Information Technology Journal1812-56381812-5646Asian Network for Scientific Information10.3923/itj.2008.1133.1140MengBo 8200878The internet voting protocols is the core part of the internet voting system. In order to put the internet voting protocols into practice they should have several key properties, such as privacy, completeness, soundness, unreusability, fairness, eligibility and invariableness, universal verifiability, receipt-freeness and coercion-resistance. Formal method is an important tool to assess these properties. But most of these properties are analyzed with informal method. The applied pi calculus can be used to model and verify the security protocols, such as internet voting protocol. In this study, firstly, privacy and coercion-resistance properties are researched. Then a typical internet voting protocol is modeled with applied pi calculus. Thirdly privacy and coercion-resistance of the typical internet voting protocol are analyzed with applied pi calculus. According to the result of analysis the typical internet voting protocol has privacy and coercion-resistance properties.]]>Abadi, M. and C. Fournet,20012001pp: 104115Acquisti, A.,20042004Benaloh, J. and D. Tuinstra,19941994pp: 544553Delaune, S., S. Kremer and M.D. Ryan,20062006pp: 2842Fujioka, A., T. Okamoto and K. Ohta,19921992pp: 244251Juels, A., D. Catalano and M. Jakobsson,20052005pp: 6170Juels, A. and M. Jakobsson,20022002Kremer, S. and M.D. Ryan,20053444186200Lee, B., C. Boyd, E. Dawson, K. Kim, J. Yang and S. Yood,20042004pp: 114Meng, B.,20072007pp: 721726Ryan, K.M. and S.S. Delaune,20062006pp: 18