default search action
BibTeX records: Peter Y. A. Ryan
@inproceedings{DBLP:conf/asiaccs/ArriagaRS24, author = {Afonso Arriaga and Peter Y. A. Ryan and Marjan Skrobot}, editor = {Jianying Zhou and Tony Q. S. Quek and Debin Gao and Alvaro A. C{\'{a}}rdenas}, title = {SweetPAKE: Key exchange with decoy passwords}, booktitle = {Proceedings of the 19th {ACM} Asia Conference on Computer and Communications Security, {ASIA} {CCS} 2024, Singapore, July 1-5, 2024}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3634737.3645009}, doi = {10.1145/3634737.3645009}, timestamp = {Fri, 16 Aug 2024 09:08:03 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/ArriagaRS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cpss/FotiadisGR24, author = {Georgios Fotiadis and Johann Gro{\ss}sch{\"{a}}dl and Peter Y. A. Ryan}, editor = {Jianying Zhou and Sudipta Chattopadhyay}, title = {{X2065:} Lightweight Key Exchange for the Internet of Things}, booktitle = {Proceedings of the 10th {ACM} Cyber-Physical System Security Workshop, {CPSS} 2024, Singapore, 2 July 2024}, pages = {43--52}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3626205.3659153}, doi = {10.1145/3626205.3659153}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cpss/FotiadisGR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/ArenasLRRSZ24, author = {M{\'{o}}nica P. Arenas and Gabriele Lenzini and Mohammadamin Rakeei and Peter Y. A. Ryan and Marjan Skrobot and Maria Zhekova}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Verifying Artifact Authenticity with Unclonable Optical Tags}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {64--77}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012746500003767}, doi = {10.5220/0012746500003767}, timestamp = {Thu, 05 Sep 2024 14:21:37 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/ArenasLRRSZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2407-13240, author = {Marie{-}Laure Zollinger and Peter B. R{\o}nne and Steve Schneider and Peter Y. A. Ryan and Wojtek Jamroga}, title = {Intelligo ut Confido: Understanding, Trust and User Experience in Verifiable Receipt-Free E-Voting (long version)}, journal = {CoRR}, volume = {abs/2407.13240}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2407.13240}, doi = {10.48550/ARXIV.2407.13240}, eprinttype = {arXiv}, eprint = {2407.13240}, timestamp = {Thu, 22 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2407-13240.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ArriagaRS24, author = {Afonso Arriaga and Peter Y. A. Ryan and Marjan Skrobot}, title = {SweetPAKE: Key exchange with decoy passwords}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {307}, year = {2024}, url = {https://eprint.iacr.org/2024/307}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ArriagaRS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamodaranRRR24, author = {Aditya Damodaran and Simon Rastikian and Peter B. R{\o}nne and Peter Y. A. Ryan}, title = {Hyperion: Transparent End-to-End Verifiable Voting with Coercion Mitigation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1182}, year = {2024}, url = {https://eprint.iacr.org/2024/1182}, timestamp = {Fri, 02 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamodaranRRR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/DraganDEGHRRS23, author = {Constantin Catalin Dragan and Fran{\c{c}}ois Dupressoir and Ehsan Estaji and Kristian Gj{\o}steen and Thomas Haines and Peter Y. A. Ryan and Peter B. R{\o}nne and Morten Rotvold Solberg}, title = {Machine-checked proofs of privacy against malicious boards for Selene {\&} Co}, journal = {J. Comput. Secur.}, volume = {31}, number = {5}, pages = {469--499}, year = {2023}, url = {https://doi.org/10.3233/JCS-230045}, doi = {10.3233/JCS-230045}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcs/DraganDEGHRRS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ficc/OrcheHHNPRRWW23, author = {Fatima{-}Ezzahra El Orche and Marcel Hollenstein and Sarah Houdaigoui and David Naccache and Daria Pchelina and Peter B. R{\o}nne and Peter Y. A. Ryan and Julien Weibel and Robert Weil}, editor = {Kohei Arai}, title = {Taphonomical Security: {DNA} Information with a Foreseeable Lifespan}, booktitle = {Advances in Information and Communication - Proceedings of the 2023 Future of Information and Communication Conference (FICC), Volume 2, San Francisco, CA, USA, 2-3 March 2023}, series = {Lecture Notes in Networks and Systems}, volume = {652}, pages = {674--694}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-28073-3\_46}, doi = {10.1007/978-3-031-28073-3\_46}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ficc/OrcheHHNPRRWW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mspn/ChengFGR23, author = {Hao Cheng and Georgios Fotiadis and Johann Gro{\ss}sch{\"{a}}dl and Peter Y. A. Ryan}, editor = {Samia Bouzefrane and Soumya Banerjee and Fabrice Mourlin and Selma Boumerdassi and {\'{E}}ric Renault}, title = {IoTDisco: Strong yet Lightweight End-to-End Security for the Internet of Constrained Things}, booktitle = {Mobile, Secure, and Programmable Networking - 9th International Conference, {MSPN} 2023, Paris, France, October 26-27, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {14482}, pages = {1--16}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-52426-4\_1}, doi = {10.1007/978-3-031-52426-4\_1}, timestamp = {Tue, 20 Aug 2024 07:54:44 +0200}, biburl = {https://dblp.org/rec/conf/mspn/ChengFGR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2311-03372, author = {Wojciech Jamroga and Peter Y. A. Ryan and Steve Schneider and Carsten Sch{\"{u}}rmann and Philip B. Stark}, title = {A Declaration of Software Independence}, journal = {CoRR}, volume = {abs/2311.03372}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2311.03372}, doi = {10.48550/ARXIV.2311.03372}, eprinttype = {arXiv}, eprint = {2311.03372}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2311-03372.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/elektrik/SertkayaRR22, author = {Isa Sertkaya and Peter B. R{\o}nne and Peter Y. A. Ryan}, title = {Estonian Internet voting with anonymous credentials}, journal = {Turkish J. Electr. Eng. Comput. Sci.}, volume = {30}, number = {2}, pages = {420--435}, year = {2022}, url = {https://doi.org/10.3906/elk-2105-197}, doi = {10.3906/ELK-2105-197}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/elektrik/SertkayaRR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/ChengFGR22, author = {Hao Cheng and Georgios Fotiadis and Johann Gro{\ss}sch{\"{a}}dl and Peter Y. A. Ryan}, title = {Highly Vectorized {SIKE} for {AVX-512}}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {2}, pages = {41--68}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i2.41-68}, doi = {10.46586/TCHES.V2022.I2.41-68}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/ChengFGR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/DraganDEGHRRS22, author = {Constantin Catalin Dragan and Fran{\c{c}}ois Dupressoir and Ehsan Estaji and Kristian Gj{\o}steen and Thomas Haines and Peter Y. A. Ryan and Peter B. R{\o}nne and Morten Rotvold Solberg}, title = {Machine-Checked Proofs of Privacy Against Malicious Boards for Selene {\&} Co}, booktitle = {35th {IEEE} Computer Security Foundations Symposium, {CSF} 2022, Haifa, Israel, August 7-10, 2022}, pages = {335--347}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CSF54842.2022.9919663}, doi = {10.1109/CSF54842.2022.9919663}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/DraganDEGHRRS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/evoteid/OrcheGRBNRBDW22, author = {Fatima{-}Ezzahra El Orche and R{\'{e}}mi G{\'{e}}raud{-}Stewart and Peter B. R{\o}nne and Gergei Bana and David Naccache and Peter Y. A. Ryan and Marco Biroli and Megi Dervishi and Hugo Waltsburger}, editor = {Robert Krimmer and Melanie Volkamer and David Duenas{-}Cid and Peter B. R{\o}nne and Micha Germann}, title = {Time, Privacy, Robustness, Accuracy: Trade-Offs for the Open Vote Network Protocol}, booktitle = {Electronic Voting - 7th International Joint Conference, E-Vote-ID 2022, Bregenz, Austria, October 4-7, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13553}, pages = {19--35}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15911-4\_2}, doi = {10.1007/978-3-031-15911-4\_2}, timestamp = {Mon, 24 Oct 2022 20:50:57 +0200}, biburl = {https://dblp.org/rec/conf/evoteid/OrcheGRBNRBDW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/secitc/2021, editor = {Peter Y. A. Ryan and Cristian Toma}, title = {Innovative Security Solutions for Information Technology and Communications - 14th International Conference, SecITC 2021, Virtual Event, November 25-26, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13195}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17510-7}, doi = {10.1007/978-3-031-17510-7}, isbn = {978-3-031-17509-1}, timestamp = {Fri, 21 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2210-10694, author = {Wojciech Jamroga and Peter Y. A. Ryan and Yan Kim}, title = {Verification of the Socio-Technical Aspects of Voting: The Case of the Polish Postal Vote 2020}, journal = {CoRR}, volume = {abs/2210.10694}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2210.10694}, doi = {10.48550/ARXIV.2210.10694}, eprinttype = {arXiv}, eprint = {2210.10694}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2210-10694.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DraganDEGHRRS22, author = {Constantin Catalin Dragan and Fran{\c{c}}ois Dupressoir and Ehsan Estaji and Kristian Gj{\o}steen and Thomas Haines and Peter Y. A. Ryan and Peter B. R{\o}nne and Morten Rotvold Solberg}, title = {Machine-Checked Proofs of Privacy Against Malicious Boards for Selene {\&} Co}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1182}, year = {2022}, url = {https://eprint.iacr.org/2022/1182}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DraganDEGHRRS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/FenskeBMMRR21, author = {Ellis Fenske and Dane Brown and Jeremy Martin and Travis Mayberry and Peter Ryan and Erik C. Rye}, title = {Three Years Later: {A} Study of {MAC} Address Randomization In Mobile Devices And When It Succeeds}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2021}, number = {3}, pages = {164--181}, year = {2021}, url = {https://doi.org/10.2478/popets-2021-0042}, doi = {10.2478/POPETS-2021-0042}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/FenskeBMMRR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/ChengFGRR21, author = {Hao Cheng and Georgios Fotiadis and Johann Gro{\ss}sch{\"{a}}dl and Peter Y. A. Ryan and Peter B. R{\o}nne}, title = {Batching {CSIDH} Group Actions using {AVX-512}}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {4}, pages = {618--649}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i4.618-649}, doi = {10.46586/TCHES.V2021.I4.618-649}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/ChengFGRR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tochi/MarkyZRRGK21, author = {Karola Marky and Marie{-}Laure Zollinger and Peter B. Roenne and Peter Y. A. Ryan and Tim Grube and Kai Kunze}, title = {Investigating Usability and User Experience of Individually Verifiable Internet Voting Schemes}, journal = {{ACM} Trans. Comput. Hum. Interact.}, volume = {28}, number = {5}, pages = {30:1--30:36}, year = {2021}, url = {https://doi.org/10.1145/3459604}, doi = {10.1145/3459604}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tochi/MarkyZRRGK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/CouteauRR21, author = {Geoffroy Couteau and A. W. Roscoe and Peter Y. A. Ryan}, editor = {Joonsang Baek and Sushmita Ruj}, title = {Partially-Fair Computation from Timed-Release Encryption and Oblivious Transfer}, booktitle = {Information Security and Privacy - 26th Australasian Conference, {ACISP} 2021, Virtual Event, December 1-3, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13083}, pages = {330--349}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90567-5\_17}, doi = {10.1007/978-3-030-90567-5\_17}, timestamp = {Mon, 08 Nov 2021 16:43:35 +0100}, biburl = {https://dblp.org/rec/conf/acisp/CouteauRR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/JamrogaRSSS21, author = {Wojciech Jamroga and Peter Y. A. Ryan and Steve Schneider and Carsten Sch{\"{u}}rmann and Philip B. Stark}, editor = {Daniel Dougherty and Jos{\'{e}} Meseguer and Sebastian Alexander M{\"{o}}dersheim and Paul D. Rowe}, title = {A Declaration of Software Independence}, booktitle = {Protocols, Strands, and Logic - Essays Dedicated to Joshua Guttman on the Occasion of his 66.66th Birthday}, series = {Lecture Notes in Computer Science}, volume = {13066}, pages = {198--217}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-91631-2\_11}, doi = {10.1007/978-3-030-91631-2\_11}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/birthday/JamrogaRSSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/0009GRR21, author = {Hao Cheng and Johann Gro{\ss}sch{\"{a}}dl and Peter B. R{\o}nne and Peter Y. A. Ryan}, title = {{AVRNTRU:} Lightweight NTRU-based Post-Quantum Cryptography for 8-bit {AVR} Microcontrollers}, booktitle = {Design, Automation {\&} Test in Europe Conference {\&} Exhibition, {DATE} 2021, Grenoble, France, February 1-5, 2021}, pages = {1272--1277}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.23919/DATE51398.2021.9474033}, doi = {10.23919/DATE51398.2021.9474033}, timestamp = {Thu, 22 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/date/0009GRR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/evoteid/RyanROOSS21, author = {Peter Y. A. Ryan and Peter B. Roenne and Dimiter Ostrev and Fatima{-}Ezzahra El Orche and Najmeh Soroush and Philip B. Stark}, editor = {Robert Krimmer and Melanie Volkamer and David Duenas{-}Cid and Oksana Kulyk and Peter B. R{\o}nne and Mihkel Solvak and Micha Germann}, title = {Who Was that Masked Voter? The Tally Won't Tell!}, booktitle = {Electronic Voting - 6th International Joint Conference, E-Vote-ID 2021, Virtual Event, October 5-8, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12900}, pages = {106--123}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-86942-7\_8}, doi = {10.1007/978-3-030-86942-7\_8}, timestamp = {Tue, 05 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/evoteid/RyanROOSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/evoteid/ZollingerERM21, author = {Marie{-}Laure Zollinger and Ehsan Estaji and Peter Y. A. Ryan and Karola Marky}, editor = {Robert Krimmer and Melanie Volkamer and David Duenas{-}Cid and Oksana Kulyk and Peter B. R{\o}nne and Mihkel Solvak and Micha Germann}, title = {"Just for the Sake of Transparency": Exploring Voter Mental Models of Verifiability}, booktitle = {Electronic Voting - 6th International Joint Conference, E-Vote-ID 2021, Virtual Event, October 5-8, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12900}, pages = {155--170}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-86942-7\_11}, doi = {10.1007/978-3-030-86942-7\_11}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/evoteid/ZollingerERM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/RonneRS21, author = {Peter B. R{\o}nne and Peter Y. A. Ryan and Ben Smyth}, editor = {Matthew Bernhard and Andrea Bracciali and Lewis Gudgeon and Thomas Haines and Ariah Klages{-}Mundt and Shin'ichiro Matsuo and Daniel Perez and Massimiliano Sala and Sam Werner}, title = {Cast-as-Intended: {A} Formal Definition and Case Studies}, booktitle = {Financial Cryptography and Data Security. {FC} 2021 International Workshops - CoDecFin, DeFi, VOTING, and WTSC, Virtual Event, March 5, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12676}, pages = {251--262}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-662-63958-0\_22}, doi = {10.1007/978-3-662-63958-0\_22}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/RonneRS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/FotiadisMGCRRR21, author = {Georgios Fotiadis and Jos{\'{e}} Moreira and Thanassis Giannetsos and Liqun Chen and Peter B. R{\o}nne and Mark Ryan and Peter Y. A. Ryan}, editor = {Rodrigo Roman and Jianying Zhou}, title = {Root-of-Trust Abstractions for Symbolic Analysis: Application to Attestation Protocols}, booktitle = {Security and Trust Management - 17th International Workshop, {STM} 2021, Darmstadt, Germany, October 8, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13075}, pages = {163--184}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-91859-0\_9}, doi = {10.1007/978-3-030-91859-0\_9}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stm/FotiadisMGCRRR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2102-01995, author = {Gergei Bana and Wojciech Jamroga and David Naccache and Peter Y. A. Ryan}, title = {Convergence Voting: From Pairwise Comparisons to Consensus}, journal = {CoRR}, volume = {abs/2102.01995}, year = {2021}, url = {https://arxiv.org/abs/2102.01995}, eprinttype = {arXiv}, eprint = {2102.01995}, timestamp = {Tue, 09 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2102-01995.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2105-14783, author = {Peter B. R{\o}nne and Peter Y. A. Ryan and Marie{-}Laure Zollinger}, title = {Electryo, In-person Voting with Transparent Voter Verifiability and Eligibility Verifiability}, journal = {CoRR}, volume = {abs/2105.14783}, year = {2021}, url = {https://arxiv.org/abs/2105.14783}, eprinttype = {arXiv}, eprint = {2105.14783}, timestamp = {Wed, 02 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2105-14783.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2105-14901, author = {Marie{-}Laure Zollinger and Verena Distler and Peter B. R{\o}nne and Peter Y. A. Ryan and Carine Lallemand and Vincent Koenig}, title = {User Experience Design for E-Voting: How mental models align with security mechanisms}, journal = {CoRR}, volume = {abs/2105.14901}, year = {2021}, url = {https://arxiv.org/abs/2105.14901}, eprinttype = {arXiv}, eprint = {2105.14901}, timestamp = {Wed, 02 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2105-14901.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2107-06090, author = {Itzel V{\'{a}}zquez Sandoval and Arash Atashpendar and Gabriele Lenzini and Peter Y. A. Ryan}, title = {PakeMail: authentication and key management in decentralized secure email and messaging via {PAKE}}, journal = {CoRR}, volume = {abs/2107.06090}, year = {2021}, url = {https://arxiv.org/abs/2107.06090}, eprinttype = {arXiv}, eprint = {2107.06090}, timestamp = {Wed, 21 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2107-06090.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdallaBRRS21, author = {Michel Abdalla and Manuel Barbosa and Peter B. R{\o}nne and Peter Y. A. Ryan and Petra Sala}, title = {Security Characterization of {J-PAKE} and its Variants}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {824}, year = {2021}, url = {https://eprint.iacr.org/2021/824}, timestamp = {Wed, 07 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdallaBRRS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BanaBDOGNRRW21, author = {Gergei Bana and Marco Biroli and Megi Dervishi and Fatima{-}Ezzahra El Orche and R{\'{e}}mi G{\'{e}}raud{-}Stewart and David Naccache and Peter B. R{\o}nne and Peter Y. A. Ryan and Hugo Waltsburger}, title = {Time, Privacy, Robustness, Accuracy: Trade Offs for the Open Vote Network Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1065}, year = {2021}, url = {https://eprint.iacr.org/2021/1065}, timestamp = {Mon, 06 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BanaBDOGNRRW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OrcheHHNPRRWW21, author = {Fatima{-}Ezzahra El Orche and Marcel Hollenstein and Sarah Houdaigoui and David Naccache and Daria Pchelina and Peter B. R{\o}nne and Peter Y. A. Ryan and Julien Weibel and Robert Weil}, title = {Taphonomical Security: {(DNA)} Information with Foreseeable Lifespan}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1066}, year = {2021}, url = {https://eprint.iacr.org/2021/1066}, timestamp = {Mon, 06 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OrcheHHNPRRWW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HollensteinNRRW21, author = {Marcel Hollenstein and David Naccache and Peter B. R{\o}nne and Peter Y. A. Ryan and Robert Weil and Ofer Yifrach{-}Stav}, title = {Preservation of {DNA} Privacy During the Large Scale Detection of {COVID}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1108}, year = {2021}, url = {https://eprint.iacr.org/2021/1108}, timestamp = {Mon, 06 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HollensteinNRRW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/ChengGRR20, author = {Hao Cheng and Johann Gro{\ss}sch{\"{a}}dl and Peter B. R{\o}nne and Peter Y. A. Ryan}, editor = {Pierre{-}Yvan Liardet and Nele Mentens}, title = {Lightweight Post-quantum Key Encapsulation for 8-bit {AVR} Microcontrollers}, booktitle = {Smart Card Research and Advanced Applications - 19th International Conference, {CARDIS} 2020, Virtual Event, November 18-19, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12609}, pages = {18--33}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-68487-7\_2}, doi = {10.1007/978-3-030-68487-7\_2}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cardis/ChengGRR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/IovinoRRR20, author = {Vincenzo Iovino and Alfredo Rial and Peter B. R{\o}nne and Peter Y. A. Ryan}, title = {Universal Unconditional Verifiability in E-Voting without Trusted Parties}, booktitle = {33rd {IEEE} Computer Security Foundations Symposium, {CSF} 2020, Boston, MA, USA, June 22-26, 2020}, pages = {33--48}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CSF49147.2020.00011}, doi = {10.1109/CSF49147.2020.00011}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/IovinoRRR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/evoteid/EstajiHGRRS20, author = {Ehsan Estaji and Thomas Haines and Kristian Gj{\o}steen and Peter B. R{\o}nne and Peter Y. A. Ryan and Najmeh Soroush}, editor = {Robert Krimmer and Melanie Volkamer and Bernhard Beckert and Ralf K{\"{u}}sters and Oksana Kulyk and David Duenas{-}Cid and Mikhel Solvak}, title = {Revisiting Practical and Usable Coercion-Resistant Remote E-Voting}, booktitle = {Electronic Voting - 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6-9, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12455}, pages = {50--66}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-60347-2\_4}, doi = {10.1007/978-3-030-60347-2\_4}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/evoteid/EstajiHGRRS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/evoteid/JamrogaKKR20, author = {Wojciech Jamroga and Yan Kim and Damian Kurpiewski and Peter Y. A. Ryan}, editor = {Robert Krimmer and Melanie Volkamer and Bernhard Beckert and Ralf K{\"{u}}sters and Oksana Kulyk and David Duenas{-}Cid and Mikhel Solvak}, title = {Towards Model Checking of Voting Protocols in Uppaal}, booktitle = {Electronic Voting - 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6-9, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12455}, pages = {129--146}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-60347-2\_9}, doi = {10.1007/978-3-030-60347-2\_9}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/evoteid/JamrogaKKR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/ZollingerRR20, author = {Marie{-}Laure Zollinger and Peter B. R{\o}nne and Peter Y. A. Ryan}, editor = {Matthew Bernhard and Andrea Bracciali and L. Jean Camp and Shin'ichiro Matsuo and Alana Maurushat and Peter B. R{\o}nne and Massimiliano Sala}, title = {Short Paper: Mechanized Proofs of Verifiability and Privacy in a Paper-Based E-Voting Scheme}, booktitle = {Financial Cryptography and Data Security - {FC} 2020 International Workshops, AsiaUSEC, CoDeFi, VOTING, and WTSC, Kota Kinabalu, Malaysia, February 14, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12063}, pages = {310--318}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-54455-3\_22}, doi = {10.1007/978-3-030-54455-3\_22}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/ZollingerRR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/SandovalALR20, author = {Itzel V{\'{a}}zquez Sandoval and Arash Atashpendar and Gabriele Lenzini and Peter Y. A. Ryan}, editor = {Mohammad S. Obaidat and Jalel Ben{-}Othman}, title = {PakeMail: Authentication and Key Management in Decentralized Secure Email and Messaging via {PAKE}}, booktitle = {E-Business and Telecommunications - 17th International Conference on E-Business and Telecommunications, {ICETE} 2020, Online Event, July 8-10, 2020, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1484}, pages = {102--128}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-90428-9\_5}, doi = {10.1007/978-3-030-90428-9\_5}, timestamp = {Mon, 29 Nov 2021 09:41:38 +0100}, biburl = {https://dblp.org/rec/conf/icete/SandovalALR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/SoroushIRRR20, author = {Najmeh Soroush and Vincenzo Iovino and Alfredo Rial and Peter B. R{\o}nne and Peter Y. A. Ryan}, editor = {Aggelos Kiayias and Markulf Kohlweiss and Petros Wallden and Vassilis Zikas}, title = {Verifiable Inner Product Encryption Scheme}, booktitle = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12110}, pages = {65--94}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45374-9\_3}, doi = {10.1007/978-3-030-45374-9\_3}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/SoroushIRRR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/ChengGTRR20, author = {Hao Cheng and Johann Gro{\ss}sch{\"{a}}dl and Jiaqi Tian and Peter B. R{\o}nne and Peter Y. A. Ryan}, editor = {Orr Dunkelman and Michael J. Jacobson Jr. and Colin O'Flynn}, title = {High-Throughput Elliptic Curve Cryptography Using {AVX2} Vector Instructions}, booktitle = {Selected Areas in Cryptography - {SAC} 2020 - 27th International Conference, Halifax, NS, Canada (Virtual Event), October 21-23, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12804}, pages = {698--719}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-81652-0\_27}, doi = {10.1007/978-3-030-81652-0\_27}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/ChengGTRR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2007-09085, author = {Marcel Hollenstein and David Naccache and Peter B. R{\o}nne and Peter Y. A. Ryan and Robert Weil and Ofer Yifrach{-}Stav}, title = {Preservation of {DNA} Privacy During the Large Scale Detection of {COVID-19}}, journal = {CoRR}, volume = {abs/2007.09085}, year = {2020}, url = {https://arxiv.org/abs/2007.09085}, eprinttype = {arXiv}, eprint = {2007.09085}, timestamp = {Tue, 28 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2007-09085.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2007-12412, author = {Wojciech Jamroga and Yan Kim and Damian Kurpiewski and Peter Y. A. Ryan}, title = {Model Checkers Are Cool: How to Model Check Voting Protocols in Uppaal}, journal = {CoRR}, volume = {abs/2007.12412}, year = {2020}, url = {https://arxiv.org/abs/2007.12412}, eprinttype = {arXiv}, eprint = {2007.12412}, timestamp = {Wed, 29 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2007-12412.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2011-07887, author = {Wojciech Jamroga and David Mestel and Peter B. R{\o}nne and Peter Y. A. Ryan and Marjan Skrobot}, title = {A Survey of Requirements for {COVID-19} Mitigation Strategies. Part {I:} Newspaper Clips}, journal = {CoRR}, volume = {abs/2011.07887}, year = {2020}, url = {https://arxiv.org/abs/2011.07887}, eprinttype = {arXiv}, eprint = {2011.07887}, timestamp = {Wed, 18 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2011-07887.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SoroushIRRR20, author = {Najmeh Soroush and Vincenzo Iovino and Alfredo Rial and Peter B. R{\o}nne and Peter Y. A. Ryan}, title = {Verifiable Inner Product Encryption Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {122}, year = {2020}, url = {https://eprint.iacr.org/2020/122}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SoroushIRRR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DingEMRW20, author = {Jintai Ding and Doug Emery and Johannes M{\"{u}}ller and Peter Y. A. Ryan and Vonn Kee Wong}, title = {Post-Quantum Anonymous Veto Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1023}, year = {2020}, url = {https://eprint.iacr.org/2020/1023}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DingEMRW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/DistlerZLRRK19, author = {Verena Distler and Marie{-}Laure Zollinger and Carine Lallemand and Peter B. R{\o}nne and Peter Y. A. Ryan and Vincent Koenig}, editor = {Stephen A. Brewster and Geraldine Fitzpatrick and Anna L. Cox and Vassilis Kostakos}, title = {Security - Visible, Yet Unseen?}, booktitle = {Proceedings of the 2019 {CHI} Conference on Human Factors in Computing Systems, {CHI} 2019, Glasgow, Scotland, UK, May 04-09, 2019}, pages = {605}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3290605.3300835}, doi = {10.1145/3290605.3300835}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/chi/DistlerZLRRK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/GencLR19, author = {Ziya Alper Gen{\c{c}} and Gabriele Lenzini and Peter Y. A. Ryan}, editor = {Andrea Saracino and Paolo Mori}, title = {NoCry: No More Secure Encryption Keys for Cryptographic Ransomware}, booktitle = {Emerging Technologies for Authorization and Authentication - Second International Workshop, {ETAA} 2019, Luxembourg City, Luxembourg, September 27, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11967}, pages = {69--85}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-39749-4\_5}, doi = {10.1007/978-3-030-39749-4\_5}, timestamp = {Wed, 29 Jan 2020 13:02:14 +0100}, biburl = {https://dblp.org/rec/conf/esorics/GencLR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/MarkyZFRM19, author = {Karola Marky and Marie{-}Laure Zollinger and Markus Funk and Peter Y. A. Ryan and Max M{\"{u}}hlh{\"{a}}user}, editor = {Andrea Bracciali and Jeremy Clark and Federico Pintore and Peter B. R{\o}nne and Massimiliano Sala}, title = {How to Assess the Usability Metrics of E-Voting Schemes}, booktitle = {Financial Cryptography and Data Security - {FC} 2019 International Workshops, {VOTING} and WTSC, St. Kitts, St. Kitts and Nevis, February 18-22, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11599}, pages = {257--271}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-43725-1\_18}, doi = {10.1007/978-3-030-43725-1\_18}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/MarkyZFRM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcai/00200AR19, author = {Jun Wang and Qiang Tang and Afonso Arriaga and Peter Y. A. Ryan}, editor = {Sarit Kraus}, title = {Novel Collaborative Filtering Recommender Friendly to Privacy Protection}, booktitle = {Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, {IJCAI} 2019, Macao, China, August 10-16, 2019}, pages = {4809--4815}, publisher = {ijcai.org}, year = {2019}, url = {https://doi.org/10.24963/ijcai.2019/668}, doi = {10.24963/IJCAI.2019/668}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ijcai/00200AR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/BecerraRSS19, author = {Jos{\'{e}} Becerra and Peter Y. A. Ryan and Petra Sala and Marjan Skrobot}, editor = {Gurpreet Dhillon and Fredrik Karlsson and Karin Hedstr{\"{o}}m and Andr{\'{e}} Z{\'{u}}quete}, title = {An Offline Dictionary Attack Against zkPAKE Protocol}, booktitle = {{ICT} Systems Security and Privacy Protection - 34th {IFIP} {TC} 11 International Conference, {SEC} 2019, Lisbon, Portugal, June 25-27, 2019, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {562}, pages = {81--90}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-22312-0\_6}, doi = {10.1007/978-3-030-22312-0\_6}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/BecerraRSS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/BeunardeauOMNRR19, author = {Marc Beunardeau and Fatima{-}Ezzahra El Orche and Diana Maimut and David Naccache and Peter B. R{\o}nne and Peter Y. A. Ryan}, editor = {Emil Simion and R{\'{e}}mi G{\'{e}}raud{-}Stewart}, title = {Authenticated Key Distribution: When the Coupon Collector is Your Enemy}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 12th International Conference, SecITC 2019, Bucharest, Romania, November 14-15, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12001}, pages = {1--20}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-41025-4\_1}, doi = {10.1007/978-3-030-41025-4\_1}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/BeunardeauOMNRR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/voteid/JamrogaRRS19, author = {Wojciech Jamroga and Peter B. R{\o}nne and Peter Y. A. Ryan and Philip B. Stark}, editor = {Robert Krimmer and Melanie Volkamer and V{\'{e}}ronique Cortier and Bernhard Beckert and Ralf K{\"{u}}sters and Uwe Serd{\"{u}}lt and David Duenas{-}Cid}, title = {Risk-Limiting Tallies}, booktitle = {Electronic Voting - 4th International Joint Conference, E-Vote-ID 2019, Bregenz, Austria, October 1-4, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11759}, pages = {183--199}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-30625-0\_12}, doi = {10.1007/978-3-030-30625-0\_12}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/voteid/JamrogaRRS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/ChengDGRR19, author = {Hao Cheng and Daniel Dinu and Johann Gro{\ss}sch{\"{a}}dl and Peter B. R{\o}nne and Peter Y. A. Ryan}, editor = {Maryline Laurent and Thanassis Giannetsos}, title = {A Lightweight Implementation of {NTRU} Prime for the Post-quantum Internet of Things}, booktitle = {Information Security Theory and Practice - 13th {IFIP} {WG} 11.2 International Conference, {WISTP} 2019, Paris, France, December 11-12, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12024}, pages = {103--119}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-41702-4\_7}, doi = {10.1007/978-3-030-41702-4\_7}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wistp/ChengDGRR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2019-1, editor = {Kazue Sako and Steve A. Schneider and Peter Y. A. Ryan}, title = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11735}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-29959-0}, doi = {10.1007/978-3-030-29959-0}, isbn = {978-3-030-29958-3}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/2019-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2019-2, editor = {Kazue Sako and Steve A. Schneider and Peter Y. A. Ryan}, title = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11736}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-29962-0}, doi = {10.1007/978-3-030-29962-0}, isbn = {978-3-030-29961-3}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/2019-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1901-02560, author = {Peter B. R{\o}nne and Arash Atashpendar and Kristian Gj{\o}steen and Peter Y. A. Ryan}, title = {Coercion-Resistant Voting in Linear Time via Fully Homomorphic Encryption: Towards a Quantum-Safe Scheme}, journal = {CoRR}, volume = {abs/1901.02560}, year = {2019}, url = {http://arxiv.org/abs/1901.02560}, eprinttype = {arXiv}, eprint = {1901.02560}, timestamp = {Fri, 01 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1901-02560.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1906-02686, author = {Brian Thompson and Dave Cedel and Jeremy Martin and Peter Y. A. Ryan and Sarah Kern}, title = {Fusion of Mobile Device Signal Data Attributes Enables Multi-Protocol Entity Resolution and Enhanced Large-Scale Tracking}, journal = {CoRR}, volume = {abs/1906.02686}, year = {2019}, url = {http://arxiv.org/abs/1906.02686}, eprinttype = {arXiv}, eprint = {1906.02686}, timestamp = {Wed, 15 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1906-02686.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1908-04947, author = {Wojciech Jamroga and Peter B. R{\o}nne and Peter Y. A. Ryan and Philip B. Stark}, title = {Risk-Limiting Tallies}, journal = {CoRR}, volume = {abs/1908.04947}, year = {2019}, url = {http://arxiv.org/abs/1908.04947}, eprinttype = {arXiv}, eprint = {1908.04947}, timestamp = {Mon, 19 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1908-04947.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CouteauRR19, author = {Geoffroy Couteau and Bill Roscoe and Peter Y. A. Ryan}, title = {Partially-Fair Computation from Timed-Release Encryption and Oblivious Transfer}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1281}, year = {2019}, url = {https://eprint.iacr.org/2019/1281}, timestamp = {Wed, 15 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CouteauRR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeunardeauOMNRR19, author = {Marc Beunardeau and Fatima{-}Ezzahra El Orche and Diana Maimut and David Naccache and Peter B. R{\o}nne and Peter Y. A. Ryan}, title = {Authenticated Key Distribution: When the Coupon Collector is Your Enemy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1499}, year = {2019}, url = {https://eprint.iacr.org/2019/1499}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeunardeauOMNRR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/0020A0R18, author = {Jun Wang and Afonso Arriaga and Qiang Tang and Peter Y. A. Ryan}, editor = {David Lie and Mohammad Mannan and Michael Backes and XiaoFeng Wang}, title = {Facilitating Privacy-preserving Recommendation-as-a-Service with Machine Learning}, booktitle = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2018, Toronto, ON, Canada, October 15-19, 2018}, pages = {2306--2308}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3243734.3278504}, doi = {10.1145/3243734.3278504}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/0020A0R18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cecc/GencLR18, author = {Ziya Alper Gen{\c{c}} and Gabriele Lenzini and Peter Y. A. Ryan}, title = {Security Analysis of Key Acquiring Strategies Used by Cryptographic Ransomware}, booktitle = {Proceedings of the Central European Cybersecurity Conference 2018, {CECC} 2018, Ljubljana, Slovenia, November 15-16, 2018}, pages = {7:1--7:6}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3277570.3277577}, doi = {10.1145/3277570.3277577}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cecc/GencLR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/GencLR18, author = {Ziya Alper Gen{\c{c}} and Gabriele Lenzini and Peter Y. A. Ryan}, editor = {Cristiano Giuffrida and S{\'{e}}bastien Bardin and Gregory Blanc}, title = {No Random, No Ransom: {A} Key to Stop Cryptographic Ransomware}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 15th International Conference, {DIMVA} 2018, Saclay, France, June 28-29, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10885}, pages = {234--255}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93411-2\_11}, doi = {10.1007/978-3-319-93411-2\_11}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimva/GencLR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/GencLRS18, author = {Ziya Alper Gen{\c{c}} and Gabriele Lenzini and Peter Y. A. Ryan and Itzel V{\'{a}}zquez Sandoval}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {A Security Analysis, and a Fix, of a Code-Corrupted Honeywords System}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {83--95}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006609100830095}, doi = {10.5220/0006609100830095}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/GencLRS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/GencLRS18a, author = {Ziya Alper Gen{\c{c}} and Gabriele Lenzini and Peter Y. A. Ryan and Itzel V{\'{a}}zquez Sandoval}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {A Critical Security Analysis of the Password-Based Authentication Honeywords System Under Code-Corruption Attack}, booktitle = {Information Systems Security and Privacy - 4th International Conference, {ICISSP} 2018, Funchal, Madeira, Portugal, January 22-24, 2018, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {977}, pages = {125--151}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-25109-3\_7}, doi = {10.1007/978-3-030-25109-3\_7}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/GencLRS18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/AtashpendarPRR18, author = {Arash Atashpendar and Guru{-}Vamsi Policharla and Peter B. R{\o}nne and Peter Y. A. Ryan}, editor = {Nils Gruschka}, title = {Revisiting Deniability in Quantum Key Exchange - via Covert Communication and Entanglement Distillation}, booktitle = {Secure {IT} Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28-30, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11252}, pages = {104--120}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03638-6\_7}, doi = {10.1007/978-3-030-03638-6\_7}, timestamp = {Mon, 25 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/AtashpendarPRR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/GencLR18, author = {Ziya Alper Gen{\c{c}} and Gabriele Lenzini and Peter Y. A. Ryan}, editor = {Nils Gruschka}, title = {Next Generation Cryptographic Ransomware}, booktitle = {Secure {IT} Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28-30, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11252}, pages = {385--401}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03638-6\_24}, doi = {10.1007/978-3-030-03638-6\_24}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/GencLR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BecerraRRS18, author = {Jos{\'{e}} Becerra and Peter B. R{\o}nne and Peter Y. A. Ryan and Petra Sala}, editor = {Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Bruce Christianson and Jonathan Anderson}, title = {HoneyPAKEs}, booktitle = {Security Protocols {XXVI} - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11286}, pages = {63--77}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03251-7\_7}, doi = {10.1007/978-3-030-03251-7\_7}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/BecerraRRS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Ryan18, author = {Peter Y. A. Ryan}, editor = {Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Bruce Christianson and Jonathan Anderson}, title = {HoneyPAKEs (Transcript of Discussion)}, booktitle = {Security Protocols {XXVI} - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11286}, pages = {78--83}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03251-7\_8}, doi = {10.1007/978-3-030-03251-7\_8}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Ryan18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/BecerraRSS18, author = {Jos{\'{e}} Becerra and Peter Y. A. Ryan and Petra Sala and Marjan Skrobot}, editor = {Panos Papadimitratos and Kevin R. B. Butler and Christina P{\"{o}}pper}, title = {An Offline Dictionary Attack against zkPAKE Protocol}, booktitle = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June 18-20, 2018}, pages = {291--292}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3212480.3226110}, doi = {10.1145/3212480.3226110}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/BecerraRSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1802-00703, author = {Arash Atashpendar and Marc Beunardeau and Aisling Connolly and R{\'{e}}mi G{\'{e}}raud and David Mestel and A. W. Roscoe and Peter Y. A. Ryan}, title = {From Clustering Supersequences to Entropy Minimizing Subsequences for Single and Double Deletions}, journal = {CoRR}, volume = {abs/1802.00703}, year = {2018}, url = {http://arxiv.org/abs/1802.00703}, eprinttype = {arXiv}, eprint = {1802.00703}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1802-00703.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1802-02432, author = {Jun Wang and Afonso Arriaga and Qiang Tang and Peter Y. A. Ryan}, title = {CryptoRec: Secure Recommendations as a Service}, journal = {CoRR}, volume = {abs/1802.02432}, year = {2018}, url = {http://arxiv.org/abs/1802.02432}, eprinttype = {arXiv}, eprint = {1802.02432}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1802-02432.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1807-11609, author = {Arash Atashpendar and David Mestel and A. W. Roscoe and Peter Y. A. Ryan}, title = {A Proof of Entropy Minimization for Outputs in Deletion Channels via Hidden Word Statistics}, journal = {CoRR}, volume = {abs/1807.11609}, year = {2018}, url = {http://arxiv.org/abs/1807.11609}, eprinttype = {arXiv}, eprint = {1807.11609}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1807-11609.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1812-02245, author = {Arash Atashpendar and Guru{-}Vamsi Policharla and Peter B. R{\o}nne and Peter Y. A. Ryan}, title = {Revisiting Deniability in Quantum Key Exchange via Covert Communication and Entanglement Distillation}, journal = {CoRR}, volume = {abs/1812.02245}, year = {2018}, url = {http://arxiv.org/abs/1812.02245}, eprinttype = {arXiv}, eprint = {1812.02245}, timestamp = {Mon, 25 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1812-02245.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BellaGLR17, author = {Giampaolo Bella and Rosario Giustolisi and Gabriele Lenzini and Peter Y. A. Ryan}, title = {Trustworthy exams without trusted parties}, journal = {Comput. Secur.}, volume = {67}, pages = {291--307}, year = {2017}, url = {https://doi.org/10.1016/j.cose.2016.12.005}, doi = {10.1016/J.COSE.2016.12.005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BellaGLR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/BenalohRST17, author = {Josh Benaloh and Peter Y. A. Ryan and Steve A. Schneider and Vanessa Teague}, title = {A Vote of Confidence?}, journal = {{IEEE} Secur. Priv.}, volume = {15}, number = {3}, pages = {12--13}, year = {2017}, url = {https://doi.org/10.1109/MSP.2017.53}, doi = {10.1109/MSP.2017.53}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/BenalohRST17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/Ryan17, author = {Peter Y. A. Ryan}, editor = {Thomas Gibson{-}Robinson and Philippa J. Hopcroft and Ranko Lazic}, title = {A Brief History of Security Protocols}, booktitle = {Concurrency, Security, and Puzzles - Essays Dedicated to Andrew William Roscoe on the Occasion of His 60th Birthday}, series = {Lecture Notes in Computer Science}, volume = {10160}, pages = {223--245}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-51046-0\_12}, doi = {10.1007/978-3-319-51046-0\_12}, timestamp = {Thu, 22 Jul 2021 15:35:06 +0200}, biburl = {https://dblp.org/rec/conf/birthday/Ryan17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cecc/GencLR17, author = {Ziya Alper Gen{\c{c}} and Gabriele Lenzini and Peter Y. A. Ryan}, editor = {Igor Bernik and Blaz Markelj and Simon Vrhovec}, title = {Cipher, the Random and the Ransom: {A} Survey on Current and Future Ransomware}, booktitle = {Advances in Cybersecurity - Proceedings of the 2017 Central European Cybersecurity Conference, {CECC} 2017, Ljubljana, Slovenia, November 16-17, 2017}, pages = {89--102}, publisher = {University of Maribor Press}, year = {2017}, url = {https://doi.org/10.18690/978-961-286-114-8.8}, doi = {10.18690/978-961-286-114-8.8}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cecc/GencLR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/IovinoRRR17, author = {Vincenzo Iovino and Alfredo Rial and Peter B. R{\o}nne and Peter Y. A. Ryan}, editor = {Michael Brenner and Kurt Rohloff and Joseph Bonneau and Andrew Miller and Peter Y. A. Ryan and Vanessa Teague and Andrea Bracciali and Massimiliano Sala and Federico Pintore and Markus Jakobsson}, title = {Using Selene to Verify Your Vote in {JCJ}}, booktitle = {Financial Cryptography and Data Security - {FC} 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10323}, pages = {385--403}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70278-0\_24}, doi = {10.1007/978-3-319-70278-0\_24}, timestamp = {Tue, 16 Aug 2022 23:04:23 +0200}, biburl = {https://dblp.org/rec/conf/fc/IovinoRRR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/Ryan17, author = {Peter Y. A. Ryan}, editor = {Pooya Farshim and Emil Simion}, title = {Securing the Foundations of Democracy}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 10th International Conference, SecITC 2017, Bucharest, Romania, June 8-9, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10543}, pages = {52--66}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-69284-5\_5}, doi = {10.1007/978-3-319-69284-5\_5}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/Ryan17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/RoscoeR17, author = {A. W. Roscoe and Peter Y. A. Ryan}, editor = {Frank Stajano and Jonathan Anderson and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Auditable PAKEs: Approaching Fair Exchange Without a {TTP}}, booktitle = {Security Protocols {XXV} - 25th International Workshop, Cambridge, UK, March 20-22, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10476}, pages = {278--297}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-71075-4\_31}, doi = {10.1007/978-3-319-71075-4\_31}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/RoscoeR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Ryan17b, author = {Peter Y. A. Ryan}, editor = {Frank Stajano and Jonathan Anderson and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Auditable PAKEs: Approaching Fair Exchange Without a {TTP} (Transcript of Discussion)}, booktitle = {Security Protocols {XXV} - 25th International Workshop, Cambridge, UK, March 20-22, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10476}, pages = {298--305}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-71075-4\_32}, doi = {10.1007/978-3-319-71075-4\_32}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Ryan17b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/voteid/BernhardBHRRSTV17, author = {Matthew Bernhard and Josh Benaloh and J. Alex Halderman and Ronald L. Rivest and Peter Y. A. Ryan and Philip B. Stark and Vanessa Teague and Poorvi L. Vora and Dan S. Wallach}, editor = {Robert Krimmer and Melanie Volkamer and Nadja Braun Binder and Norbert Kersting and Olivier Pereira and Carsten Sch{\"{u}}rmann}, title = {Public Evidence from Secret Ballots}, booktitle = {Electronic Voting - Second International Joint Conference, E-Vote-ID 2017, Bregenz, Austria, October 24-27, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10615}, pages = {84--109}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68687-5\_6}, doi = {10.1007/978-3-319-68687-5\_6}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/voteid/BernhardBHRRSTV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/LenziniORRGLN17, author = {Gabriele Lenzini and Samir Ouchani and Peter B. R{\o}nne and Peter Y. A. Ryan and Yong Geng and Jan Lagerwall and JungHyun Noh}, title = {Security in the shell: An optical physical unclonable function made of shells of cholesteric liquid crystals}, booktitle = {2017 {IEEE} Workshop on Information Forensics and Security, {WIFS} 2017, Rennes, France, December 4-7, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/WIFS.2017.8267644}, doi = {10.1109/WIFS.2017.8267644}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/LenziniORRGLN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2017w, editor = {Michael Brenner and Kurt Rohloff and Joseph Bonneau and Andrew Miller and Peter Y. A. Ryan and Vanessa Teague and Andrea Bracciali and Massimiliano Sala and Federico Pintore and Markus Jakobsson}, title = {Financial Cryptography and Data Security - {FC} 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10323}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70278-0}, doi = {10.1007/978-3-319-70278-0}, isbn = {978-3-319-70277-3}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/2017w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/voteid/2016, editor = {Robert Krimmer and Melanie Volkamer and Jordi Barrat and Josh Benaloh and Nicole J. Goodman and Peter Y. A. Ryan and Vanessa Teague}, title = {Electronic Voting - First International Joint Conference, E-Vote-ID 2016, Bregenz, Austria, October 18-21, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10141}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-52240-1}, doi = {10.1007/978-3-319-52240-1}, isbn = {978-3-319-52239-5}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/voteid/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/BenalohBHRRSTVW17, author = {Josh Benaloh and Matthew Bernhard and J. Alex Halderman and Ronald L. Rivest and Peter Y. A. Ryan and Philip B. Stark and Vanessa Teague and Poorvi L. Vora and Dan S. Wallach}, title = {Public Evidence from Secret Ballots}, journal = {CoRR}, volume = {abs/1707.08619}, year = {2017}, url = {http://arxiv.org/abs/1707.08619}, eprinttype = {arXiv}, eprint = {1707.08619}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/BenalohBHRRSTVW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/Ryan16, author = {Peter Y. A. Ryan}, editor = {Peter Y. A. Ryan and David Naccache and Jean{-}Jacques Quisquater}, title = {Crypto Santa}, booktitle = {The New Codebreakers - Essays Dedicated to David Kahn on the Occasion of His 85th Birthday}, series = {Lecture Notes in Computer Science}, volume = {9100}, pages = {543--549}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49301-4\_33}, doi = {10.1007/978-3-662-49301-4\_33}, timestamp = {Sat, 19 Oct 2019 20:29:10 +0200}, biburl = {https://dblp.org/rec/conf/birthday/Ryan16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecai/TabatabaeiJR16, author = {Masoud Tabatabaei and Wojciech Jamroga and Peter Y. A. Ryan}, title = {Expressing Receipt-Freeness and Coercion-Resistance in Logics of Strategic Ability: Preliminary Attempt}, booktitle = {Proceedings of the 1st International Workshop on {AI} for Privacy and Security, PrAISe@ECAI 2016, The Hague, Netherlands, August 29-30, 2016}, pages = {1:1--1:8}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2970030.2970039}, doi = {10.1145/2970030.2970039}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecai/TabatabaeiJR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/RyanRI16, author = {Peter Y. A. Ryan and Peter B. R{\o}nne and Vincenzo Iovino}, editor = {Jeremy Clark and Sarah Meiklejohn and Peter Y. A. Ryan and Dan S. Wallach and Michael Brenner and Kurt Rohloff}, title = {Selene: Voting with Transparent Verifiability and Coercion-Mitigation}, booktitle = {Financial Cryptography and Data Security - {FC} 2016 International Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February 26, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9604}, pages = {176--192}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53357-4\_12}, doi = {10.1007/978-3-662-53357-4\_12}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/RyanRI16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/birthday/2016kahn, editor = {Peter Y. A. Ryan and David Naccache and Jean{-}Jacques Quisquater}, title = {The New Codebreakers - Essays Dedicated to David Kahn on the Occasion of His 85th Birthday}, series = {Lecture Notes in Computer Science}, volume = {9100}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49301-4}, doi = {10.1007/978-3-662-49301-4}, isbn = {978-3-662-49300-7}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/birthday/2016kahn.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2016w, editor = {Jeremy Clark and Sarah Meiklejohn and Peter Y. A. Ryan and Dan S. Wallach and Michael Brenner and Kurt Rohloff}, title = {Financial Cryptography and Data Security - {FC} 2016 International Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February 26, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9604}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53357-4}, doi = {10.1007/978-3-662-53357-4}, isbn = {978-3-662-53356-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/2016w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/Gallegos-Garcia16, author = {Gina Gallegos{-}Garc{\'{\i}}a and Vincenzo Iovino and Alfredo Rial and Peter B. R{\o}nne and Peter Y. A. Ryan}, title = {(Universal) Unconditional Verifiability in E-Voting without Trusted Parties}, journal = {CoRR}, volume = {abs/1610.06343}, year = {2016}, url = {http://arxiv.org/abs/1610.06343}, eprinttype = {arXiv}, eprint = {1610.06343}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/Gallegos-Garcia16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Gallegos-Garcia16, author = {Gina Gallegos{-}Garc{\'{\i}}a and Vincenzo Iovino and Alfredo Rial and Peter B. R{\o}nne and Peter Y. A. Ryan}, title = {(Universal) Unconditional Verifiability in E-Voting without Trusted Parties}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {975}, year = {2016}, url = {http://eprint.iacr.org/2016/975}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Gallegos-Garcia16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dagstuhl-manifestos/PreneelRRR15, author = {Bart Preneel and Phillip Rogaway and Mark Dermot Ryan and Peter Y. A. Ryan}, title = {Privacy and Security in an Age of Surveillance (Dagstuhl Perspectives Workshop 14401)}, journal = {Dagstuhl Manifestos}, volume = {5}, number = {1}, pages = {25--37}, year = {2015}, url = {https://doi.org/10.4230/DagMan.5.1.25}, doi = {10.4230/DAGMAN.5.1.25}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dagstuhl-manifestos/PreneelRRR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/RyanST15, author = {Peter Y. A. Ryan and Steve A. Schneider and Vanessa Teague}, title = {End-to-End Verifiability in Voting Systems, from Theory to Practice}, journal = {{IEEE} Secur. Priv.}, volume = {13}, number = {3}, pages = {59--62}, year = {2015}, url = {https://doi.org/10.1109/MSP.2015.54}, doi = {10.1109/MSP.2015.54}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/RyanST15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/CulnaneRST15, author = {Chris Culnane and Peter Y. A. Ryan and Steve A. Schneider and Vanessa Teague}, title = {vVote: {A} Verifiable Voting System}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {18}, number = {1}, pages = {3:1--3:30}, year = {2015}, url = {https://doi.org/10.1145/2746338}, doi = {10.1145/2746338}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/CulnaneRST15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/BellaGLR15, author = {Giampaolo Bella and Rosario Giustolisi and Gabriele Lenzini and Peter Y. A. Ryan}, editor = {Hannes Federrath and Dieter Gollmann}, title = {A Secure Exam Protocol Without Trusted Parties}, booktitle = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11 International Conference, {SEC} 2015, Hamburg, Germany, May 26-28, 2015, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {455}, pages = {495--509}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-18467-8\_33}, doi = {10.1007/978-3-319-18467-8\_33}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/BellaGLR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/AtashpendarRR15, author = {Arash Atashpendar and A. W. Roscoe and Peter Y. A. Ryan}, editor = {Bruce Christianson and Petr Svenda and Vashek Maty{\'{a}}s and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Information Leakage Due to Revealing Randomly Selected Bits}, booktitle = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9379}, pages = {325--341}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26096-9\_33}, doi = {10.1007/978-3-319-26096-9\_33}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/AtashpendarRR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2015-1, editor = {G{\"{u}}nther Pernul and Peter Y. A. Ryan and Edgar R. Weippl}, title = {Computer Security - {ESORICS} 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9326}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24174-6}, doi = {10.1007/978-3-319-24174-6}, isbn = {978-3-319-24173-9}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/2015-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2015-2, editor = {G{\"{u}}nther Pernul and Peter Y. A. Ryan and Edgar R. Weippl}, title = {Computer Security - {ESORICS} 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9327}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24177-7}, doi = {10.1007/978-3-319-24177-7}, isbn = {978-3-319-24176-0}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/2015-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/BenalohRRSTV15, author = {Josh Benaloh and Ronald L. Rivest and Peter Y. A. Ryan and Philip B. Stark and Vanessa Teague and Poorvi L. Vora}, title = {End-to-end verifiability}, journal = {CoRR}, volume = {abs/1504.03778}, year = {2015}, url = {http://arxiv.org/abs/1504.03778}, eprinttype = {arXiv}, eprint = {1504.03778}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/BenalohRRSTV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RyanRI15, author = {Peter Y. A. Ryan and Peter B. R{\o}nne and Vincenzo Iovino}, title = {Selene: Voting with Transparent Verifiability and Coercion-Mitigation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1105}, year = {2015}, url = {http://eprint.iacr.org/2015/1105}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RyanRI15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/ArriagaTR14, author = {Afonso Arriaga and Qiang Tang and Peter Y. A. Ryan}, editor = {David Pointcheval and Damien Vergnaud}, title = {Trapdoor Privacy in Asymmetric Searchable Encryption Schemes}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2014 - 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8469}, pages = {31--50}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-06734-6\_3}, doi = {10.1007/978-3-319-06734-6\_3}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/ArriagaTR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/DreierG0LLR14, author = {Jannik Dreier and Rosario Giustolisi and Ali Kassem and Pascal Lafourcade and Gabriele Lenzini and Peter Y. A. Ryan}, editor = {Mohammad S. Obaidat and Andreas Holzinger and Joaquim Filipe}, title = {Formal Security Analysis of Traditional and Electronic Exams}, booktitle = {E-Business and Telecommunications - 11th International Joint Conference, {ICETE} 2014, Vienna, Austria, August 28-30, 2014, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {554}, pages = {294--318}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-25915-4\_16}, doi = {10.1007/978-3-319-25915-4\_16}, timestamp = {Tue, 16 Aug 2022 23:04:29 +0200}, biburl = {https://dblp.org/rec/conf/icete/DreierG0LLR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/DreierGKLLR14, author = {Jannik Dreier and Rosario Giustolisi and Ali Kassem and Pascal Lafourcade and Gabriele Lenzini and Peter Y. A. Ryan}, editor = {Mohammad S. Obaidat and Andreas Holzinger and Pierangela Samarati}, title = {Formal Analysis of Electronic Exams}, booktitle = {{SECRYPT} 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014}, pages = {101--112}, publisher = {SciTePress}, year = {2014}, url = {https://doi.org/10.5220/0005050901010112}, doi = {10.5220/0005050901010112}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/DreierGKLLR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/GiustolisiLR14, author = {Rosario Giustolisi and Gabriele Lenzini and Peter Y. A. Ryan}, editor = {Bruce Christianson and James A. Malcolm and Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Jonathan Anderson}, title = {Remark!: {A} Secure Protocol for Remote Exams}, booktitle = {Security Protocols {XXII} - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8809}, pages = {38--48}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12400-1\_5}, doi = {10.1007/978-3-319-12400-1\_5}, timestamp = {Mon, 05 Feb 2024 20:35:15 +0100}, biburl = {https://dblp.org/rec/conf/spw/GiustolisiLR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/CulnaneHJRST14, author = {Chris Culnane and James Heather and Rui Joaquim and Peter Y. A. Ryan and Steve A. Schneider and Vanessa Teague}, title = {Faster Print on Demand for Pr{\^{e}}t {\`{a}} Voter}, booktitle = {2014 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections, {EVT/WOTE} '14, San Diego, CA, USA, August 18-19, 2014}, publisher = {{USENIX} Association}, year = {2014}, url = {https://www.usenix.org/conference/evtwote14/workshop-program/presentation/culnane}, timestamp = {Mon, 01 Feb 2021 08:42:52 +0100}, biburl = {https://dblp.org/rec/conf/uss/CulnaneHJRST14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/CulnaneRST14, author = {Chris Culnane and Peter Y. A. Ryan and Steve A. Schneider and Vanessa Teague}, title = {vVote: a Verifiable Voting System {(DRAFT)}}, journal = {CoRR}, volume = {abs/1404.6822}, year = {2014}, url = {http://arxiv.org/abs/1404.6822}, eprinttype = {arXiv}, eprint = {1404.6822}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/CulnaneRST14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dagstuhl-reports/PreneelRRR14, author = {Bart Preneel and Phillip Rogaway and Mark Dermot Ryan and Peter Y. A. Ryan}, title = {Privacy and Security in an Age of Surveillance (Dagstuhl Perspectives Workshop 14401)}, journal = {Dagstuhl Reports}, volume = {4}, number = {9}, pages = {106--123}, year = {2014}, url = {https://doi.org/10.4230/DagRep.4.9.106}, doi = {10.4230/DAGREP.4.9.106}, timestamp = {Wed, 07 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dagstuhl-reports/PreneelRRR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PhatakTSSRK14a, author = {Dhananjay S. Phatak and Qiang Tang and Alan T. Sherman and Warren D. Smith and Peter Y. A. Ryan and Konstantinos Kalpakis}, title = {DoubleMod and SingleMod: Simple Randomized Secret-Key Encryption with Bounded Homomorphicity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {670}, year = {2014}, url = {http://eprint.iacr.org/2014/670}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PhatakTSSRK14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijar/PoulyKR13, author = {Marc Pouly and J{\"{u}}rg Kohlas and Peter Y. A. Ryan}, title = {Generalized information theory for hints}, journal = {Int. J. Approx. Reason.}, volume = {54}, number = {1}, pages = {228--251}, year = {2013}, url = {https://doi.org/10.1016/j.ijar.2012.08.004}, doi = {10.1016/J.IJAR.2012.08.004}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijar/PoulyKR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/GrewalRBR13, author = {Gurchetan S. Grewal and Mark Dermot Ryan and Sergiu Bursuc and Peter Y. A. Ryan}, title = {Caveat Coercitor: Coercion-Evidence in Electronic Voting}, booktitle = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley, CA, USA, May 19-22, 2013}, pages = {367--381}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SP.2013.32}, doi = {10.1109/SP.2013.32}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/GrewalRBR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BenalohRT13, author = {Josh Benaloh and Peter Y. A. Ryan and Vanessa Teague}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson and Joseph Bonneau}, title = {Verifiable Postal Voting}, booktitle = {Security Protocols {XXI} - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8263}, pages = {54--65}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41717-7\_8}, doi = {10.1007/978-3-642-41717-7\_8}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/BenalohRT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/RyanC13, author = {Peter Y. A. Ryan and Bruce Christianson}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson and Joseph Bonneau}, title = {Enhancements to Prepare-and-Measure Based {QKD} Protocols}, booktitle = {Security Protocols {XXI} - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8263}, pages = {123--133}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41717-7\_14}, doi = {10.1007/978-3-642-41717-7\_14}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/RyanC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Ryan13, author = {Peter Y. A. Ryan}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson and Joseph Bonneau}, title = {Enhancements to Prepare-and-Measure-Based {QKD} Protocols (Transcript of Discussion)}, booktitle = {Security Protocols {XXI} - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8263}, pages = {134--142}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41717-7\_15}, doi = {10.1007/978-3-642-41717-7\_15}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Ryan13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/KhaderTR13, author = {Dalia Khader and Qiang Tang and Peter Y. A. Ryan}, title = {Proving Pr{\^{e}}t {\`{a}} Voter Receipt Free Using Computational Security Models}, booktitle = {2013 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, {EVT/WOTE} '13, Washington, D.C., USA, August 12-13, 2013}, publisher = {{USENIX} Association}, year = {2013}, url = {https://www.usenix.org/conference/evtwote13/workshop-program/presentation/khader}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/KhaderTR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/LlewellynSXCHRS13, author = {Morgan Llewellyn and Steve A. Schneider and Zhe Xia and Chris Culnane and James Heather and Peter Y. A. Ryan and Sriramkrishnan Srinivasan}, title = {Testing Voters' Understanding of a Security Mechanism Used in Verifiable Voting}, booktitle = {2013 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, {EVT/WOTE} '13, Washington, D.C., USA, August 12-13, 2013}, publisher = {{USENIX} Association}, year = {2013}, url = {https://www.usenix.org/conference/evtwote13/workshop-program/presentation/llewellyn}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/LlewellynSXCHRS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/voteid/DemirelHGRB13, author = {Denise Demirel and Maria Henning and Jeroen van de Graaf and Peter Y. A. Ryan and Johannes Buchmann}, editor = {James Heather and Steve A. Schneider and Vanessa Teague}, title = {Pr{\^{e}}t {\`{a}} Voter Providing Everlasting Privacy}, booktitle = {E-Voting and Identify - 4th International Conference, VoteID 2013, Guildford, UK, July 17-19, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7985}, pages = {156--175}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39185-9\_10}, doi = {10.1007/978-3-642-39185-9\_10}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/voteid/DemirelHGRB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ev/BurtonCHPRSSTWX12, author = {Craig Burton and Chris Culnane and James Heather and Thea Peacock and Peter Y. A. Ryan and Steve A. Schneider and Sriramkrishnan Srinivasan and Vanessa Teague and Roland Wen and Zhe Xia}, editor = {Manuel J. Kripp and Melanie Volkamer and R{\"{u}}diger Grimm}, title = {A Supervised Verifiable Voting Protocol for the Victorian Electoral Commission}, booktitle = {5th International Conference on Electronic Voting 2012, {(EVOTE} 2012), Co-organized by the Council of Europe, Gesellschaft f{\"{u}}r Informatik and E-Voting.CC, July 11-14, 2012, Castle Hofen, Bregenz, Austria}, series = {{LNI}}, volume = {{P-205}}, pages = {81--94}, publisher = {{GI}}, year = {2012}, url = {https://dl.gi.de/handle/20.500.12116/18227}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ev/BurtonCHPRSSTWX12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ev/KhaderSRH12, author = {Dalia Khader and Ben Smyth and Peter Y. A. Ryan and Feng Hao}, editor = {Manuel J. Kripp and Melanie Volkamer and R{\"{u}}diger Grimm}, title = {A Fair and Robust Voting System by Broadcast}, booktitle = {5th International Conference on Electronic Voting 2012, {(EVOTE} 2012), Co-organized by the Council of Europe, Gesellschaft f{\"{u}}r Informatik and E-Voting.CC, July 11-14, 2012, Castle Hofen, Bregenz, Austria}, series = {{LNI}}, volume = {{P-205}}, pages = {285--299}, publisher = {{GI}}, year = {2012}, url = {https://dl.gi.de/handle/20.500.12116/18220}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ev/KhaderSRH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stast/Coles-KempR12, author = {Lizzie Coles{-}Kemp and Peter Y. A. Ryan}, title = {Foreword from the Programme Chairs - {STAST} 2012}, booktitle = {2nd Workshop on Socio-Technical Aspects in Security and Trust, {STAST} 2012, Cambridge, MA, USA, June 25, 2012}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/STAST.2012.5}, doi = {10.1109/STAST.2012.5}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stast/Coles-KempR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/BurtonCHPRSTWXS12, author = {Craig Burton and Chris Culnane and James Heather and Thea Peacock and Peter Y. A. Ryan and Steve A. Schneider and Vanessa Teague and Roland Wen and Zhe Xia and Sriramkrishnan Srinivasan}, editor = {J. Alex Halderman and Olivier Pereira}, title = {Using Pr{\^{e}}t {\`{a}} Voter in Victoria State Elections}, booktitle = {2012 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, {EVT/WOTE} '12, Bellevue, WA, USA, August 6-7, 2012}, publisher = {{USENIX} Association}, year = {2012}, url = {https://www.usenix.org/conference/evtwote12/workshop-program/presentation/burton}, timestamp = {Mon, 01 Feb 2021 08:43:08 +0100}, biburl = {https://dblp.org/rec/conf/uss/BurtonCHPRSTWXS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/re/KramerR11, author = {Simon Kramer and Peter Y. A. Ryan}, title = {A modular multi-modal specification of real-timed, end-to-end voter-verifiable voting systems}, booktitle = {2011 International Workshop on Requirements Engineering for Electronic Voting Systems, {REVOTE} 2011, Trento, Italy, August 29, 2011}, pages = {9--21}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/REVOTE.2011.6045911}, doi = {10.1109/REVOTE.2011.6045911}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/re/KramerR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/HaoR11, author = {Feng Hao and Peter Y. A. Ryan}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Frank Stajano}, title = {How to Sync with Alice}, booktitle = {Security Protocols {XIX} - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7114}, pages = {170--178}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25867-1\_16}, doi = {10.1007/978-3-642-25867-1\_16}, timestamp = {Mon, 12 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/HaoR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Ryan11, author = {Peter Y. A. Ryan}, editor = {Hovav Shacham and Vanessa Teague}, title = {Pr{\^{e}}t {\`{a}} Voter with Confirmation Codes}, booktitle = {2011 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, {EVT/WOTE} '11, San Francisco, CA, USA, August 8-9, 2011}, publisher = {{USENIX} Association}, year = {2011}, url = {https://www.usenix.org/conference/evtwote-11/pr\%C3\%AAt-\%C3\%A0-voter-confirmation-codes}, timestamp = {Mon, 01 Feb 2021 08:42:50 +0100}, biburl = {https://dblp.org/rec/conf/uss/Ryan11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/voteid/DemirelHRSV11, author = {Denise Demirel and Maria Henning and Peter Y. A. Ryan and Steve A. Schneider and Melanie Volkamer}, editor = {Aggelos Kiayias and Helger Lipmaa}, title = {Feasibility Analysis of Pr{\^{e}}t {\`{a}} Voter for German Federal Elections}, booktitle = {E-Voting and Identity - Third International Conference, VoteID 2011, Tallinn, Estonia, September 28-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7187}, pages = {158--173}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-32747-6\_10}, doi = {10.1007/978-3-642-32747-6\_10}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/voteid/DemirelHRSV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dagstuhl-reports/AlvarezBRR11, author = {R. Michael Alvarez and Josh Benaloh and Alon Rosen and Peter Y. A. Ryan}, title = {Verifiable Elections and the Public (Dagstuhl Seminar 11281)}, journal = {Dagstuhl Reports}, volume = {1}, number = {7}, pages = {36--52}, year = {2011}, url = {https://doi.org/10.4230/DagRep.1.7.36}, doi = {10.4230/DAGREP.1.7.36}, timestamp = {Wed, 07 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dagstuhl-reports/AlvarezBRR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KhaderR11, author = {Dalia Khader and Peter Y. A. Ryan}, title = {Receipt Freeness of Pr{\^{e}}t {\`{a}} Voter Provably Secure}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {594}, year = {2011}, url = {http://eprint.iacr.org/2011/594}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KhaderR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/HaoRZ10, author = {Feng Hao and Peter Y. A. Ryan and Piotr Zielinski}, title = {Anonymous voting by two-round public discussion}, journal = {{IET} Inf. Secur.}, volume = {4}, number = {2}, pages = {62--67}, year = {2010}, url = {https://doi.org/10.1049/iet-ifs.2008.0127}, doi = {10.1049/IET-IFS.2008.0127}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/HaoRZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcos/HaoR10, author = {Feng Hao and Peter Y. A. Ryan}, title = {{J-PAKE:} Authenticated Key Exchange without {PKI}}, journal = {Trans. Comput. Sci.}, volume = {11}, pages = {192--206}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17697-5\_10}, doi = {10.1007/978-3-642-17697-5\_10}, timestamp = {Wed, 15 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcos/HaoR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChaumCCEPRRSSV10, author = {David Chaum and Richard Carback and Jeremy Clark and Aleksander Essex and Stefan Popoveniuc and Ronald L. Rivest and Peter Y. A. Ryan and Emily Shen and Alan T. Sherman and Poorvi L. Vora}, title = {Corrections to scantegrity {II:} end-to-end verifiability by voters of optical scan elections through confirmation codes}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {5}, number = {1}, pages = {194}, year = {2010}, url = {https://doi.org/10.1109/TIFS.2010.2040672}, doi = {10.1109/TIFS.2010.2040672}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ChaumCCEPRRSSV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/HeatherRT10, author = {James Heather and Peter Y. A. Ryan and Vanessa Teague}, editor = {Dimitris Gritzalis and Bart Preneel and Marianthi Theoharidou}, title = {Pretty Good Democracy for More Expressive Voting Schemes}, booktitle = {Computer Security - {ESORICS} 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6345}, pages = {405--423}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15497-3\_25}, doi = {10.1007/978-3-642-15497-3\_25}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/HeatherRT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/XiaCHJRSS10, author = {Zhe Xia and Chris Culnane and James Heather and Hugo Jonker and Peter Y. A. Ryan and Steve A. Schneider and Sriramkrishnan Srinivasan}, editor = {Guang Gong and Kishan Chand Gupta}, title = {Versatile Pr{\^{e}}t {\`{a}} Voter: Handling Multiple Election Methods with a Unified Interface}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2010 - 11th International Conference on Cryptology in India, Hyderabad, India, December 12-15, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6498}, pages = {98--114}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17401-8\_8}, doi = {10.1007/978-3-642-17401-8\_8}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/XiaCHJRSS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BellaRT10, author = {Giampaolo Bella and Peter Y. A. Ryan and Vanessa Teague}, editor = {Bruce Christianson and James A. Malcolm}, title = {Virtually Perfect Democracy}, booktitle = {Security Protocols {XVIII} - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7061}, pages = {161--166}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-662-45921-8\_24}, doi = {10.1007/978-3-662-45921-8\_24}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/BellaRT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Ryan10, author = {Peter Y. A. Ryan}, editor = {Bruce Christianson and James A. Malcolm}, title = {Virtually Perfect Democracy (Transcript of Discussion)}, booktitle = {Security Protocols {XVIII} - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7061}, pages = {167--174}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-662-45921-8\_25}, doi = {10.1007/978-3-662-45921-8\_25}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Ryan10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/MauwRR10, author = {Sjouke Mauw and Sasa Radomirovic and Peter Y. A. Ryan}, editor = {Bruce Christianson and James A. Malcolm}, title = {Security Protocols for Secret Santa}, booktitle = {Security Protocols {XVIII} - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7061}, pages = {175--184}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-662-45921-8\_26}, doi = {10.1007/978-3-662-45921-8\_26}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/MauwRR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wote/RyanP10, author = {Peter Y. A. Ryan and Thea Peacock}, editor = {David Chaum and Markus Jakobsson and Ronald L. Rivest and Peter Y. A. Ryan and Josh Benaloh and Miroslaw Kutylowski and Ben Adida}, title = {A Threat Analysis of Pr{\^{e}}t {\`{a}} Voter}, booktitle = {Towards Trustworthy Elections, New Directions in Electronic Voting}, series = {Lecture Notes in Computer Science}, volume = {6000}, pages = {200--215}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12980-3\_12}, doi = {10.1007/978-3-642-12980-3\_12}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wote/RyanP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wote/2010lncs, editor = {David Chaum and Markus Jakobsson and Ronald L. Rivest and Peter Y. A. Ryan and Josh Benaloh and Miroslaw Kutylowski and Ben Adida}, title = {Towards Trustworthy Elections, New Directions in Electronic Voting}, series = {Lecture Notes in Computer Science}, volume = {6000}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12980-3}, doi = {10.1007/978-3-642-12980-3}, isbn = {978-3-642-12979-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wote/2010lncs.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HaoR10, author = {Feng Hao and Peter Y. A. Ryan}, title = {{J-PAKE:} Authenticated Key Exchange Without {PKI}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {190}, year = {2010}, url = {http://eprint.iacr.org/2010/190}, timestamp = {Wed, 15 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HaoR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/BellaR09, author = {Giampaolo Bella and Peter Y. A. Ryan}, title = {Journal of Computer SecuritySpecial Number devoted to the best papers of the Security Track at the 2006 {ACM} Symposium on Applied Computing}, journal = {J. Comput. Secur.}, volume = {17}, number = {3}, pages = {237}, year = {2009}, url = {https://doi.org/10.3233/JCS-2009-0346}, doi = {10.3233/JCS-2009-0346}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/BellaR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChaumCCEPRRSSV09, author = {David Chaum and Richard Carback and Jeremy Clark and Aleksander Essex and Stefan Popoveniuc and Ronald L. Rivest and Peter Y. A. Ryan and Emily Shen and Alan T. Sherman and Poorvi L. Vora}, title = {Scantegrity {II:} end-to-end verifiability by voters of optical scan elections through confirmation codes}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {4}, pages = {611--627}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2009.2034919}, doi = {10.1109/TIFS.2009.2034919}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ChaumCCEPRRSSV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/RyanBHSX09, author = {Peter Y. A. Ryan and David Bismark and James Heather and Steve A. Schneider and Zhe Xia}, title = {Pr{\^{e}}t {\`{a}} voter: a voter-verifiable voting system}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {4}, pages = {662--673}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2009.2033233}, doi = {10.1109/TIFS.2009.2033233}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/RyanBHSX09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/Ryan09, author = {Peter Y. A. Ryan}, editor = {Pierpaolo Degano and Luca Vigan{\`{o}}}, title = {How Many Election Officials Does It Take to Change an Election?}, booktitle = {Foundations and Applications of Security Analysis, Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, {ARSPA-WITS} 2009, York, UK, March 28-29, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5511}, pages = {211--221}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03459-6\_14}, doi = {10.1007/978-3-642-03459-6\_14}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/Ryan09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/re/BismarkHPSXR09, author = {David Bismark and James Heather and Roger M. A. Peel and Steve A. Schneider and Zhe Xia and Peter Y. A. Ryan}, title = {Experiences Gained from the first Pr{\^{e}}t {\`{a}} Voter Implementation}, booktitle = {First International Workshop on Requirements Engineering for e-Voting Systems, {RE-VOTE} 2009, Atlanta, Georgia, USA, August 31, 2009}, pages = {19--28}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/RE-VOTE.2009.5}, doi = {10.1109/RE-VOTE.2009.5}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/re/BismarkHPSXR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/RyanT09, author = {Peter Y. A. Ryan and Vanessa Teague}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {Pretty Good Democracy}, booktitle = {Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7028}, pages = {111--130}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-36213-2\_15}, doi = {10.1007/978-3-642-36213-2\_15}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/RyanT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Ryan09, author = {Peter Y. A. Ryan}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {Pretty Good Democracy}, booktitle = {Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7028}, pages = {131--142}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-36213-2\_16}, doi = {10.1007/978-3-642-36213-2\_16}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Ryan09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/RyanT09, author = {Peter Y. A. Ryan and Vanessa Teague}, editor = {David Jefferson and Joseph Lorenzo Hall and Tal Moran}, title = {Permutations in Pr{\^{e}}t {\`{a}} Voter}, booktitle = {2009 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, {EVT/WOTE} '09, Montreal, Canada, August 10-11, 2009}, publisher = {{USENIX} Association}, year = {2009}, url = {https://www.usenix.org/conference/evtwote-09/permutations-pr\%C3\%AAt-\%C3\%A0-voter}, timestamp = {Mon, 01 Feb 2021 08:43:14 +0100}, biburl = {https://dblp.org/rec/conf/uss/RyanT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/corr/abs-1001-5050, author = {Ali Nasrat Haidar and Peter V. Coveney and Ali E. Abdallah and Peter Y. A. Ryan and Bruce Beckles and J. M. Brooke and M. A. S. Jones}, editor = {Jeremy W. Bryans and John S. Fitzgerald}, title = {Formal Modelling of a Usable Identity Management Solution for Virtual Organisations}, booktitle = {Proceedings Second Workshop on Formal Aspects of Virtual Organisations, {FAVO} 2009, Eindhoven, The Netherlands, 3rd November 2009}, series = {{EPTCS}}, volume = {16}, pages = {41--50}, year = {2009}, url = {https://doi.org/10.4204/EPTCS.16.4}, doi = {10.4204/EPTCS.16.4}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1001-5050.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/dagstuhl/2009P9311, editor = {Samuel L. Braunstein and Hoi{-}Kwong Lo and Kenny Paterson and Peter Y. A. Ryan}, title = {Classical and Quantum Information Assurance Foundations and Practice, 26.07. - 31.07.2009}, series = {Dagstuhl Seminar Proceedings}, volume = {09311}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany}, year = {2009}, url = {http://drops.dagstuhl.de/portals/09311/}, timestamp = {Thu, 10 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/2009P9311.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/voteid/2009, editor = {Peter Y. A. Ryan and Berry Schoenmakers}, title = {E-Voting and Identity, Second International Conference, VoteID 2009, Luxembourg, September 7-8, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5767}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04135-8}, doi = {10.1007/978-3-642-04135-8}, isbn = {978-3-642-04134-1}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/voteid/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/BraunsteinLPR09, author = {Samuel L. Braunstein and Hoi{-}Kwong Lo and Kenny Paterson and Peter Y. A. Ryan}, editor = {Samuel L. Braunstein and Hoi{-}Kwong Lo and Kenny Paterson and Peter Y. A. Ryan}, title = {09311 Abstracts Collection - Classical and Quantum Information Assurance Foundations and Practice}, booktitle = {Classical and Quantum Information Assurance Foundations and Practice, 26.07. - 31.07.2009}, series = {Dagstuhl Seminar Proceedings}, volume = {09311}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany}, year = {2009}, url = {http://drops.dagstuhl.de/opus/volltexte/2010/2365/}, timestamp = {Thu, 10 Jun 2021 13:02:05 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/BraunsteinLPR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/BryansKMR08, author = {Jeremy W. Bryans and Maciej Koutny and Laurent Mazar{\'{e}} and Peter Y. A. Ryan}, title = {Opacity generalised to transition systems}, journal = {Int. J. Inf. Sec.}, volume = {7}, number = {6}, pages = {421--435}, year = {2008}, url = {https://doi.org/10.1007/s10207-008-0058-x}, doi = {10.1007/S10207-008-0058-X}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/BryansKMR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mcm/Ryan08, author = {Peter Y. A. Ryan}, title = {Pr{\^{e}}t {\`{a}} Voter with Paillier encryption}, journal = {Math. Comput. Model.}, volume = {48}, number = {9-10}, pages = {1646--1662}, year = {2008}, url = {https://doi.org/10.1016/j.mcm.2008.05.015}, doi = {10.1016/J.MCM.2008.05.015}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mcm/Ryan08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/LundinR08, author = {David Lundin and Peter Y. A. Ryan}, editor = {Sushil Jajodia and Javier L{\'{o}}pez}, title = {Human Readable Paper Verification of Pr{\^{e}}t {\`{a}} Voter}, booktitle = {Computer Security - {ESORICS} 2008, 13th European Symposium on Research in Computer Security, M{\'{a}}laga, Spain, October 6-8, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5283}, pages = {379--395}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88313-5\_25}, doi = {10.1007/978-3-540-88313-5\_25}, timestamp = {Thu, 29 Aug 2019 08:09:59 +0200}, biburl = {https://dblp.org/rec/conf/esorics/LundinR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ev/AraujoR08, author = {Roberto Ara{\'{u}}jo and Peter Y. A. Ryan}, editor = {Robert Krimmer and R{\"{u}}diger Grimm}, title = {Improving the Farnel Voting Scheme}, booktitle = {3rd International Conference, Co-organized by Council of Europe, Gesellschaft f{\"{u}}r Informatik and E-Voting.CC, August 6th-9th, 2008 in Castle Hofen, Bregenz, Austria}, series = {{LNI}}, volume = {{P-131}}, pages = {169--182}, publisher = {{GI}}, year = {2008}, url = {https://dl.gi.de/handle/20.500.12116/29180}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ev/AraujoR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/HaoR08, author = {Feng Hao and Peter Y. A. Ryan}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {Password Authenticated Key Exchange by Juggling}, booktitle = {Security Protocols {XVI} - 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6615}, pages = {159--171}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-22137-8\_23}, doi = {10.1007/978-3-642-22137-8\_23}, timestamp = {Mon, 12 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/HaoR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Ryan08, author = {Peter Y. A. Ryan}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {Remodelling the Attacker in Voting Protocols}, booktitle = {Security Protocols {XVI} - 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6615}, pages = {232--234}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-22137-8\_31}, doi = {10.1007/978-3-642-22137-8\_31}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Ryan08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Ryan08a, author = {Peter Y. A. Ryan}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {Remodelling the Attacker in Voting Protocols (Transcript of Discussion)}, booktitle = {Security Protocols {XVI} - 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6615}, pages = {235--240}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-22137-8\_32}, doi = {10.1007/978-3-642-22137-8\_32}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Ryan08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ChaumCCEPRRSS08, author = {David Chaum and Richard Carback and Jeremy Clark and Aleksander Essex and Stefan Popoveniuc and Ronald L. Rivest and Peter Y. A. Ryan and Emily Shen and Alan T. Sherman}, editor = {David L. Dill and Tadayoshi Kohno}, title = {Scantegrity {II:} End-to-End Verifiability for Optical Scan Election Systems using Invisible Ink Confirmation Codes}, booktitle = {2008 {USENIX/ACCURATE} Electronic Voting Workshop, {EVT} 2008, July 28-29, 2008, San Jose, CA, USA, Proceedings}, publisher = {{USENIX} Association}, year = {2008}, url = {http://www.usenix.org/events/evt08/tech/full\_papers/chaum/chaum.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/ChaumCCEPRRSS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/dagstuhl/2007P7311, editor = {David Chaum and Miroslaw Kutylowski and Ronald L. Rivest and Peter Y. A. Ryan}, title = {Frontiers of Electronic Voting, 29.07. - 03.08.2007}, series = {Dagstuhl Seminar Proceedings}, volume = {07311}, publisher = {Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany}, year = {2008}, url = {http://drops.dagstuhl.de/portals/07311/}, timestamp = {Thu, 10 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/2007P7311.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AraujoR08, author = {Roberto Ara{\'{u}}jo and Peter Y. A. Ryan}, title = {Improving the Farnel, Threeballot, and Randell-Ryan Voting Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {82}, year = {2008}, url = {http://eprint.iacr.org/2008/082}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AraujoR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/DimitrakosMRS07, author = {Theodosis Dimitrakos and Fabio Martinelli and Peter Y. A. Ryan and Steve A. Schneider}, title = {Guest Editors' Preface}, journal = {Int. J. Inf. Sec.}, volume = {6}, number = {2-3}, pages = {65--66}, year = {2007}, url = {https://doi.org/10.1007/s10207-007-0012-3}, doi = {10.1007/S10207-007-0012-3}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/DimitrakosMRS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/TjostheimPR07, author = {Thomas Tj{\o}stheim and Thea Peacock and Peter Y. A. Ryan}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {A Model for System-Based Analysis of Voting Systems}, booktitle = {Security Protocols - 15th International Workshop, Brno, Czech Republic, April 18-20, 2007. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5964}, pages = {114--130}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-642-17773-6\_13}, doi = {10.1007/978-3-642-17773-6\_13}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/TjostheimPR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ifip1-7/2006, editor = {Theodosis Dimitrakos and Fabio Martinelli and Peter Y. A. Ryan and Steve A. Schneider}, title = {Formal Aspects in Security and Trust, Fourth International Workshop, {FAST} 2006, Hamilton, Ontario, Canada, August 26-27, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4691}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75227-1}, doi = {10.1007/978-3-540-75227-1}, isbn = {978-3-540-75226-4}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/ChaumKRR07, author = {David Chaum and Miroslaw Kutylowski and Ronald L. Rivest and Peter Y. A. Ryan}, editor = {David Chaum and Miroslaw Kutylowski and Ronald L. Rivest and Peter Y. A. Ryan}, title = {07311 Executive Summary -- Frontiers of Electronic Voting}, booktitle = {Frontiers of Electronic Voting, 29.07. - 03.08.2007}, series = {Dagstuhl Seminar Proceedings}, volume = {07311}, publisher = {Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany}, year = {2007}, url = {http://drops.dagstuhl.de/opus/volltexte/2008/1294}, timestamp = {Thu, 10 Jun 2021 13:02:04 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/ChaumKRR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/ChaumKRR07a, author = {David Chaum and Miroslaw Kutylowski and Ronald L. Rivest and Peter Y. A. Ryan}, editor = {David Chaum and Miroslaw Kutylowski and Ronald L. Rivest and Peter Y. A. Ryan}, title = {07311 Abstracts Collection -- Frontiers of Electronic Voting}, booktitle = {Frontiers of Electronic Voting, 29.07. - 03.08.2007}, series = {Dagstuhl Seminar Proceedings}, volume = {07311}, publisher = {Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany}, year = {2007}, url = {http://drops.dagstuhl.de/opus/volltexte/2008/1303}, timestamp = {Thu, 23 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/ChaumKRR07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChaumGRV07, author = {David Chaum and Jeroen van de Graaf and Peter Y. A. Ryan and Poorvi L. Vora}, title = {Secret Ballot Elections with Unconditional Integrity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {270}, year = {2007}, url = {http://eprint.iacr.org/2007/270}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChaumGRV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/RandellR06, author = {Brian Randell and Peter Y. A. Ryan}, title = {Voting Technologies and Trust}, journal = {{IEEE} Secur. Priv.}, volume = {4}, number = {5}, pages = {50--56}, year = {2006}, url = {https://doi.org/10.1109/MSP.2006.140}, doi = {10.1109/MSP.2006.140}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/RandellR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/BryansLRS06, author = {Jeremy W. Bryans and Bev Littlewood and Peter Y. A. Ryan and Lorenzo Strigini}, title = {E-voting: Dependability Requirements and Design for Dependability}, booktitle = {Proceedings of the The First International Conference on Availability, Reliability and Security, {ARES} 2006, The International Dependability Conference - Bridging Theory and Practice, April 20-22 2006, Vienna University of Technology, Austria}, pages = {988--995}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ARES.2006.56}, doi = {10.1109/ARES.2006.56}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/BryansLRS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/RyanS06, author = {Peter Y. A. Ryan and Steve A. Schneider}, editor = {Dieter Gollmann and Jan Meier and Andrei Sabelfeld}, title = {Pr{\^{e}}t {\`{a}} Voter with Re-encryption Mixes}, booktitle = {Computer Security - {ESORICS} 2006, 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4189}, pages = {313--326}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11863908\_20}, doi = {10.1007/11863908\_20}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/RyanS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/BellaR06, author = {Giampaolo Bella and Peter Y. A. Ryan}, editor = {Hisham Haddad}, title = {Editorial message: special track on computer security}, booktitle = {Proceedings of the 2006 {ACM} Symposium on Applied Computing (SAC), Dijon, France, April 23-27, 2006}, pages = {321--322}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1141277.1141355}, doi = {10.1145/1141277.1141355}, timestamp = {Tue, 06 Nov 2018 11:06:49 +0100}, biburl = {https://dblp.org/rec/conf/sac/BellaR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/RyanP06, author = {Peter Y. A. Ryan and Thea Peacock}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Putting the Human Back in Voting Protocols}, booktitle = {Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5087}, pages = {13--19}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-642-04904-0\_3}, doi = {10.1007/978-3-642-04904-0\_3}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/RyanP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Ryan06, author = {Peter Y. A. Ryan}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Putting the Human Back in Voting Protocols}, booktitle = {Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5087}, pages = {20--25}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-642-04904-0\_4}, doi = {10.1007/978-3-642-04904-0\_4}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Ryan06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ifip1-7/2005, editor = {Theodosis Dimitrakos and Fabio Martinelli and Peter Y. A. Ryan and Steve A. Schneider}, title = {Formal Aspects in Security and Trust, Third International Workshop, {FAST} 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3866}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11679219}, doi = {10.1007/11679219}, isbn = {3-540-32628-6}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/BellaR05, author = {Giampaolo Bella and Peter Y. A. Ryan}, title = {Guest Editors' preface}, journal = {J. Comput. Secur.}, volume = {13}, number = {5}, pages = {697}, year = {2005}, url = {https://doi.org/10.3233/jcs-2005-13501}, doi = {10.3233/JCS-2005-13501}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/BellaR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/Ryan05, author = {Peter Ryan}, title = {Prospects for E-Voting}, booktitle = {29th Annual International Computer Software and Applications Conference, {COMPSAC} 2005, Edinburgh, Scotland, UK, July 25-28, 2005. Volume 1}, pages = {501}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/COMPSAC.2005.125}, doi = {10.1109/COMPSAC.2005.125}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/compsac/Ryan05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/ChaumRS05, author = {David Chaum and Peter Y. A. Ryan and Steve A. Schneider}, editor = {Sabrina De Capitani di Vimercati and Paul F. Syverson and Dieter Gollmann}, title = {A Practical Voter-Verifiable Election Scheme}, booktitle = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3679}, pages = {118--139}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11555827\_8}, doi = {10.1007/11555827\_8}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/ChaumRS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/RandellR05, author = {Brian Randell and Peter Y. A. Ryan}, editor = {Theodosis Dimitrakos and Fabio Martinelli and Peter Y. A. Ryan and Steve A. Schneider}, title = {Voting Technologies and Trust}, booktitle = {Formal Aspects in Security and Trust, Third International Workshop, {FAST} 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3866}, pages = {1--4}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11679219\_1}, doi = {10.1007/11679219\_1}, timestamp = {Sun, 02 Oct 2022 16:07:30 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/RandellR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/BryansKMR05, author = {Jeremy W. Bryans and Maciej Koutny and Laurent Mazar{\'{e}} and Peter Y. A. Ryan}, editor = {Theodosis Dimitrakos and Fabio Martinelli and Peter Y. A. Ryan and Steve A. Schneider}, title = {Opacity Generalised to Transition Systems}, booktitle = {Formal Aspects in Security and Trust, Third International Workshop, {FAST} 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3866}, pages = {81--95}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11679219\_7}, doi = {10.1007/11679219\_7}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/BryansKMR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/popl/Ryan05, author = {Peter Y. A. Ryan}, editor = {Catherine Meadows}, title = {A variant of the Chaum voter-verifiable scheme}, booktitle = {Proceedings of the {POPL} 2005 Workshop on Issues in the Theory of Security, {WITS} 2005, Long Beach, California, USA, January 10-11, 2005}, pages = {81--88}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1045405.1045414}, doi = {10.1145/1045405.1045414}, timestamp = {Tue, 19 Sep 2023 14:44:32 +0200}, biburl = {https://dblp.org/rec/conf/popl/Ryan05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/BellaR05, author = {Giampaolo Bella and Peter Y. A. Ryan}, editor = {Hisham Haddad and Lorie M. Liebrock and Andrea Omicini and Roger L. Wainwright}, title = {Special track on computer security}, booktitle = {Proceedings of the 2005 {ACM} Symposium on Applied Computing (SAC), Santa Fe, New Mexico, USA, March 13-17, 2005}, pages = {304--305}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1066677.1066751}, doi = {10.1145/1066677.1066751}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sac/BellaR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/Ryan04, author = {Peter Y. A. Ryan}, editor = {Ali E. Abdallah and Cliff B. Jones and Jeff W. Sanders}, title = {Shedding Light on Haunted Corners of Information Security}, booktitle = {Communicating Sequential Processes: The First 25 Years, Symposium on the Occasion of 25 Years of CSP, London, UK, July 7-8, 2004, Revised Invited Papers}, series = {Lecture Notes in Computer Science}, volume = {3525}, pages = {264--264}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11423348\_15}, doi = {10.1007/11423348\_15}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/birthday/Ryan04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/StroudWWR04, author = {Robert J. Stroud and Ian S. Welch and John P. Warne and Peter Y. A. Ryan}, title = {A Qualitative Analysis of the Intrusion-Tolerance Capabilities of the {MAFTIA} Architecture}, booktitle = {2004 International Conference on Dependable Systems and Networks {(DSN} 2004), 28 June - 1 July 2004, Florence, Italy, Proceedings}, pages = {453}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/DSN.2004.1311915}, doi = {10.1109/DSN.2004.1311915}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/StroudWWR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/formats/Ryan04, author = {Peter Y. A. Ryan}, editor = {Yassine Lakhnech and Sergio Yovine}, title = {Of Elections and Electrons}, booktitle = {Formal Techniques, Modelling and Analysis of Timed and Fault-Tolerant Systems, Joint International Conferences on Formal Modelling and Analysis of Timed Systems, {FORMATS} 2004 and Formal Techniques in Real-Time and Fault-Tolerant Systems, {FTRTFT} 2004, Grenoble, France, September 22-24, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3253}, pages = {3--4}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30206-3\_2}, doi = {10.1007/978-3-540-30206-3\_2}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/formats/Ryan04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/BryansKR04, author = {Jeremy W. Bryans and Maciej Koutny and Peter Y. A. Ryan}, editor = {Theodosis Dimitrakos and Fabio Martinelli}, title = {Modelling Dynamic Opacity Using Petri Nets with Silent Actions}, booktitle = {Formal Aspects in Security and Trust: Second {IFIP} {TC1} {WG1.7} Workshop on Formal Aspects in Security and Trust (FAST), an event of the 18th {IFIP} World Computer Congress, August 22-27, 2004, Toulouse, France}, series = {{IFIP}}, volume = {173}, pages = {159--172}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/0-387-24098-5\_12}, doi = {10.1007/0-387-24098-5\_12}, timestamp = {Thu, 14 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ifip1-7/BryansKR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/BellaR04, author = {Giampaolo Bella and Peter Y. A. Ryan}, editor = {Hisham Haddad and Andrea Omicini and Roger L. Wainwright and Lorie M. Liebrock}, title = {Editoral message: special track on computer security}, booktitle = {Proceedings of the 2004 {ACM} Symposium on Applied Computing (SAC), Nicosia, Cyprus, March 14-17, 2004}, pages = {373--374}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/967900.967982}, doi = {10.1145/967900.967982}, timestamp = {Wed, 15 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sac/BellaR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/BryansKR05, author = {Jeremy W. Bryans and Maciej Koutny and Peter Y. A. Ryan}, editor = {Nadia Busi and Roberto Gorrieri and Fabio Martinelli}, title = {Modelling Opacity Using Petri Nets}, booktitle = {Proceedings of the 2nd International Workshop on Security Issues with Petri Nets and other Computational Models, WISP@ICATPN 2004, Bologna, Italy, June 26, 2004}, series = {Electronic Notes in Theoretical Computer Science}, volume = {121}, pages = {101--115}, publisher = {Elsevier}, year = {2004}, url = {https://doi.org/10.1016/j.entcs.2004.10.010}, doi = {10.1016/J.ENTCS.2004.10.010}, timestamp = {Tue, 13 Dec 2022 11:53:41 +0100}, biburl = {https://dblp.org/rec/journals/entcs/BryansKR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2004, editor = {Pierangela Samarati and Peter Y. A. Ryan and Dieter Gollmann and Refik Molva}, title = {Computer Security - {ESORICS} 2004, 9th European Symposium on Research Computer Security, Sophia Antipolis, France, September 13-15, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3193}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/b100085}, doi = {10.1007/B100085}, isbn = {3-540-22987-6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/2004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/GongGRS03, author = {Li Gong and Joshua D. Guttman and Peter Y. A. Ryan and Steve A. Schneider}, title = {Guest editorial overview}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {21}, number = {1}, pages = {1--4}, year = {2003}, url = {https://doi.org/10.1109/JSAC.2002.806120}, doi = {10.1109/JSAC.2002.806120}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsac/GongGRS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Ryan03, author = {Peter Y. A. Ryan}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Enforcing the Unenforceable}, booktitle = {Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3364}, pages = {178--182}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/11542322\_22}, doi = {10.1007/11542322\_22}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Ryan03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fasec/2002, editor = {Ali E. Abdallah and Peter Y. A. Ryan and Steve A. Schneider}, title = {Formal Aspects of Security, First International Conference, FASec 2002, London, UK, December 16-18, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2629}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/b94774}, doi = {10.1007/B94774}, isbn = {3-540-20693-0}, timestamp = {Wed, 15 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fasec/2002.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/daglib/0009544, author = {Peter Y. A. Ryan and Steve A. Schneider}, title = {Modelling and analysis of security protocols}, publisher = {Addison-Wesley-Longman}, year = {2001}, isbn = {978-0-201-67471-2}, timestamp = {Fri, 25 Mar 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/daglib/0009544.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/RyanS01, author = {Peter Y. A. Ryan and Steve A. Schneider}, title = {Process Algebra and Non-Interference}, journal = {J. Comput. Secur.}, volume = {9}, number = {1/2}, pages = {75--103}, year = {2001}, url = {https://doi.org/10.3233/jcs-2001-91-204}, doi = {10.3233/JCS-2001-91-204}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/RyanS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/RyanMMG01, author = {Peter Y. A. Ryan and John D. McLean and Jonathan K. Millen and Virgil D. Gligor}, title = {Non-Interference: Who Needs It?}, booktitle = {14th {IEEE} Computer Security Foundations Workshop {(CSFW-14} 2001), 11-13 June 2001, Cape Breton, Nova Scotia, Canada}, pages = {237--238}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/CSFW.2001.930149}, doi = {10.1109/CSFW.2001.930149}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/RyanMMG01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fosad/Ryan00, author = {Peter Y. A. Ryan}, editor = {Riccardo Focardi and Roberto Gorrieri}, title = {Mathematical Models of Computer Security}, booktitle = {Foundations of Security Analysis and Design, Tutorial Lectures [revised versions of lectures given during the {IFIP} {WG} 1.7 International School on Foundations of Security Analysis and Design, {FOSAD} 2000, Bertinoro, Italy, September 2000]}, series = {Lecture Notes in Computer Science}, volume = {2171}, pages = {1--62}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-45608-2\_1}, doi = {10.1007/3-540-45608-2\_1}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fosad/Ryan00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Ryan00, author = {Peter Ryan}, editor = {Bruce Christianson and Bruno Crispo and Michael Roe}, title = {Open Questions (Transcript of Discussion)}, booktitle = {Security Protocols, 8th International Workshop, Cambridge, UK, April 3-5, 2000, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2133}, pages = {49--53}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44810-1\_8}, doi = {10.1007/3-540-44810-1\_8}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Ryan00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/Ryan00, author = {Peter Y. A. Ryan}, editor = {Ted Hurley and M{\'{\i}}che{\'{a}}l Mac an Airchinnigh and Michel P. Schellekens and Anthony Karel Seda}, title = {Process Algebra and Information Flow}, booktitle = {First Irish Conference on the Mathematical Foundations of Computer Science and Information Technology, {MFCSIT} 2000, Cork, Ireland, July 20-21, 2000}, series = {Electronic Notes in Theoretical Computer Science}, volume = {40}, pages = {360}, publisher = {Elsevier}, year = {2000}, url = {https://doi.org/10.1016/S1571-0661(05)80063-5}, doi = {10.1016/S1571-0661(05)80063-5}, timestamp = {Wed, 30 Nov 2022 10:58:03 +0100}, biburl = {https://dblp.org/rec/journals/entcs/Ryan00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wsaif/1999, editor = {Steve A. Schneider and Peter Ryan}, title = {Workshop on Secure Architectures and Information Flow 1999, Royal Holloway, London, UK, December 1-3, 1999}, series = {Electronic Notes in Theoretical Computer Science}, volume = {32}, publisher = {Elsevier}, year = {2000}, url = {https://www.sciencedirect.com/journal/electronic-notes-in-theoretical-computer-science/vol/32/suppl/C}, timestamp = {Wed, 30 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wsaif/1999.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/RyanS99, author = {Peter Y. A. Ryan and Steve A. Schneider}, title = {Process Algebra and Non-Interference}, booktitle = {Proceedings of the 12th {IEEE} Computer Security Foundations Workshop, {CSFW} 1999, Mordano, Italy, June 28-30, 1999}, pages = {214--227}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/CSFW.1999.779775}, doi = {10.1109/CSFW.1999.779775}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/RyanS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/SchneiderR00, author = {Steve A. Schneider and Peter Ryan}, editor = {Steve A. Schneider and Peter Ryan}, title = {Preface}, booktitle = {Workshop on Secure Architectures and Information Flow 1999, Royal Holloway, London, UK, December 1-3, 1999}, series = {Electronic Notes in Theoretical Computer Science}, volume = {32}, pages = {113--114}, publisher = {Elsevier}, year = {1999}, url = {https://doi.org/10.1016/S1571-0661(05)80565-1}, doi = {10.1016/S1571-0661(05)80565-1}, timestamp = {Wed, 30 Nov 2022 10:28:30 +0100}, biburl = {https://dblp.org/rec/journals/entcs/SchneiderR00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/RyanS98, author = {Peter Y. A. Ryan and Steve A. Schneider}, title = {An Attack on a Recursive Authentication Protocol. {A} Cautionary Tale}, journal = {Inf. Process. Lett.}, volume = {65}, number = {1}, pages = {7--10}, year = {1998}, url = {https://doi.org/10.1016/S0020-0190(97)00180-4}, doi = {10.1016/S0020-0190(97)00180-4}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ipl/RyanS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/RyanGGKM98, author = {Peter Y. A. Ryan and Dieter Gollmann and Li Gong and G{\"{u}}nter Karjoth and Chris J. Mitchell}, title = {Panel Introduction: The Security Impact of Distributed Computing Technologies}, booktitle = {Proceedings of the 11th {IEEE} Computer Security Foundations Workshop, Rockport, Massachusetts, USA, June 9-11, 1998}, pages = {164--166}, publisher = {{IEEE} Computer Society}, year = {1998}, url = {https://doi.org/10.1109/CSFW.1998.683166}, doi = {10.1109/CSFW.1998.683166}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/RyanGGKM98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/Ryan96, author = {Peter Ryan}, title = {A Genealogy of Non-Interference}, booktitle = {Ninth {IEEE} Computer Security Foundations Workshop, March 10 - 12, 1996, Dromquinna Manor, Kenmare, County Kerry, Ireland}, pages = {158}, publisher = {{IEEE} Computer Society}, year = {1996}, url = {https://doi.org/10.1109/CSFW.1996.503700}, doi = {10.1109/CSFW.1996.503700}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/Ryan96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.