default search action
Peter Y. A. Ryan
Person information
- affiliation: University of Luxembourg
Other persons with the same name
- Peter Ryan — disambiguation page
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c122]Afonso Arriaga, Peter Y. A. Ryan, Marjan Skrobot:
SweetPAKE: Key exchange with decoy passwords. AsiaCCS 2024 - [c121]Georgios Fotiadis, Johann Großschädl, Peter Y. A. Ryan:
X2065: Lightweight Key Exchange for the Internet of Things. CPSS@AsiaCCS 2024: 43-52 - [c120]Hao Cheng, Georgios Fotiadis, Johann Großschädl, Daniel Page, Thinh Hung Pham, Peter Y. A. Ryan:
RISC-V Instruction Set Extensions for Multi-Precision Integer Arithmetic: A Case Study on Post-Quantum Key Exchange Using CSIDH-512. DAC 2024: 329:1-329:6 - [c119]Rafieh Mosaheb, Peter B. Rønne, Peter Y. A. Ryan, Sara Sarfaraz:
Direct and Transparent Voter Verification with Everlasting Receipt-Freeness. E-Vote-ID 2024: 124-140 - [c118]Marie-Laure Zollinger, Peter B. Rønne, Steve Schneider, Peter Y. A. Ryan, Wojciech Jamroga:
Intelligo Ut Confido: Understanding, Trust and User Experience in Verifiable Receipt-Free E-Voting. E-Vote-ID 2024: 158-174 - [c117]Wojciech Jamroga, Peter B. Roenne, Yan Kim, Peter Y. A. Ryan:
"You Shall Not Abstain!" A Formal Study of Forced Participation. FC Workshops 2024: 66-81 - [c116]Mónica P. Arenas, Gabriele Lenzini, Mohammadamin Rakeei, Peter Y. A. Ryan, Marjan Skrobot, Maria Zhekova:
Verifying Artifact Authenticity with Unclonable Optical Tags. SECRYPT 2024: 64-77 - [i44]Marie-Laure Zollinger, Peter B. Rønne, Steve Schneider, Peter Y. A. Ryan, Wojtek Jamroga:
Intelligo ut Confido: Understanding, Trust and User Experience in Verifiable Receipt-Free E-Voting (long version). CoRR abs/2407.13240 (2024) - [i43]Afonso Arriaga, Peter Y. A. Ryan, Marjan Skrobot:
SweetPAKE: Key exchange with decoy passwords. IACR Cryptol. ePrint Arch. 2024: 307 (2024) - [i42]Aditya Damodaran, Simon Rastikian, Peter B. Rønne, Peter Y. A. Ryan:
Hyperion: Transparent End-to-End Verifiable Voting with Coercion Mitigation. IACR Cryptol. ePrint Arch. 2024: 1182 (2024) - 2023
- [j27]Budi Arief, Lena Yuryna Connolly, Julio C. Hernandez-Castro, Allan Liska, Peter Y. A. Ryan:
Introduction to the Special Issue on Ransomware. DTRAP 4(4): 51:1-51:3 (2023) - [j26]Constantin Catalin Dragan, François Dupressoir, Ehsan Estaji, Kristian Gjøsteen, Thomas Haines, Peter Y. A. Ryan, Peter B. Rønne, Morten Rotvold Solberg:
Machine-checked proofs of privacy against malicious boards for Selene & Co. J. Comput. Secur. 31(5): 469-499 (2023) - [c115]Fatima-Ezzahra El Orche, Marcel Hollenstein, Sarah Houdaigoui, David Naccache, Daria Pchelina, Peter B. Rønne, Peter Y. A. Ryan, Julien Weibel, Robert Weil:
Taphonomical Security: DNA Information with a Foreseeable Lifespan. FICC (2) 2023: 674-694 - [c114]Hao Cheng, Georgios Fotiadis, Johann Großschädl, Peter Y. A. Ryan:
IoTDisco: Strong yet Lightweight End-to-End Security for the Internet of Constrained Things. MSPN 2023: 1-16 - [e19]Melanie Volkamer, David Duenas-Cid, Peter B. Rønne, Peter Y. A. Ryan, Jurlind Budurushi, Oksana Kulyk, Adrià Rodríguez-Pérez, Iuliia Spycher-Krivonosova:
Electronic Voting: 8th International Joint Conference, E-Vote-ID 2023, Luxembourg City, Luxembourg, October 3-6, 2023, Proceedings. Lecture Notes in Computer Science 14230, Springer 2023, ISBN 978-3-031-43755-7 [contents] - [i41]Wojciech Jamroga, Peter Y. A. Ryan, Steve Schneider, Carsten Schürmann, Philip B. Stark:
A Declaration of Software Independence. CoRR abs/2311.03372 (2023) - 2022
- [j25]Isa Sertkaya, Peter B. Rønne, Peter Y. A. Ryan:
Estonian Internet voting with anonymous credentials. Turkish J. Electr. Eng. Comput. Sci. 30(2): 420-435 (2022) - [j24]Hao Cheng, Georgios Fotiadis, Johann Großschädl, Peter Y. A. Ryan:
Highly Vectorized SIKE for AVX-512. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(2): 41-68 (2022) - [c113]Constantin Catalin Dragan, François Dupressoir, Ehsan Estaji, Kristian Gjøsteen, Thomas Haines, Peter Y. A. Ryan, Peter B. Rønne, Morten Rotvold Solberg:
Machine-Checked Proofs of Privacy Against Malicious Boards for Selene & Co. CSF 2022: 335-347 - [c112]Fatima-Ezzahra El Orche, Rémi Géraud-Stewart, Peter B. Rønne, Gergei Bana, David Naccache, Peter Y. A. Ryan, Marco Biroli, Megi Dervishi, Hugo Waltsburger:
Time, Privacy, Robustness, Accuracy: Trade-Offs for the Open Vote Network Protocol. E-Vote-ID 2022: 19-35 - [e18]Peter Y. A. Ryan, Cristian Toma:
Innovative Security Solutions for Information Technology and Communications - 14th International Conference, SecITC 2021, Virtual Event, November 25-26, 2021, Revised Selected Papers. Lecture Notes in Computer Science 13195, Springer 2022, ISBN 978-3-031-17509-1 [contents] - [i40]Wojciech Jamroga, Peter Y. A. Ryan, Yan Kim:
