B. Adida, O. Olivier-de-marneffe, and . Pereira, Helios voting system

B. Adida, O. Olivier-de-marneffe, J. Pereira, and . Quisquater, Electing a university president using open-audit voting: Analysis of real-world use of Helios, Proceedings of the 2009 Conference on Electronic Voting Technology/Workshop on Trustworthy Elections, EVT/WOTE'09, pp.10-10, 2009.

V. Cortier, D. Galindo, S. Glondu, and M. Izabachene, Election verifiability for Helios under weaker trust assumptions, Proceedings of the 19th European Symposium on Research in Computer Security (ESORICS'14), vol.8713, pp.327-344, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01011294

V. Cortier, N. Grimm, J. Lallemand, and M. Maffei, A type system for privacy properties, 24th ACM Conference on Computer and Communications Security (CCS'17), pp.409-423, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01626109

K. Marky, O. Kulyk, K. Renaud, and M. Volkamer, What did I really vote for? On the usability of verifiable e-voting schemes, Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, CHI'18, vol.176, pp.1-176, 2018.

P. Roenne, Private communication. The attack has been discovered by Peter Roenne and then described in the paper, vol.5