouvertes.fr/hal-01102136

B. Blanchet, Modeling and verifying security protocols with the applied pi calculus and ProVerif. Foundations and Trends in Privacy and Security, pp.1-135, 2016.
DOI : 10.1561/3300000004

URL : https://hal.archives-ouvertes.fr/hal-01423760

B. Blanchet, M. Abadi, and C. Fournet, Automated verification of selected equivalences for security protocols, 20th IEEE Symposium on Logic in Computer Science (LICS 2005), pp.331-340, 2005.

B. Blanchet and B. Smyth, Automated Reasoning for Equivalences in the Applied Pi Calculus with Barriers, 2016 IEEE 29th Computer Security Foundations Symposium (CSF), 2016.
DOI : 10.1109/CSF.2016.29

URL : https://hal.archives-ouvertes.fr/hal-01423742

I. Brightwell, J. Cucurull, D. Galindo, and S. Guasch, An overview of the ivote 2015 voting system Avaialable through https, 2015.

N. Chridi, M. Turuani, and M. Rusinowitch, Decidable Analysis for a Class of Cryptographic Group Protocols with Unbounded Lists, 2009 22nd IEEE Computer Security Foundations Symposium, pp.277-289, 2009.
DOI : 10.1109/CSF.2009.10

URL : https://hal.archives-ouvertes.fr/inria-00426919

M. R. Clarkson, S. Chong, and A. C. Myers, Civitas: Toward a Secure Voting System, 2008 IEEE Symposium on Security and Privacy (sp 2008), pp.354-368, 2008.
DOI : 10.1109/SP.2008.32

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.220.28

V. Cortier, D. Galindo, S. Glondu, and M. Izabachene, Election Verifiability for Helios under Weaker Trust Assumptions, Proceedings of the 19th European Symposium on Research in Computer Security (ESORICS'14), 2014.
DOI : 10.1007/978-3-319-11212-1_19

URL : https://hal.archives-ouvertes.fr/hal-01011294

V. Cortier, D. Galindo, and M. Turuani, Proverif model for the neuchâtel e-voting protocol. https://drive.google.com/open?

V. Cortier, B. Schmidt, C. C. Dragan, P. Strub, F. Dupressoir et al., Machine-Checked Proofs of Privacy for Electronic Voting Protocols, 2017 IEEE Symposium on Security and Privacy (SP), 2017.
DOI : 10.1109/SP.2017.28

V. Cortier and B. Smyth, Attacking and fixing Helios: An analysis of ballot secrecy, Journal of Computer Security, vol.21, issue.1, pp.89-148, 2013.
DOI : 10.3233/JCS-2012-0458

URL : https://hal.archives-ouvertes.fr/hal-00732899

V. Cortier and C. Wiedling, A formal analysis of the Norwegian E-voting protocol, Journal of Computer Security, vol.5, issue.1, pp.21-57, 2017.
DOI : 10.1109/CSF.2010.28

URL : https://hal.archives-ouvertes.fr/hal-00732907

S. Delaune, S. Kremer, and M. Ryan, Verifying privacy-type properties of electronic voting protocols, Journal of Computer Security, vol.17, issue.4, pp.435-487, 2009.
DOI : 10.3233/JCS-2009-0340

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.142.1731

D. Galindo, S. Guasch, and J. Puiggali, 2015 Neuch??tel???s Cast-as-Intended Verification Mechanism, 5th International Conference, pp.3-18, 2015.
DOI : 10.1007/978-3-319-22270-7_1

K. Gjøsteen, The norwegian internet voting protocol Cryptology ePrint Archive, 2013.

S. Heiberg, P. Laud, and J. Willemson, The Application of I-Voting for Estonian Parliamentary Elections of 2011, VoteID 2011, pp.208-223, 2012.
DOI : 10.1007/978-3-642-32747-6_13

S. Heiberg, T. Martens, P. Vinkel, and J. Willemson, Improving the Verifiability of the Estonian Internet Voting Scheme, E-Vote-ID 2016, pp.92-107, 2017.
DOI : 10.1007/978-3-642-12678-9_7

A. Juels, D. Catalano, and M. Jakobsson, Coercion-Resistant Electronic Elections, Proceedings of Workshop on Privacy in the Eletronic Society, pp.61-70, 2005.
DOI : 10.1007/978-3-642-12980-3_2

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.11.8779

A. Kiayias, T. Zacharias, and B. Zhang, DEMOS-2, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS '15, pp.352-363, 2015.
DOI : 10.1007/978-3-662-46803-6_16

A. Kiayias, T. Zacharias, and B. Zhang, Ceremonies for End-to-End Verifiable Elections, Public-Key Cryptography -PKC 2017, pp.305-334, 2017.
DOI : 10.1007/978-3-642-38980-1_28

S. Kremer and M. Ryan, Analysis of an Electronic Voting Protocol in the Applied Pi Calculus, Programming Languages and Systems ? Proceedings of the 14th European Symposium on Programming, pp.186-200, 2005.
DOI : 10.1007/978-3-540-31987-0_14

R. Küsters, J. Müller, E. Scapin, and T. Truderung, sElect: A Lightweight Verifiable Remote Voting System, 2016 IEEE 29th Computer Security Foundations Symposium (CSF), pp.341-354, 2016.
DOI : 10.1109/CSF.2016.31

G. Lowe, A hierarchy of authentication specifications, Proceedings 10th Computer Security Foundations Workshop, 1997.
DOI : 10.1109/CSFW.1997.596782

M. Paiola and B. Blanchet, Verification of security protocols with lists: From length one to unbounded length, Journal of Computer Security (JCS), pp.781-816, 2013.
URL : https://hal.archives-ouvertes.fr/hal-00863387

T. Pinault and P. Courtade, E-voting at expatriates' mps elections in france, 5th International Conference on Electronic Voting 2012, pp.189-195, 2012.

. Swiss and . Post, Swiss post's e-voting solution. https://www.post.ch/ en/business/a-z-of-subjects/industry-solutions/swisspost-e-voting, 2017.

. Scytl, Swiss On-line Voting Protocol, 2016.

D. Springall, T. Finkenauer, Z. Durumeric, J. Kitcat, H. Hursti et al., Security Analysis of the Estonian Internet Voting System, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, pp.703-715, 2014.
DOI : 10.1007/978-3-642-32946-3_10

S. Wolchok, E. Wustrow, D. Isabel, and J. A. Halderman, Attacking the Washington, D.C. Internet Voting System, 16th Intl. Conference on Financial Cryptography and Data Security (FC'12), 2012.
DOI : 10.1007/978-3-642-32946-3_10

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.307.1859