Verification of the Socio-Technical Aspects of Voting: The Case of the Polish Postal Vote 2020. CoRR abs/2210.10694 (2022) - [i39]Constantin Catalin Dragan, François Dupressoir, Ehsan Estaji, Kristian Gjøsteen, Thomas Haines, Peter Y. A. Ryan, Peter B. Rønne, Morten Rotvold Solberg:
Machine-Checked Proofs of Privacy Against Malicious Boards for Selene & Co. IACR Cryptol. ePrint Arch. 2022: 1182 (2022) - 2021
- [j23]Ellis Fenske, Dane Brown, Jeremy Martin, Travis Mayberry, Peter Ryan, Erik C. Rye:
Three Years Later: A Study of MAC Address Randomization In Mobile Devices And When It Succeeds. Proc. Priv. Enhancing Technol. 2021(3): 164-181 (2021) - [j22]Hao Cheng, Georgios Fotiadis, Johann Großschädl, Peter Y. A. Ryan, Peter B. Rønne:
Batching CSIDH Group Actions using AVX-512. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(4): 618-649 (2021) - [j21]Karola Marky, Marie-Laure Zollinger, Peter B. Roenne, Peter Y. A. Ryan, Tim Grube, Kai Kunze:
Investigating Usability and User Experience of Individually Verifiable Internet Voting Schemes. ACM Trans. Comput. Hum. Interact. 28(5): 30:1-30:36 (2021) - [c111]Geoffroy Couteau, A. W. Roscoe, Peter Y. A. Ryan:
Partially-Fair Computation from Timed-Release Encryption and Oblivious Transfer. ACISP 2021: 330-349 - [c110]Wojciech Jamroga, Peter Y. A. Ryan, Steve Schneider, Carsten Schürmann, Philip B. Stark:
A Declaration of Software Independence. Protocols, Strands, and Logic 2021: 198-217 - [c109]Hao Cheng, Johann Großschädl, Peter B. Rønne, Peter Y. A. Ryan:
AVRNTRU: Lightweight NTRU-based Post-Quantum Cryptography for 8-bit AVR Microcontrollers. DATE 2021: 1272-1277 - [c108]Peter Y. A. Ryan, Peter B. Roenne, Dimiter Ostrev, Fatima-Ezzahra El Orche, Najmeh Soroush, Philip B. Stark:
Who Was that Masked Voter? The Tally Won't Tell! E-VOTE-ID 2021: 106-123 - [c107]Marie-Laure Zollinger, Ehsan Estaji, Peter Y. A. Ryan, Karola Marky:
"Just for the Sake of Transparency": Exploring Voter Mental Models of Verifiability. E-VOTE-ID 2021: 155-170 - [c106]Peter B. Rønne, Peter Y. A. Ryan, Ben Smyth:
Cast-as-Intended: A Formal Definition and Case Studies. Financial Cryptography Workshops 2021: 251-262 - [c105]Georgios Fotiadis, José Moreira, Thanassis Giannetsos, Liqun Chen, Peter B. Rønne, Mark Ryan, Peter Y. A. Ryan:
Root-of-Trust Abstractions for Symbolic Analysis: Application to Attestation Protocols. STM 2021: 163-184 - [i38]Gergei Bana, Wojciech Jamroga, David Naccache, Peter Y. A. Ryan:
Convergence Voting: From Pairwise Comparisons to Consensus. CoRR abs/2102.01995 (2021) - [i37]Peter B. Rønne, Peter Y. A. Ryan, Marie-Laure Zollinger:
Electryo, In-person Voting with Transparent Voter Verifiability and Eligibility Verifiability. CoRR abs/2105.14783 (2021) - [i36]Marie-Laure Zollinger, Verena Distler, Peter B. Rønne, Peter Y. A. Ryan, Carine Lallemand, Vincent Koenig:
User Experience Design for E-Voting: How mental models align with security mechanisms. CoRR abs/2105.14901 (2021) - [i35]Itzel Vázquez Sandoval, Arash Atashpendar, Gabriele Lenzini, Peter Y. A. Ryan:
PakeMail: authentication and key management in decentralized secure email and messaging via PAKE. CoRR abs/2107.06090 (2021) - [i34]Michel Abdalla, Manuel Barbosa, Peter B. Rønne, Peter Y. A. Ryan, Petra Sala:
Security Characterization of J-PAKE and its Variants. IACR Cryptol. ePrint Arch. 2021: 824 (2021) - [i33]Gergei Bana, Marco Biroli, Megi Dervishi, Fatima-Ezzahra El Orche, Rémi Géraud-Stewart, David Naccache, Peter B. Rønne, Peter Y. A. Ryan, Hugo Waltsburger:
Time, Privacy, Robustness, Accuracy: Trade Offs for the Open Vote Network Protocol. IACR Cryptol. ePrint Arch. 2021: 1065 (2021) - [i32]Fatima-Ezzahra El Orche, Marcel Hollenstein, Sarah Houdaigoui, David Naccache, Daria Pchelina, Peter B. Rønne, Peter Y. A. Ryan, Julien Weibel, Robert Weil:
Taphonomical Security: (DNA) Information with Foreseeable Lifespan. IACR Cryptol. ePrint Arch. 2021: 1066 (2021) - [i31]Marcel Hollenstein, David Naccache, Peter B. Rønne, Peter Y. A. Ryan, Robert Weil, Ofer Yifrach-Stav:
Preservation of DNA Privacy During the Large Scale Detection of COVID. IACR Cryptol. ePrint Arch. 2021: 1108 (2021) - 2020
- [c104]Hao Cheng, Johann Großschädl, Peter B. Rønne, Peter Y. A. Ryan:
Lightweight Post-quantum Key Encapsulation for 8-bit AVR Microcontrollers. CARDIS 2020: 18-33 - [c103]Vincenzo Iovino, Alfredo Rial, Peter B. Rønne, Peter Y. A. Ryan:
Universal Unconditional Verifiability in E-Voting without Trusted Parties. CSF 2020: 33-48 - [c102]Ehsan Estaji, Thomas Haines, Kristian Gjøsteen, Peter B. Rønne, Peter Y. A. Ryan, Najmeh Soroush:
Revisiting Practical and Usable Coercion-Resistant Remote E-Voting. E-VOTE-ID 2020: 50-66 - [c101]Wojciech Jamroga, Yan Kim, Damian Kurpiewski, Peter Y. A. Ryan:
Towards Model Checking of Voting Protocols in Uppaal. E-VOTE-ID 2020: 129-146 - [c100]Marie-Laure Zollinger, Peter B. Rønne, Peter Y. A. Ryan:
Short Paper: Mechanized Proofs of Verifiability and Privacy in a Paper-Based E-Voting Scheme. Financial Cryptography Workshops 2020: 310-318 - [c99]Itzel Vázquez Sandoval, Arash Atashpendar, Gabriele Lenzini, Peter Y. A. Ryan:
PakeMail: Authentication and Key Management in Decentralized Secure Email and Messaging via PAKE. ICETE (Selected Papers) 2020: 102-128 - [c98]Najmeh Soroush, Vincenzo Iovino, Alfredo Rial, Peter B. Rønne, Peter Y. A. Ryan:
Verifiable Inner Product Encryption Scheme. Public Key Cryptography (1) 2020: 65-94 - [c97]Hao Cheng, Johann Großschädl, Jiaqi Tian, Peter B. Rønne, Peter Y. A. Ryan:
High-Throughput Elliptic Curve Cryptography Using AVX2 Vector Instructions. SAC 2020: 698-719 - [i30]Marcel Hollenstein, David Naccache, Peter B. Rønne, Peter Y. A. Ryan, Robert Weil, Ofer Yifrach-Stav:
Preservation of DNA Privacy During the Large Scale Detection of COVID-19. CoRR abs/2007.09085 (2020) - [i29]Wojciech Jamroga, Yan Kim, Damian Kurpiewski, Peter Y. A. Ryan:
Model Checkers Are Cool: How to Model Check Voting Protocols in Uppaal. CoRR abs/2007.12412 (2020) - [i28]Wojciech Jamroga, David Mestel, Peter B. Rønne, Peter Y. A. Ryan, Marjan Skrobot:
A Survey of Requirements for COVID-19 Mitigation Strategies. Part I: Newspaper Clips. CoRR abs/2011.07887 (2020) - [i27]Najmeh Soroush, Vincenzo Iovino, Alfredo Rial, Peter B. Rønne, Peter Y. A. Ryan:
Verifiable Inner Product Encryption Scheme. IACR Cryptol. ePrint Arch. 2020: 122 (2020) - [i26]Jintai Ding, Doug Emery, Johannes Müller, Peter Y. A. Ryan, Vonn Kee Wong:
Post-Quantum Anonymous Veto Networks. IACR Cryptol. ePrint Arch. 2020: 1023 (2020)
2010 – 2019
- 2019
- [c96]Verena Distler, Marie-Laure Zollinger, Carine Lallemand, Peter B. Rønne, Peter Y. A. Ryan, Vincent Koenig:
Security - Visible, Yet Unseen? CHI 2019: 605 - [c95]Ziya Alper Genç, Gabriele Lenzini, Peter Y. A. Ryan:
NoCry: No More Secure Encryption Keys for Cryptographic Ransomware. ETAA@ESORICS 2019: 69-85 - [c94]Karola Marky, Marie-Laure Zollinger, Markus Funk, Peter Y. A. Ryan, Max Mühlhäuser:
How to Assess the Usability Metrics of E-Voting Schemes. Financial Cryptography Workshops 2019: 257-271 - [c93]Jun Wang, Qiang Tang, Afonso Arriaga, Peter Y. A. Ryan:
Novel Collaborative Filtering Recommender Friendly to Privacy Protection. IJCAI 2019: 4809-4815 - [c92]José Becerra, Peter Y. A. Ryan, Petra Sala, Marjan Skrobot:
An Offline Dictionary Attack Against zkPAKE Protocol. SEC 2019: 81-90 - [c91]Marc Beunardeau, Fatima-Ezzahra El Orche, Diana Maimut, David Naccache, Peter B. Rønne, Peter Y. A. Ryan:
Authenticated Key Distribution: When the Coupon Collector is Your Enemy. SECITC 2019: 1-20 - [c90]Wojciech Jamroga, Peter B. Rønne, Peter Y. A. Ryan, Philip B. Stark:
Risk-Limiting Tallies. E-VOTE-ID 2019: 183-199 - [c89]Hao Cheng, Daniel Dinu, Johann Großschädl, Peter B. Rønne, Peter Y. A. Ryan:
A Lightweight Implementation of NTRU Prime for the Post-quantum Internet of Things. WISTP 2019: 103-119 - [e17]Kazue Sako, Steve A. Schneider, Peter Y. A. Ryan:
Computer Security - ESORICS 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part I. Lecture Notes in Computer Science 11735, Springer 2019, ISBN 978-3-030-29958-3 [contents] - [e16]Kazue Sako, Steve A. Schneider, Peter Y. A. Ryan:
Computer Security - ESORICS 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part II. Lecture Notes in Computer Science 11736, Springer 2019, ISBN 978-3-030-29961-3 [contents] - [i25]Peter B. Rønne, Arash Atashpendar, Kristian Gjøsteen, Peter Y. A. Ryan:
Coercion-Resistant Voting in Linear Time via Fully Homomorphic Encryption: Towards a Quantum-Safe Scheme. CoRR abs/1901.02560 (2019) - [i24]Brian Thompson, Dave Cedel, Jeremy Martin, Peter Y. A. Ryan, Sarah Kern:
Fusion of Mobile Device Signal Data Attributes Enables Multi-Protocol Entity Resolution and Enhanced Large-Scale Tracking. CoRR abs/1906.02686 (2019) - [i23]Wojciech Jamroga, Peter B. Rønne, Peter Y. A. Ryan, Philip B. Stark:
Risk-Limiting Tallies. CoRR abs/1908.04947 (2019) - [i22]Geoffroy Couteau, Bill Roscoe, Peter Y. A. Ryan:
Partially-Fair Computation from Timed-Release Encryption and Oblivious Transfer. IACR Cryptol. ePrint Arch. 2019: 1281 (2019) - [i21]Marc Beunardeau, Fatima-Ezzahra El Orche, Diana Maimut, David Naccache, Peter B. Rønne, Peter Y. A. Ryan:
Authenticated Key Distribution: When the Coupon Collector is Your Enemy. IACR Cryptol. ePrint Arch. 2019: 1499 (2019) - 2018
- [c88]Jun Wang, Afonso Arriaga, Qiang Tang, Peter Y. A. Ryan:
Facilitating Privacy-preserving Recommendation-as-a-Service with Machine Learning. CCS 2018: 2306-2308 - [c87]Ziya Alper Genç, Gabriele Lenzini, Peter Y. A. Ryan:
Security Analysis of Key Acquiring Strategies Used by Cryptographic Ransomware. CECC 2018: 7:1-7:6 - [c86]Ziya Alper Genç, Gabriele Lenzini, Peter Y. A. Ryan:
No Random, No Ransom: A Key to Stop Cryptographic Ransomware. DIMVA 2018: 234-255 - [c85]Ziya Alper Genç, Gabriele Lenzini, Peter Y. A. Ryan, Itzel Vázquez Sandoval:
A Security Analysis, and a Fix, of a Code-Corrupted Honeywords System. ICISSP 2018: 83-95 - [c84]Ziya Alper Genç, Gabriele Lenzini, Peter Y. A. Ryan, Itzel Vázquez Sandoval:
A Critical Security Analysis of the Password-Based Authentication Honeywords System Under Code-Corruption Attack. ICISSP (Revised Selected Papers) 2018: 125-151 - [c83]Arash Atashpendar, Guru-Vamsi Policharla, Peter B. Rønne, Peter Y. A. Ryan:
Revisiting Deniability in Quantum Key Exchange - via Covert Communication and Entanglement Distillation. NordSec 2018: 104-120 - [c82]Ziya Alper Genç, Gabriele Lenzini, Peter Y. A. Ryan:
Next Generation Cryptographic Ransomware. NordSec 2018: 385-401 - [c81]José Becerra, Peter B. Rønne, Peter Y. A. Ryan, Petra Sala:
HoneyPAKEs. Security Protocols Workshop 2018: 63-77 - [c80]Peter Y. A. Ryan:
HoneyPAKEs (Transcript of Discussion). Security Protocols Workshop 2018: 78-83 - [c79]José Becerra, Peter Y. A. Ryan, Petra Sala, Marjan Skrobot:
An Offline Dictionary Attack against zkPAKE Protocol. WISEC 2018: 291-292 - [i20]Arash Atashpendar, Marc Beunardeau, Aisling Connolly, Rémi Géraud, David Mestel, A. W. Roscoe, Peter Y. A. Ryan:
From Clustering Supersequences to Entropy Minimizing Subsequences for Single and Double Deletions. CoRR abs/1802.00703 (2018) - [i19]Jun Wang, Afonso Arriaga, Qiang Tang, Peter Y. A. Ryan:
CryptoRec: Secure Recommendations as a Service. CoRR abs/1802.02432 (2018) - [i18]Arash Atashpendar, David Mestel, A. W. Roscoe, Peter Y. A. Ryan:
A Proof of Entropy Minimization for Outputs in Deletion Channels via Hidden Word Statistics. CoRR abs/1807.11609 (2018) - [i17]Arash Atashpendar, Guru-Vamsi Policharla, Peter B. Rønne, Peter Y. A. Ryan:
Revisiting Deniability in Quantum Key Exchange via Covert Communication and Entanglement Distillation. CoRR abs/1812.02245 (2018) - 2017
- [j20]Giampaolo Bella, Rosario Giustolisi, Gabriele Lenzini, Peter Y. A. Ryan:
Trustworthy exams without trusted parties. Comput. Secur. 67: 291-307 (2017) - [j19]Josh Benaloh, Peter Y. A. Ryan, Steve A. Schneider, Vanessa Teague:
A Vote of Confidence? IEEE Secur. Priv. 15(3): 12-13 (2017) - [c78]Peter Y. A. Ryan:
A Brief History of Security Protocols. Concurrency, Security, and Puzzles 2017: 223-245 - [c77]Ziya Alper Genç, Gabriele Lenzini, Peter Y. A. Ryan:
Cipher, the Random and the Ransom: A Survey on Current and Future Ransomware. CECC 2017: 89-102 - [c76]Vincenzo Iovino, Alfredo Rial, Peter B. Rønne, Peter Y. A. Ryan:
Using Selene to Verify Your Vote in JCJ. Financial Cryptography Workshops 2017: 385-403 - [c75]Peter Y. A. Ryan:
Securing the Foundations of Democracy. SECITC 2017: 52-66 - [c74]A. W. Roscoe, Peter Y. A. Ryan:
Auditable PAKEs: Approaching Fair Exchange Without a TTP. Security Protocols Workshop 2017: 278-297 - [c73]Peter Y. A. Ryan:
Auditable PAKEs: Approaching Fair Exchange Without a TTP (Transcript of Discussion). Security Protocols Workshop 2017: 298-305 - [c72]Matthew Bernhard, Josh Benaloh, J. Alex Halderman, Ronald L. Rivest, Peter Y. A. Ryan, Philip B. Stark, Vanessa Teague, Poorvi L. Vora, Dan S. Wallach:
Public Evidence from Secret Ballots. E-VOTE-ID 2017: 84-109 - [c71]Gabriele Lenzini, Samir Ouchani, Peter B. Rønne, Peter Y. A. Ryan, Yong Geng, Jan Lagerwall, JungHyun Noh:
Security in the shell: An optical physical unclonable function made of shells of cholesteric liquid crystals. WIFS 2017: 1-6 - [e15]Michael Brenner, Kurt Rohloff, Joseph Bonneau, Andrew Miller, Peter Y. A. Ryan, Vanessa Teague, Andrea Bracciali, Massimiliano Sala, Federico Pintore, Markus Jakobsson:
Financial Cryptography and Data Security - FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Papers. Lecture Notes in Computer Science 10323, Springer 2017, ISBN 978-3-319-70277-3 [contents] - [e14]Robert Krimmer, Melanie Volkamer, Jordi Barrat, Josh Benaloh, Nicole J. Goodman, Peter Y. A. Ryan, Vanessa Teague:
Electronic Voting - First International Joint Conference, E-Vote-ID 2016, Bregenz, Austria, October 18-21, 2016, Proceedings. Lecture Notes in Computer Science 10141, Springer 2017, ISBN 978-3-319-52239-5 [contents] - [i16]Josh Benaloh, Matthew Bernhard, J. Alex Halderman, Ronald L. Rivest, Peter Y. A. Ryan, Philip B. Stark, Vanessa Teague, Poorvi L. Vora, Dan S. Wallach:
Public Evidence from Secret Ballots. CoRR abs/1707.08619 (2017) - 2016
- [c70]Peter Y. A. Ryan:
Crypto Santa. The New Codebreakers 2016: 543-549 - [c69]Masoud Tabatabaei, Wojciech Jamroga, Peter Y. A. Ryan:
