Helios: Web-based open-audit voting, USENIX Security Symposium, pp.335-348, 2008. ,
A risk assessment framework for electronic voting, International Journal of Technology, Policy and Management, vol.7, issue.2, pp.190-208, 2007. ,
DOI : 10.1504/IJTPM.2007.014537
Pretty Understandable Democracy - A Secure and Understandable Internet Voting Scheme, 2013 International Conference on Availability, Reliability and Security, pp.198-207, 2013. ,
DOI : 10.1109/ARES.2013.27
Practical Security Analysis of E-Voting Systems, Advances in Information and Computer Security, pp.320-335, 2007. ,
DOI : 10.1007/978-3-540-75651-4_22
Civitas: A secure voting system, 2007. ,
DOI : 10.1109/sp.2008.32
Verifying privacy-type properties of electronic voting protocols, Journal of Computer Security, vol.17, issue.4, pp.435-487, 2009. ,
DOI : 10.3233/JCS-2009-0340
URL : http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2008-01.pdf
Threat trees and matrices and threat instance risk analyzer, 2009. ,
Security requirements for non-political internet voting, Electronic Voting, vol.86, pp.203-212, 2006. ,
DOI : 10.1145/1232454.1232475
Secure electronic voting, 2012. ,
DOI : 10.1007/978-1-4615-0239-5
Coercion-resistant electronic elections, Proceedings of the 2005 ACM workshop on Privacy in the electronic society, pp.61-70, 2005. ,
DOI : 10.1007/978-3-642-12980-3_2
URL : http://eprint.iacr.org/2002/165.pdf
Development and application of a framework for evaluating multi???mode voting risks, Internet Research, vol.18, issue.1, pp.121-135, 2008. ,
DOI : 10.1145/1022594.1022620
The Monte Carlo Method, Journal of the American Statistical Association, vol.44, issue.247, pp.335-341, 1949. ,
DOI : 10.1080/01621459.1949.10483310
Revisiting Legal and Regulatory Requirements for Secure E-Voting, IFIP SEC, pp.469-480, 2002. ,
DOI : 10.1007/978-0-387-35586-3_37
A holistic framework for the evaluation of internet voting systems. Design, Development, and Use of Secure Electronic Voting Systems, pp.76-91, 2014. ,
SecIVo: a quantitative security evaluation framework for internet voting schemes, Annals of Telecommunications, vol.47, issue.2, pp.337-352, 2016. ,
DOI : 10.1007/978-3-642-38980-1_28
How to compare and analyse risks of internet voting versus other modes of voting, Electronic Government, an International Journal, vol.3, issue.1, pp.105-112, 2006. ,
DOI : 10.1504/EG.2006.008495
A weakest-adversary security metric for network configuration security analysis, Proceedings of the 2nd ACM workshop on Quality of protection , QoP '06, pp.31-38, 2006. ,
DOI : 10.1145/1179494.1179502
E-Voting Risk Assessment, International Journal of Information Security and Privacy, vol.5, issue.3, pp.19-35, 2011. ,
DOI : 10.4018/jisp.2011070102
Towards Internet voting security: A threat tree for risk assessment, 2010 Fifth International Conference on Risks and Security of Internet and Systems (CRiSIS), pp.1-7, 2010. ,
DOI : 10.1109/CRISIS.2010.5764925
Pretty Good Democracy, 2013 International Workshop on Security Protocols, pp.111-130, 2013. ,
DOI : 10.1007/978-3-642-36213-2_15
Measure and Integration, 2016. ,
DOI : 10.4171/159
A formal approach towards measuring trust in distributed systems, Proceedings of the 2011 ACM Symposium on Applied Computing, SAC '11, pp.1739-1745, 2011. ,
DOI : 10.1145/1982185.1982548
URL : http://www.informatik.tu-darmstadt.de/fileadmin/user_upload/Group_TK/filesDownload/TUD-CS-2011-0011.pdf
Determine the Resilience of Evaluated Internet Voting Systems, 2009 First International Workshop on Requirements Engineering for e-Voting Systems, pp.47-54, 2009. ,
DOI : 10.1109/RE-VOTE.2009.2