Helios voting system ,
Electing a university president using open-audit voting: Analysis of real-world use of Helios, Proceedings of the 2009 Conference on Electronic Voting Technology/Workshop on Trustworthy Elections, EVT/WOTE'09, pp.10-10, 2009. ,
Election verifiability for Helios under weaker trust assumptions, Proceedings of the 19th European Symposium on Research in Computer Security (ESORICS'14), vol.8713, pp.327-344, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01011294
A type system for privacy properties, 24th ACM Conference on Computer and Communications Security (CCS'17), pp.409-423, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01626109
What did I really vote for? On the usability of verifiable e-voting schemes, Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, CHI'18, vol.176, pp.1-176, 2018. ,
Private communication. The attack has been discovered by Peter Roenne and then described in the paper, vol.5 ,