The following publications are possibly variants of this publication:
- A Threat Analysis of Prêt à VoterPeter Y. A. Ryan, Thea Peacock. wote 2010: 200-215 [doi]
- Using Prêt à Voter in Victoria State ElectionsCraig Burton, Chris Culnane, James Heather, Thea Peacock, Peter Y. A. Ryan, Steve Schneider, Vanessa Teague, Roland Wen, Zhe Xia, Sriramkrishnan Srinivasan. uss 2012: [doi]
- Analysis, Improvement, and Simplification of Prêt à Voter with Paillier EncryptionZhe Xia, Steve A. Schneider, James Heather, Jacques Traoré. uss 2008: [doi]
- Versatile Prêt à Voter: Handling Multiple Election Methods with a Unified InterfaceZhe Xia, Chris Culnane, James Heather, Hugo Jonker, Peter Y. A. Ryan, Steve A. Schneider, Sriramkrishnan Srinivasan. indocrypt 2010: 98-114 [doi]
- Permutations in Prêt à VoterPeter Y. A. Ryan, Vanessa Teague. uss 2009: [doi]
- Prêt à Voter with Paillier encryptionPeter Y. A. Ryan. mcm, 48(9-10):1646-1662, 2008. [doi]
- Prêt à Voter with Confirmation CodesPeter Y. A. Ryan. uss 2011: [doi]
- Prêt à voter: a voter-verifiable voting systemPeter Y. A. Ryan, David Bismark, James Heather, Steve Schneider, Zhe Xia. tifs, 4(4):662-673, 2009. [doi]
- Receipt Freeness of Prêt à Voter Provably SecureDalia Khader, Peter Y. A. Ryan. iacr, 2011:594, 2011. [doi]