Expressing Receipt-Freeness and Coercion-Resistance in Logics of Strategic Ability: Preliminary Attempt. PrAISe@ECAI 2016: 1:1-1:8 - [c68]Peter Y. A. Ryan, Peter B. Rønne, Vincenzo Iovino:
Selene: Voting with Transparent Verifiability and Coercion-Mitigation. Financial Cryptography Workshops 2016: 176-192 - [e13]Peter Y. A. Ryan, David Naccache, Jean-Jacques Quisquater:
The New Codebreakers - Essays Dedicated to David Kahn on the Occasion of His 85th Birthday. Lecture Notes in Computer Science 9100, Springer 2016, ISBN 978-3-662-49300-7 [contents] - [e12]Jeremy Clark, Sarah Meiklejohn, Peter Y. A. Ryan, Dan S. Wallach, Michael Brenner, Kurt Rohloff:
Financial Cryptography and Data Security - FC 2016 International Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February 26, 2016, Revised Selected Papers. Lecture Notes in Computer Science 9604, Springer 2016, ISBN 978-3-662-53356-7 [contents] - [i15]Gina Gallegos-García, Vincenzo Iovino, Alfredo Rial, Peter B. Rønne, Peter Y. A. Ryan:
(Universal) Unconditional Verifiability in E-Voting without Trusted Parties. CoRR abs/1610.06343 (2016) - [i14]Gina Gallegos-García, Vincenzo Iovino, Alfredo Rial, Peter B. Rønne, Peter Y. A. Ryan:
(Universal) Unconditional Verifiability in E-Voting without Trusted Parties. IACR Cryptol. ePrint Arch. 2016: 975 (2016) - 2015
- [j18]Bart Preneel, Phillip Rogaway, Mark Dermot Ryan, Peter Y. A. Ryan:
Privacy and Security in an Age of Surveillance (Dagstuhl Perspectives Workshop 14401). Dagstuhl Manifestos 5(1): 25-37 (2015) - [j17]Peter Y. A. Ryan, Steve A. Schneider, Vanessa Teague:
End-to-End Verifiability in Voting Systems, from Theory to Practice. IEEE Secur. Priv. 13(3): 59-62 (2015) - [j16]Chris Culnane, Peter Y. A. Ryan, Steve A. Schneider, Vanessa Teague:
vVote: A Verifiable Voting System. ACM Trans. Inf. Syst. Secur. 18(1): 3:1-3:30 (2015) - [c67]Giampaolo Bella, Rosario Giustolisi, Gabriele Lenzini, Peter Y. A. Ryan:
A Secure Exam Protocol Without Trusted Parties. SEC 2015: 495-509 - [c66]Arash Atashpendar, A. W. Roscoe, Peter Y. A. Ryan:
Information Leakage Due to Revealing Randomly Selected Bits. Security Protocols Workshop 2015: 325-341 - [e11]Günther Pernul, Peter Y. A. Ryan, Edgar R. Weippl:
Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I. Lecture Notes in Computer Science 9326, Springer 2015, ISBN 978-3-319-24173-9 [contents] - [e10]Günther Pernul, Peter Y. A. Ryan, Edgar R. Weippl:
Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part II. Lecture Notes in Computer Science 9327, Springer 2015, ISBN 978-3-319-24176-0 [contents] - [i13]Josh Benaloh, Ronald L. Rivest, Peter Y. A. Ryan, Philip B. Stark, Vanessa Teague, Poorvi L. Vora:
End-to-end verifiability. CoRR abs/1504.03778 (2015) - [i12]Peter Y. A. Ryan, Peter B. Rønne, Vincenzo Iovino:
Selene: Voting with Transparent Verifiability and Coercion-Mitigation. IACR Cryptol. ePrint Arch. 2015: 1105 (2015) - 2014
- [c65]Afonso Arriaga, Qiang Tang, Peter Y. A. Ryan:
Trapdoor Privacy in Asymmetric Searchable Encryption Schemes. AFRICACRYPT 2014: 31-50 - [c64]Jannik Dreier, Rosario Giustolisi, Ali Kassem, Pascal Lafourcade, Gabriele Lenzini, Peter Y. A. Ryan:
Formal Security Analysis of Traditional and Electronic Exams. ICETE (Selected Papers) 2014: 294-318 - [c63]Jannik Dreier, Rosario Giustolisi, Ali Kassem, Pascal Lafourcade, Gabriele Lenzini, Peter Y. A. Ryan:
Formal Analysis of Electronic Exams. SECRYPT 2014: 101-112 - [c62]Rosario Giustolisi, Gabriele Lenzini, Peter Y. A. Ryan:
Remark!: A Secure Protocol for Remote Exams. Security Protocols Workshop 2014: 38-48 - [c61]Chris Culnane, James Heather, Rui Joaquim, Peter Y. A. Ryan, Steve A. Schneider, Vanessa Teague:
Faster Print on Demand for Prêt à Voter. EVT/WOTE 2014 - [i11]Chris Culnane, Peter Y. A. Ryan, Steve A. Schneider, Vanessa Teague:
vVote: a Verifiable Voting System (DRAFT). CoRR abs/1404.6822 (2014) - [i10]Bart Preneel, Phillip Rogaway, Mark Dermot Ryan, Peter Y. A. Ryan:
Privacy and Security in an Age of Surveillance (Dagstuhl Perspectives Workshop 14401). Dagstuhl Reports 4(9): 106-123 (2014) - [i9]Dhananjay S. Phatak, Qiang Tang, Alan T. Sherman, Warren D. Smith, Peter Y. A. Ryan, Konstantinos Kalpakis:
DoubleMod and SingleMod: Simple Randomized Secret-Key Encryption with Bounded Homomorphicity. IACR Cryptol. ePrint Arch. 2014: 670 (2014) - 2013
- [j15]Marc Pouly, Jürg Kohlas, Peter Y. A. Ryan:
Generalized information theory for hints. Int. J. Approx. Reason. 54(1): 228-251 (2013) - [c60]Gurchetan S. Grewal, Mark Dermot Ryan, Sergiu Bursuc, Peter Y. A. Ryan:
Caveat Coercitor: Coercion-Evidence in Electronic Voting. IEEE Symposium on Security and Privacy 2013: 367-381 - [c59]Josh Benaloh, Peter Y. A. Ryan, Vanessa Teague:
Verifiable Postal Voting. Security Protocols Workshop 2013: 54-65 - [c58]Peter Y. A. Ryan, Bruce Christianson:
Enhancements to Prepare-and-Measure Based QKD Protocols. Security Protocols Workshop 2013: 123-133 - [c57]Peter Y. A. Ryan:
Enhancements to Prepare-and-Measure-Based QKD Protocols (Transcript of Discussion). Security Protocols Workshop 2013: 134-142 - [c56]Dalia Khader, Qiang Tang, Peter Y. A. Ryan:
Proving Prêt à Voter Receipt Free Using Computational Security Models. EVT/WOTE 2013 - [c55]Morgan Llewellyn, Steve A. Schneider, Zhe Xia, Chris Culnane, James Heather, Peter Y. A. Ryan, Sriramkrishnan Srinivasan:
Testing Voters' Understanding of a Security Mechanism Used in Verifiable Voting. EVT/WOTE 2013 - [c54]Denise Demirel, Maria Henning, Jeroen van de Graaf, Peter Y. A. Ryan, Johannes Buchmann:
Prêt à Voter Providing Everlasting Privacy. VoteID 2013: 156-175 - 2012
- [c53]Craig Burton, Chris Culnane, James Heather, Thea Peacock, Peter Y. A. Ryan, Steve A. Schneider, Sriramkrishnan Srinivasan, Vanessa Teague, Roland Wen, Zhe Xia:
A Supervised Verifiable Voting Protocol for the Victorian Electoral Commission. Electronic Voting 2012: 81-94 - [c52]Dalia Khader, Ben Smyth, Peter Y. A. Ryan, Feng Hao:
A Fair and Robust Voting System by Broadcast. Electronic Voting 2012: 285-299 - [c51]Lizzie Coles-Kemp, Peter Y. A. Ryan:
Foreword from the Programme Chairs - STAST 2012. STAST 2012 - [c50]Craig Burton, Chris Culnane, James Heather, Thea Peacock, Peter Y. A. Ryan, Steve A. Schneider, Vanessa Teague, Roland Wen, Zhe Xia, Sriramkrishnan Srinivasan:
Using Prêt à Voter in Victoria State Elections. EVT/WOTE 2012 - 2011
- [c49]Simon Kramer, Peter Y. A. Ryan:
A modular multi-modal specification of real-timed, end-to-end voter-verifiable voting systems. REVOTE 2011: 9-21 - [c48]Feng Hao, Peter Y. A. Ryan:
How to Sync with Alice. Security Protocols Workshop 2011: 170-178 - [c47]Peter Y. A. Ryan:
Prêt à Voter with Confirmation Codes. EVT/WOTE 2011 - [c46]Denise Demirel, Maria Henning, Peter Y. A. Ryan, Steve A. Schneider, Melanie Volkamer:
Feasibility Analysis of Prêt à Voter for German Federal Elections. VoteID 2011: 158-173 - [i8]R. Michael Alvarez, Josh Benaloh, Alon Rosen, Peter Y. A. Ryan:
Verifiable Elections and the Public (Dagstuhl Seminar 11281). Dagstuhl Reports 1(7): 36-52 (2011) - [i7]Dalia Khader, Peter Y. A. Ryan:
Receipt Freeness of Prêt à Voter Provably Secure. IACR Cryptol. ePrint Arch. 2011: 594 (2011) - 2010
- [j14]Feng Hao, Peter Y. A. Ryan, Piotr Zielinski:
Anonymous voting by two-round public discussion. IET Inf. Secur. 4(2): 62-67 (2010) - [j13]Feng Hao, Peter Y. A. Ryan:
J-PAKE: Authenticated Key Exchange without PKI. Trans. Comput. Sci. 11: 192-206 (2010) - [j12]David Chaum, Richard Carback, Jeremy Clark, Aleksander Essex, Stefan Popoveniuc, Ronald L. Rivest, Peter Y. A. Ryan, Emily Shen, Alan T. Sherman, Poorvi L. Vora:
Corrections to scantegrity II: end-to-end verifiability by voters of optical scan elections through confirmation codes. IEEE Trans. Inf. Forensics Secur. 5(1): 194 (2010) - [c45]James Heather, Peter Y. A. Ryan, Vanessa Teague:
Pretty Good Democracy for More Expressive Voting Schemes. ESORICS 2010: 405-423 - [c44]Zhe Xia, Chris Culnane, James Heather, Hugo Jonker, Peter Y. A. Ryan, Steve A. Schneider, Sriramkrishnan Srinivasan:
Versatile Prêt à Voter: Handling Multiple Election Methods with a Unified Interface. INDOCRYPT 2010: 98-114 - [c43]Giampaolo Bella, Peter Y. A. Ryan, Vanessa Teague:
Virtually Perfect Democracy. Security Protocols Workshop 2010: 161-166 - [c42]Peter Y. A. Ryan:
Virtually Perfect Democracy (Transcript of Discussion). Security Protocols Workshop 2010: 167-174 - [c41]Sjouke Mauw, Sasa Radomirovic, Peter Y. A. Ryan:
Security Protocols for Secret Santa. Security Protocols Workshop 2010: 175-184 - [c40]Peter Y. A. Ryan, Thea Peacock:
A Threat Analysis of Prêt à Voter. Towards Trustworthy Elections 2010: 200-215 - [e9]David Chaum, Markus Jakobsson, Ronald L. Rivest, Peter Y. A. Ryan, Josh Benaloh, Miroslaw Kutylowski, Ben Adida:
Towards Trustworthy Elections, New Directions in Electronic Voting. Lecture Notes in Computer Science 6000, Springer 2010, ISBN 978-3-642-12979-7 [contents] - [i6]Feng Hao, Peter Y. A. Ryan:
J-PAKE: Authenticated Key Exchange Without PKI. IACR Cryptol. ePrint Arch. 2010: 190 (2010)
2000 – 2009
- 2009
- [j11]Giampaolo Bella, Peter Y. A. Ryan:
Journal of Computer SecuritySpecial Number devoted to the best papers of the Security Track at the 2006 ACM Symposium on Applied Computing. J. Comput. Secur. 17(3): 237 (2009) - [j10]David Chaum, Richard Carback, Jeremy Clark, Aleksander Essex, Stefan Popoveniuc, Ronald L. Rivest, Peter Y. A. Ryan, Emily Shen, Alan T. Sherman, Poorvi L. Vora:
Scantegrity II: end-to-end verifiability by voters of optical scan elections through confirmation codes. IEEE Trans. Inf. Forensics Secur. 4(4): 611-627 (2009) - [j9]Peter Y. A. Ryan, David Bismark, James Heather, Steve A. Schneider, Zhe Xia:
Prêt à voter: a voter-verifiable voting system. IEEE Trans. Inf. Forensics Secur. 4(4): 662-673 (2009) - [c39]Peter Y. A. Ryan:
How Many Election Officials Does It Take to Change an Election? ARSPA-WITS 2009: 211-221 - [c38]David Bismark, James Heather, Roger M. A. Peel, Steve A. Schneider, Zhe Xia, Peter Y. A. Ryan:
Experiences Gained from the first Prêt à Voter Implementation. REVOTE 2009: 19-28 - [c37]Peter Y. A. Ryan, Vanessa Teague:
Pretty Good Democracy. Security Protocols Workshop 2009: 111-130 - [c36]Peter Y. A. Ryan:
Pretty Good Democracy. Security Protocols Workshop 2009: 131-142 - [c35]Peter Y. A. Ryan, Vanessa Teague:
Permutations in Prêt à Voter. EVT/WOTE 2009 - [c34]Ali Nasrat Haidar, Peter V. Coveney, Ali E. Abdallah, Peter Y. A. Ryan, Bruce Beckles, J. M. Brooke, M. A. S. Jones:
Formal Modelling of a Usable Identity Management Solution for Virtual Organisations. FAVO 2009: 41-50 - [e8]Samuel L. Braunstein, Hoi-Kwong Lo, Kenny Paterson, Peter Y. A. Ryan:
Classical and Quantum Information Assurance Foundations and Practice, 26.07. - 31.07.2009. Dagstuhl Seminar Proceedings 09311, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany 2009 [contents] - [e7]Peter Y. A. Ryan, Berry Schoenmakers:
E-Voting and Identity, Second International Conference, VoteID 2009, Luxembourg, September 7-8, 2009. Proceedings. Lecture Notes in Computer Science 5767, Springer 2009, ISBN 978-3-642-04134-1 [contents] - [i5]Samuel L. Braunstein, Hoi-Kwong Lo, Kenny Paterson, Peter Y. A. Ryan:
09311 Abstracts Collection - Classical and Quantum Information Assurance Foundations and Practice. Classical and Quantum Information Assurance Foundations and Practice 2009 - 2008
- [j8]Jeremy W. Bryans, Maciej Koutny, Laurent Mazaré, Peter Y. A. Ryan:
Opacity generalised to transition systems. Int. J. Inf. Sec. 7(6): 421-435 (2008) - [j7]Peter Y. A. Ryan:
Prêt à Voter with Paillier encryption. Math. Comput. Model. 48(9-10): 1646-1662 (2008) - [c33]David Lundin, Peter Y. A. Ryan:
Human Readable Paper Verification of Prêt à Voter. ESORICS 2008: 379-395 - [c32]Roberto Araújo, Peter Y. A. Ryan:
Improving the Farnel Voting Scheme. Electronic Voting 2008: 169-182 - [c31]Feng Hao, Peter Y. A. Ryan:
Password Authenticated Key Exchange by Juggling. Security Protocols Workshop 2008: 159-171 - [c30]Peter Y. A. Ryan:
Remodelling the Attacker in Voting Protocols. Security Protocols Workshop 2008: 232-234 - [c29]Peter Y. A. Ryan:
Remodelling the Attacker in Voting Protocols (Transcript of Discussion). Security Protocols Workshop 2008: 235-240 - [c28]David Chaum, Richard Carback, Jeremy Clark, Aleksander Essex, Stefan Popoveniuc, Ronald L. Rivest, Peter Y. A. Ryan, Emily Shen, Alan T. Sherman:
Scantegrity II: End-to-End Verifiability for Optical Scan Election Systems using Invisible Ink Confirmation Codes. EVT 2008 - [e6]David Chaum, Miroslaw Kutylowski, Ronald L. Rivest, Peter Y. A. Ryan:
Frontiers of Electronic Voting, 29.07. - 03.08.2007. Dagstuhl Seminar Proceedings 07311, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany 2008 [contents] - [i4]Roberto Araújo, Peter Y. A. Ryan:
Improving the Farnel, Threeballot, and Randell-Ryan Voting Schemes. IACR Cryptol. ePrint Arch. 2008: 82 (2008) - 2007
- [j6]Theodosis Dimitrakos, Fabio Martinelli, Peter Y. A. Ryan, Steve A. Schneider:
Guest Editors' Preface. Int. J. Inf. Sec. 6(2-3): 65-66 (2007) - [c27]Thomas Tjøstheim, Thea Peacock, Peter Y. A. Ryan:
A Model for System-Based Analysis of Voting Systems. Security Protocols Workshop 2007: 114-130 - [e5]Theodosis Dimitrakos, Fabio Martinelli, Peter Y. A. Ryan, Steve A. Schneider:
Formal Aspects in Security and Trust, Fourth International Workshop, FAST 2006, Hamilton, Ontario, Canada, August 26-27, 2006, Revised Selected Papers. Lecture Notes in Computer Science 4691, Springer 2007, ISBN 978-3-540-75226-4 [contents] - [i3]David Chaum, Miroslaw Kutylowski, Ronald L. Rivest, Peter Y. A. Ryan:
07311 Executive Summary -- Frontiers of Electronic Voting. Frontiers of Electronic Voting 2007 - [i2]David Chaum, Miroslaw Kutylowski, Ronald L. Rivest, Peter Y. A. Ryan:
07311 Abstracts Collection -- Frontiers of Electronic Voting. Frontiers of Electronic Voting 2007 - [i1]David Chaum, Jeroen van de Graaf, Peter Y. A. Ryan, Poorvi L. Vora:
Secret Ballot Elections with Unconditional Integrity. IACR Cryptol. ePrint Arch. 2007: 270 (2007) - 2006
- [j5]Brian Randell, Peter Y. A. Ryan:
Voting Technologies and Trust. IEEE Secur. Priv. 4(5): 50-56 (2006) - [c26]Jeremy W. Bryans, Bev Littlewood, Peter Y. A. Ryan, Lorenzo Strigini:
E-voting: Dependability Requirements and Design for Dependability. ARES 2006: 988-995 - [c25]Peter Y. A. Ryan, Steve A. Schneider:
Prêt à Voter with Re-encryption Mixes. ESORICS 2006: 313-326 - [c24]Giampaolo Bella, Peter Y. A. Ryan:
Editorial message: special track on computer security. SAC 2006: 321-322 - [c23]Peter Y. A. Ryan, Thea Peacock:
Putting the Human Back in Voting Protocols. Security Protocols Workshop 2006: 13-19 - [c22]Peter Y. A. Ryan:
Putting the Human Back in Voting Protocols. Security Protocols Workshop 2006: 20-25 - [e4]Theodosis Dimitrakos, Fabio Martinelli, Peter Y. A. Ryan, Steve A. Schneider:
Formal Aspects in Security and Trust, Third International Workshop, FAST 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected Papers. Lecture Notes in Computer Science 3866, Springer 2006, ISBN 3-540-32628-6 [contents] - 2005
- [j4]Giampaolo Bella, Peter Y. A. Ryan:
Guest Editors' preface. J. Comput. Secur. 13(5): 697- (2005) - [c21]Peter Ryan:
Prospects for E-Voting. COMPSAC (1) 2005: 501 - [c20]David Chaum, Peter Y. A. Ryan, Steve A. Schneider:
A Practical Voter-Verifiable Election Scheme. ESORICS 2005: 118-139 - [c19]Brian Randell, Peter Y. A. Ryan:
Voting Technologies and Trust. Formal Aspects in Security and Trust 2005: 1-4 - [c18]Jeremy W. Bryans, Maciej Koutny, Laurent Mazaré, Peter Y. A. Ryan:
Opacity Generalised to Transition Systems. Formal Aspects in Security and Trust 2005: 81-95 - [c17]Peter Y. A. Ryan:
A variant of the Chaum voter-verifiable scheme. WITS 2005: 81-88 - [c16]Giampaolo Bella, Peter Y. A. Ryan:
Special track on computer security. SAC 2005: 304-305 - 2004
- [c15]Peter Y. A. Ryan:
Shedding Light on Haunted Corners of Information Security. 25 Years Communicating Sequential Processes 2004: 264-264 - [c14]Robert J. Stroud, Ian S. Welch, John P. Warne, Peter Y. A. Ryan:
A Qualitative Analysis of the Intrusion-Tolerance Capabilities of the MAFTIA Architecture. DSN 2004: 453- - [c13]Peter Y. A. Ryan:
Of Elections and Electrons. FORMATS/FTRTFT 2004: 3-4 - [c12]Jeremy W. Bryans, Maciej Koutny, Peter Y. A. Ryan:
Modelling Dynamic Opacity Using Petri Nets with Silent Actions. Formal Aspects in Security and Trust 2004: 159-172 - [c11]Giampaolo Bella, Peter Y. A. Ryan:
Editoral message: special track on computer security. SAC 2004: 373-374 - [c10]Jeremy W. Bryans, Maciej Koutny, Peter Y. A. Ryan:
Modelling Opacity Using Petri Nets. WISP@ICATPN 2004: 101-115 - [e3]Pierangela Samarati, Peter Y. A. Ryan, Dieter Gollmann, Refik Molva:
Computer Security - ESORICS 2004, 9th European Symposium on Research Computer Security, Sophia Antipolis, France, September 13-15, 2004, Proceedings. Lecture Notes in Computer Science 3193, Springer 2004, ISBN 3-540-22987-6 [contents] - 2003
- [j3]Li Gong, Joshua D. Guttman, Peter Y. A. Ryan, Steve A. Schneider:
Guest editorial overview. IEEE J. Sel. Areas Commun. 21(1): 1-4 (2003) - [c9]Peter Y. A. Ryan:
Enforcing the Unenforceable. Security Protocols Workshop 2003: 178-182 - [e2]Ali E. Abdallah, Peter Y. A. Ryan, Steve A. Schneider:
Formal Aspects of Security, First International Conference, FASec 2002, London, UK, December 16-18, 2002, Revised Papers. Lecture Notes in Computer Science 2629, Springer 2003, ISBN 3-540-20693-0 [contents] - 2001
- [b1]Peter Y. A. Ryan, Steve A. Schneider:
Modelling and analysis of security protocols. Addison-Wesley-Longman 2001, ISBN 978-0-201-67471-2, pp. I-XIV, 1-300 - [j2]Peter Y. A. Ryan, Steve A. Schneider:
Process Algebra and Non-Interference. J. Comput. Secur. 9(1/2): 75-103 (2001) - [c8]Peter Y. A. Ryan, John D. McLean, Jonathan K. Millen, Virgil D. Gligor:
Non-Interference: Who Needs It? CSFW 2001: 237-238 - 2000
- [c7]Peter Y. A. Ryan:
Mathematical Models of Computer Security. FOSAD 2000: 1-62 - [c6]Peter Ryan:
Open Questions (Transcript of Discussion). Security Protocols Workshop 2000: 49-53 - [c5]Peter Y. A. Ryan:
Process Algebra and Information Flow. MFCSIT 2000: 360 - [e1]Steve A. Schneider, Peter Ryan:
Workshop on Secure Architectures and Information Flow 1999, Royal Holloway, London, UK, December 1-3, 1999. Electronic Notes in Theoretical Computer Science 32, Elsevier 2000 [contents]
1990 – 1999
- 1999
- [c4]Peter Y. A. Ryan, Steve A. Schneider:
Process Algebra and Non-Interference. CSFW 1999: 214-227 - [c3]Steve A. Schneider, Peter Ryan:
Preface. Workshop on Secure Architectures and Information Flow 1999: 113-114 - 1998
- [j1]Peter Y. A. Ryan, Steve A. Schneider:
An Attack on a Recursive Authentication Protocol. A Cautionary Tale. Inf. Process. Lett. 65(1): 7-10 (1998) - [c2]Peter Y. A. Ryan, Dieter Gollmann, Li Gong, Günter Karjoth, Chris J. Mitchell:
Panel Introduction: The Security Impact of Distributed Computing Technologies. CSFW 1998: 164-166 - 1996
- [c1]Peter Ryan:
A Genealogy of Non-Interference. CSFW 1996: 158-
Coauthor Index
aka: Wojtek Jamroga
aka: Peter B. Roenne
aka: Steve Schneider
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-26 00:50 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint