Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Peter Y. A. Ryan
Peter Ryan
Author information
- University of Luxembourg
2010 – today
- 2013
[j20]Marc Pouly, Jürg Kohlas, Peter Y. A. Ryan: Generalized information theory for hints. Int. J. Approx. Reasoning 54(1): 228-251 (2013)
[c50]Gurchetan S. Grewal, Mark Dermot Ryan, Sergiu Bursuc, Peter Y. A. Ryan: Caveat Coercitor: Coercion-Evidence in Electronic Voting. IEEE Symposium on Security and Privacy 2013: 367-381
[c49]Denise Demirel, Maria Henning, Jeroen van de Graaf, Peter Y. A. Ryan, Johannes Buchmann: Prêt à Voter Providing Everlasting Privacy. VOTE-ID 2013: 156-175- 2012
[c48]Craig Burton, Chris Culnane, James Heather, Thea Peacock, Peter Y. A. Ryan, Steve Schneider, Sriramkrishnan Srinivasan, Vanessa Teague, Roland Wen, Zhe Xia: A Supervised Verifiable Voting Protocol for the Victorian Electoral Commission. Electronic Voting 2012: 81-94
[c47]Dalia Khader, Ben Smyth, Peter Y. A. Ryan, Feng Hao: A Fair and Robust Voting System by Broadcast. Electronic Voting 2012: 285-299
[c46]- 2011
[c45]Simon Kramer, Peter Y. A. Ryan: A modular multi-modal specification of real-timed, end-to-end voter-verifiable voting systems. REVOTE 2011: 9-21
[c44]
[c43]Denise Demirel, Maria Henning, Peter Y. A. Ryan, Steve Schneider, Melanie Volkamer: Feasibility Analysis of Prêt à Voter for German Federal Elections. VOTE-ID 2011: 158-173
[i5]R. Michael Alvarez, Josh Benaloh, Alon Rosen, Peter Y. A. Ryan: Verifiable Elections and the Public (Dagstuhl Seminar 11281). Dagstuhl Reports 1(7): 36-52 (2011)
[i4]Dalia Khader, Peter Y. A. Ryan: Receipt Freeness of Prêt à Voter Provably Secure. IACR Cryptology ePrint Archive 2011: 594 (2011)- 2010
[j19]Feng Hao, Peter Y. A. Ryan, Piotr Zielinski: Anonymous voting by two-round public discussion. IET Information Security 4(2): 62-67 (2010)
[j18]Feng Hao, Peter Ryan: J-PAKE: Authenticated Key Exchange without PKI. Transactions on Computational Science 11: 192-206 (2010)
[j17]David Chaum, Richard Carback, Jeremy Clark, Aleksander Essex, Stefan Popoveniuc, Ronald L. Rivest, Peter Y. A. Ryan, Emily Shen, Alan T. Sherman, Poorvi L. Vora: Corrections to scantegrity II: end-to-end verifiability by voters of optical scan elections through confirmation codes. IEEE Transactions on Information Forensics and Security 5(1): 194 (2010)
[c42]James Heather, Peter Y. A. Ryan, Vanessa Teague: Pretty Good Democracy for More Expressive Voting Schemes. ESORICS 2010: 405-423
[c41]Zhe Xia, Chris Culnane, James Heather, Hugo Jonker, Peter Y. A. Ryan, Steve A. Schneider, Sriramkrishnan Srinivasan: Versatile Prêt à Voter: Handling Multiple Election Methods with a Unified Interface. INDOCRYPT 2010: 98-114
[c40]Peter Y. A. Ryan, Thea Peacock: A Threat Analysis of Prêt à Voter. Towards Trustworthy Elections 2010: 200-215
[e7]David Chaum, Markus Jakobsson, Ronald L. Rivest, Peter Y. A. Ryan, Josh Benaloh, Miroslaw Kutylowski, Ben Adida (Eds.): Towards Trustworthy Elections, New Directions in Electronic Voting. Lecture Notes in Computer Science 6000, Springer 2010, ISBN 978-3-642-12979-7
[i3]Feng Hao, Peter Ryan: J-PAKE: Authenticated Key Exchange Without PKI. IACR Cryptology ePrint Archive 2010: 190 (2010)
2000 – 2009
- 2009
[j16]Giampaolo Bella, Peter Y. A. Ryan: Journal of Computer SecuritySpecial Number devoted to the best papers of the Security Track at the 2006 ACM Symposium on Applied Computing. Journal of Computer Security 17(3): 237 (2009)
[j15]David Chaum, Richard Carback, Jeremy Clark, Aleksander Essex, Stefan Popoveniuc, Ronald L. Rivest, Peter Y. A. Ryan, Emily Shen, Alan T. Sherman, Poorvi L. Vora: Scantegrity II: end-to-end verifiability by voters of optical scan elections through confirmation codes. IEEE Transactions on Information Forensics and Security 4(4): 611-627 (2009)
[j14]Peter Y. A. Ryan, David Bismark, James Heather, Steve Schneider, Zhe Xia: Prêt à voter: a voter-verifiable voting system. IEEE Transactions on Information Forensics and Security 4(4): 662-673 (2009)
[c39]Peter Y. A. Ryan: How Many Election Officials Does It Take to Change an Election? ARSPA-WITS 2009: 211-221
[c38]David Bismark, James Heather, Roger M. A. Peel, Steve Schneider, Zhe Xia, Peter Y. A. Ryan: Experiences Gained from the first Prêt à Voter Implementation. REVOTE 2009: 19-28
[c37]
[c36]
[c35]Ali Nasrat Haidar, Peter V. Coveney, Ali E. Abdallah, Peter Y. A. Ryan, Bruce Beckles, J. M. Brooke, M. A. S. Jones: Formal Modelling of a Usable Identity Management Solution for Virtual Organisations. FAVO 2009: 41-50
[e6]Peter Y. A. Ryan, Berry Schoenmakers (Eds.): E-Voting and Identity, Second International Conference, VOTE-ID 2009, Luxembourg, September 7-8, 2009. Proceedings. Lecture Notes in Computer Science 5767, Springer 2009, ISBN 978-3-642-04134-1- 2008
[j13]Jeremy Bryans, Maciej Koutny, Laurent Mazaré, Peter Y. A. Ryan: Opacity generalised to transition systems. Int. J. Inf. Sec. 7(6): 421-435 (2008)
[j12]Peter Y. A. Ryan: Prêt à Voter with Paillier encryption. Mathematical and Computer Modelling 48(9-10): 1646-1662 (2008)
[c34]David Lundin, Peter Y. A. Ryan: Human Readable Paper Verification of Prêt à Voter. ESORICS 2008: 379-395
[c33]Roberto Araujo, Peter Y. A. Ryan: Improving the Farnel Voting Scheme. Electronic Voting 2008: 169-184
[c32]Feng Hao, Peter Y. A. Ryan: Password Authenticated Key Exchange by Juggling. Security Protocols Workshop 2008: 159-171
[c31]Peter Y. A. Ryan: Remodelling the Attacker in Voting Protocols. Security Protocols Workshop 2008: 232-234
[c30]Peter Y. A. Ryan: Remodelling the Attacker in Voting Protocols (Transcript of Discussion). Security Protocols Workshop 2008: 235-240
[c29]David Chaum, Richard Carback, Jeremy Clark, Aleksander Essex, Stefan Popoveniuc, Ronald L. Rivest, Peter Y. A. Ryan, Emily Shen, Alan T. Sherman: Scantegrity II: End-to-End Verifiability for Optical Scan Election Systems using Invisible Ink Confirmation Codes. EVT 2008
[e5]David Chaum, Miroslaw Kutylowski, Ronald L. Rivest, Peter Y. A. Ryan (Eds.): Frontiers of Electronic Voting, 29.07. - 03.08.2007. Dagstuhl Seminar Proceedings 07311, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany 2008
[i2]Roberto Araujo, Peter Y. A. Ryan: Improving the Farnel, Threeballot, and Randell-Ryan Voting Schemes. IACR Cryptology ePrint Archive 2008: 82 (2008)- 2007
[j11]Theodosis Dimitrakos, Fabio Martinelli, Peter Y. A. Ryan, Steve Schneider: Guest Editors' Preface. Int. J. Inf. Sec. 6(2-3): 65-66 (2007)
[c28]David Chaum, Miroslaw Kutylowski, Ronald L. Rivest, Peter Y. A. Ryan: 07311 Executive Summary -- Frontiers of Electronic Voting. Frontiers of Electronic Voting 2007
[c27]David Chaum, Miroslaw Kutylowski, Ronald L. Rivest, Peter Y. A. Ryan: 07311 Abstracts Collection -- Frontiers of Electronic Voting. Frontiers of Electronic Voting 2007
[c26]Thomas Tjøstheim, Thea Peacock, Peter Y. A. Ryan: A Model for System-Based Analysis of Voting Systems. Security Protocols Workshop 2007: 114-130
[e4]Theodosis Dimitrakos, Fabio Martinelli, Peter Y. A. Ryan, Steve A. Schneider (Eds.): Formal Aspects in Security and Trust, Fourth International Workshop, FAST 2006, Hamilton, Ontario, Canada, August 26-27, 2006, Revised Selected Papers. Lecture Notes in Computer Science 4691, Springer 2007, ISBN 978-3-540-75226-4
[i1]David Chaum, Jeroen van de Graaf, Peter Y. A. Ryan, Poorvi L. Vora: Secret Ballot Elections with Unconditional Integrity. IACR Cryptology ePrint Archive 2007: 270 (2007)- 2006
[j10]Brian Randell, Peter Y. A. Ryan: Voting Technologies and Trust. IEEE Security & Privacy 4(5): 50-56 (2006)
[c25]Jeremy Bryans, Bev Littlewood, Peter Y. A. Ryan, Lorenzo Strigini: E-voting: Dependability Requirements and Design for Dependability. ARES 2006: 988-995
[c24]
[c23]Giampaolo Bella, Peter Y. A. Ryan: Editorial message: special track on computer security. SAC 2006: 321-322
[c22]Peter Y. A. Ryan, Thea Peacock: Putting the Human Back in Voting Protocols. Security Protocols Workshop 2006: 13-19
[c21]Peter Y. A. Ryan: Putting the Human Back in Voting Protocols. Security Protocols Workshop 2006: 20-25
[e3]Theodosis Dimitrakos, Fabio Martinelli, Peter Y. A. Ryan, Steve A. Schneider (Eds.): Formal Aspects in Security and Trust, Third International Workshop, FAST 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected Papers. Lecture Notes in Computer Science 3866, Springer 2006, ISBN 3-540-32628-6- 2005
[j9]Jeremy Bryans, Maciej Koutny, Peter Y. A. Ryan: Modelling Opacity Using Petri Nets. Electr. Notes Theor. Comput. Sci. 121: 101-115 (2005)
[j8]Giampaolo Bella, Peter Y. A. Ryan: Guest Editors' preface. Journal of Computer Security 13(5): 697- (2005)
[j7]Terry Butler, Peter Ryan, Tracy Chao: Gender and Technology in the Liberal Arts: Aptitudes, Attitudes, and Skills Acquisition. JITE 4: 347-362 (2005)
[c20]
[c19]David Chaum, Peter Y. A. Ryan, Steve A. Schneider: A Practical Voter-Verifiable Election Scheme. ESORICS 2005: 118-139
[c18]Brian Randell, Peter Y. A. Ryan: Voting Technologies and Trust. Formal Aspects in Security and Trust 2005: 1-4
[c17]Jeremy Bryans, Maciej Koutny, Laurent Mazaré, Peter Y. A. Ryan: Opacity Generalised to Transition Systems. Formal Aspects in Security and Trust 2005: 81-95
[c16]
[c15]- 2004
[c14]Peter Y. A. Ryan: Shedding Light on Haunted Corners of Information Security. 25 Years Communicating Sequential Processes 2004: 264-264
[c13]Robert J. Stroud, Ian S. Welch, John P. Warne, Peter Y. A. Ryan: A Qualitative Analysis of the Intrusion-Tolerance Capabilities of the MAFTIA Architecture. DSN 2004: 453-
[c12]
[c11]Jeremy Bryans, Maciej Koutny, Peter Y. A. Ryan: Modelling Dynamic Opacity Using Petri Nets with Silent Actions. Formal Aspects in Security and Trust 2004: 159-172
[c10]Giampaolo Bella, Peter Ryan: Editoral message: special track on computer security. SAC 2004: 373-374
[e2]Pierangela Samarati, Peter Y. A. Ryan, Dieter Gollmann, Refik Molva (Eds.): Computer Security - ESORICS 2004, 9th European Symposium on Research Computer Security, Sophia Antipolis, France, September 13-15, 2004, Proceedings. Lecture Notes in Computer Science 3193, Springer 2004, ISBN 3-540-22987-6- 2003
[j6]Tracy Chao, Terry Butler, Peter Ryan: Providing a Technology Edge for Liberal Arts Students. JITE 2: 331-348 (2003)
[j5]Li Gong, Joshua D. Guttman, Peter Y. A. Ryan, Steve A. Schneider: Guest editorial overview. IEEE Journal on Selected Areas in Communications 21(1): 1-4 (2003)
[c9]
[e1]Ali E. Abdallah, Peter Ryan, Steve Schneider (Eds.): Formal Aspects of Security, First International Conference, FASec 2002, London, UK, December 16-18, 2002, Revised Papers. Lecture Notes in Computer Science 2629, Springer 2003, ISBN 3-540-20693-0- 2002
[c8]Peter Ryan, Ragni Ryvold Arnesen: A Process Algebraic Approach to Security Policies. DBSec 2002: 301-312- 2001
[b1]Peter Y. A. Ryan, Steve A. Schneider: Modelling and analysis of security protocols. Addison-Wesley-Longman 2001, ISBN 978-0-201-67471-2, pp. I-XIV, 1-300
[j4]Peter Y. A. Ryan, Steve A. Schneider: Process Algebra and Non-Interference. Journal of Computer Security 9(1/2): 75-103 (2001)
[c7]Peter Ryan, John D. McLean, Jonathan K. Millen, Virgil D. Gligor: Non-Interference: Who Needs It? CSFW 2001: 237-- 2000
[j3]
[j2]Peter Y. A. Ryan: Process Algebra and Information Flow. Electr. Notes Theor. Comput. Sci. 40: 360 (2000)
[c6]
[c5]Peter Y. A. Ryan: Open Questions (Transcript of Discussion). Security Protocols Workshop 2000: 49-53
1990 – 1999
- 1999
[c4]- 1998
[j1]Peter Y. A. Ryan, Steve A. Schneider: An Attack on a Recursive Authentication Protocol. A Cautionary Tale. Inf. Process. Lett. 65(1): 7-10 (1998)
[c3]Peter Y. A. Ryan, Dieter Gollmann, Li Gong, Günter Karjoth, Chris J. Mitchell: Panel Introduction: The Security Impact of Distributed Computing Technologies. CSFW 1998: 164-166- 1996
[c2]- 1991
[c1]
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-02 11:01 CEST by the dblp team



