The following publications are possibly variants of this publication:
- Attacking and fixing Helios: An analysis of ballot secrecyVéronique Cortier, Ben Smyth. iacr, 2010:625, 2010. [doi]
- Attacking and fixing Helios: An analysis of ballot secrecyVéronique Cortier, Ben Smyth. jcs, 21(1):89-148, 2013. [doi]
- Replay attacks that violate ballot secrecy in HeliosBen Smyth. iacr, 2012:185, 2012. [doi]
- Ballot secrecy: Security definition, sufficient conditions, and analysis of HeliosBen Smyth. jcs, 29(6):551-611, 2021. [doi]
- Adapting Helios for provable ballot privacyDavid Bernhard, Véronique Cortier, Olivier Pereira, Ben Smyth, Bogdan Warinschi. iacr, 2016:756, 2016. [doi]
- Adapting Helios for Provable Ballot PrivacyDavid Bernhard, Véronique Cortier, Olivier Pereira, Ben Smyth, Bogdan Warinschi. esorics 2011: 335-354 [doi]
- Ballot secrecy and ballot independence coincideBen Smyth, David Bernhard. iacr, 2013:235, 2013. [doi]
- Ballot Secrecy and Ballot Independence CoincideBen Smyth, David Bernhard. esorics 2013: 463-480 [doi]