


default search action
Myrto Arapinis
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j9]Kaushik Chakraborty, Mina Doosti
, Yao Ma
, Chirag Wadhwa
, Myrto Arapinis, Elham Kashefi:
Quantum Lock: A Provable Quantum Communication Advantage. Quantum 7: 1014 (2023) - [c21]Myrto Arapinis
, Ábel Kocsis
, Nikolaos Lamprou
, Liam Medley
, Thomas Zacharias
:
Universally Composable Simultaneous Broadcast against a Dishonest Majority and Applications. PODC 2023: 200-210 - [i12]Myrto Arapinis, Ábel Kocsis, Nikolaos Lamprou, Liam Medley, Thomas Zacharias:
Universally Composable Simultaneous Broadcast against a Dishonest Majority and Applications. CoRR abs/2305.06468 (2023) - 2021
- [j8]Myrto Arapinis, Mahshid Delavar, Mina Doosti
, Elham Kashefi:
Quantum Physical Unclonable Functions: Possibilities and Impossibilities. Quantum 5: 475 (2021) - [c20]Myrto Arapinis, Nikolaos Lamprou, Thomas Zacharias
:
Astrolabous: A Universally Composable Time-Lock Encryption Scheme. ASIACRYPT (2) 2021: 398-426 - [i11]Mina Doosti, Mahshid Delavar, Elham Kashefi, Myrto Arapinis:
A Unified Framework For Quantum Unforgeability. CoRR abs/2103.13994 (2021) - [i10]Yao Ma, Elham Kashefi, Myrto Arapinis, Kaushik Chakraborty, Marc Kaplan
:
QEnclave - A practical solution for secure quantum cloud computing. CoRR abs/2109.02952 (2021) - [i9]Kaushik Chakraborty, Mina Doosti
, Yao Ma, Myrto Arapinis, Elham Kashefi:
Hybrid PUF: A Novel Way to Enhance the Security of Classical PUFs. CoRR abs/2110.09469 (2021) - [i8]Myrto Arapinis, Nikolaos Lamprou, Thomas Zacharias:
Astrolabous: A Universally Composable Time-Lock Encryption Scheme. IACR Cryptol. ePrint Arch. 2021: 1246 (2021) - 2020
- [i7]Myrto Arapinis, Nikolaos Lamprou, Lenka Mareková, Thomas Zacharias:
E-cclesia: Universally Composable Self-Tallying Elections. IACR Cryptol. ePrint Arch. 2020: 513 (2020)
2010 – 2019
- 2019
- [c19]Myrto Arapinis, Andriana Gkaniatsou, Dimitris Karakostas, Aggelos Kiayias:
A Formal Treatment of Hardware Wallets. Financial Cryptography 2019: 426-445 - [i6]Myrto Arapinis, Mahshid Delavar, Mina Doosti, Elham Kashefi:
Quantum Physical Unclonable Functions: Possibilities and Impossibilities. CoRR abs/1910.02126 (2019) - [i5]Myrto Arapinis, Andriana Gkaniatsou, Dimitris Karakostas, Aggelos Kiayias:
A Formal Treatment of Hardware Wallets. IACR Cryptol. ePrint Arch. 2019: 34 (2019) - 2018
- [c18]Rajkarn Singh, George Theodorakopoulos, Mahesh K. Marina, Myrto Arapinis:
On Choosing Between Privacy Preservation Mechanisms for Mobile Trajectory Data Sharing. CNS 2018: 1-9 - [i4]Myrto Arapinis, Elham Kashefi, Nikolaos Lamprou, Anna Pappa
:
A Comprehensive Analysis of Quantum E-voting Protocols. CoRR abs/1810.05083 (2018) - 2017
- [j7]Myrto Arapinis, Loretta Ilaria Mancini, Eike Ritter, Mark Dermot Ryan
:
Analysis of privacy in mobile telephony systems. Int. J. Inf. Sec. 16(5): 491-523 (2017) - [j6]Myrto Arapinis, Jia Liu
, Eike Ritter, Mark Ryan
:
Stateful applied pi calculus: Observational equivalence and labelled bisimilarity. J. Log. Algebraic Methods Program. 89: 95-149 (2017) - [c17]Andriana Gkaniatsou, Myrto Arapinis, Aggelos Kiayias:
Low-Level Attacks in Bitcoin Wallets. ISC 2017: 233-253 - 2016
- [c16]Myrto Arapinis, Véronique Cortier, Steve Kremer
:
When Are Three Voters Enough for Privacy Properties? ESORICS (2) 2016: 241-260 - [c15]Myrto Arapinis, Diego Figueira, Marco Gaboardi
:
Sensitivity of Counting Queries. ICALP 2016: 120:1-120:13 - [i3]Myrto Arapinis, Véronique Cortier, Steve Kremer:
When Are Three Voters Enough for Privacy Properties? IACR Cryptol. ePrint Arch. 2016: 690 (2016) - 2015
- [c14]Myrto Arapinis, Vincent Cheval
, Stéphanie Delaune:
Composing Security Protocols: From Confidentiality to Privacy. POST 2015: 324-343 - 2014
- [j5]Myrto Arapinis, Stéphanie Delaune, Steve Kremer
:
Dynamic Tags for Security Protocols. Log. Methods Comput. Sci. 10(2) (2014) - [j4]Myrto Arapinis, Marie Duflot:
Bounding messages for free in security protocols - extension to various security properties. Inf. Comput. 239: 182-215 (2014) - [j3]Myrto Arapinis, Joshua Phillips, Eike Ritter, Mark Dermot Ryan
:
StatVerif: Verification of stateful processes. J. Comput. Secur. 22(5): 743-821 (2014) - [c13]Myrto Arapinis, Loretta Ilaria Mancini, Eike Ritter, Mark Ryan:
Privacy through Pseudonymity in Mobile Telephony Systems. NDSS 2014 - [c12]Myrto Arapinis, Jia Liu
, Eike Ritter, Mark Ryan
:
Stateful Applied Pi Calculus. POST 2014: 22-41 - [i2]Myrto Arapinis, Vincent Cheval, Stéphanie Delaune:
Composing security protocols: from confidentiality to privacy. CoRR abs/1407.5444 (2014) - 2013
- [j2]Myrto Arapinis, Sergiu Bursuc, Mark Ryan
:
Privacy-supporting cloud computing by in-browser key translation. J. Comput. Secur. 21(6): 847-880 (2013) - [c11]Myrto Arapinis, Véronique Cortier, Steve Kremer
, Mark Ryan
:
Practical Everlasting Privacy. POST 2013: 21-40 - 2012
- [c10]Myrto Arapinis, Loretta Ilaria Mancini, Eike Ritter, Mark Ryan
, Nico Golde, Kevin Redon, Ravishankar Borgaonkar:
New privacy issues in mobile telephony: fix and verification. CCS 2012: 205-216 - [c9]Myrto Arapinis, Vincent Cheval
, Stéphanie Delaune:
Verifying Privacy-Type Properties in a Modular Way. CSF 2012: 95-109 - [c8]Myrto Arapinis, Sergiu Bursuc, Mark Ryan
:
Privacy Supporting Cloud Computing: ConfiChair, a Case Study. POST 2012: 89-108 - [c7]Myrto Arapinis, Sergiu Bursuc, Mark Dermot Ryan
:
Reduction of Equational Theories for Verification of Trace Equivalence: Re-encryption, Associativity and Commutativity. POST 2012: 169-188 - 2011
- [c6]Myrto Arapinis, Eike Ritter, Mark Dermot Ryan
:
StatVerif: Verification of Stateful Processes. CSF 2011: 33-47 - [i1]Myrto Arapinis, Loretta Ilaria Mancini, Eike Ritter, Mark Ryan:
Formal Analysis of UMTS Privacy. CoRR abs/1109.2066 (2011) - 2010
- [c5]Myrto Arapinis, Tom Chothia, Eike Ritter, Mark Ryan
:
Analysing Unlinkability and Anonymity Using the Applied Pi Calculus. CSF 2010: 107-121
2000 – 2009
- 2009
- [j1]Myrto Arapinis, Muffy Calder, Louise A. Dennis, Michael Fisher, Philip D. Gray, Savas Konur, Alice Miller, Eike Ritter, Mark Ryan, Sven Schewe, Chris Unsworth, Rehana Yasmin
:
Towards the Verification of Pervasive Systems. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 22 (2009) - [c4]Myrto Arapinis, Tom Chothia, Eike Ritter, Mark Ryan
:
Untraceability in the applied pi-calculus. ICITST 2009: 1-6 - 2008
- [c3]Myrto Arapinis, Stéphanie Delaune, Steve Kremer
:
From One Session to Many: Dynamic Tags for Security Protocols. LPAR 2008: 128-142 - 2007
- [c2]Myrto Arapinis, Marie Duflot
:
Bounding Messages for Free in Security Protocols. FSTTCS 2007: 376-387 - 2003
- [c1]Myrto Arapinis, Frédéric Loulergue, Frédéric Gava, Frédéric Dabrowski:
Semantics of Minimally Synchronous Parallel ML. SNPD 2003: 260-267
Coauthor Index
aka: Mark Dermot Ryan

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-04 22:27 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint