Peter Y. A. Ryan

According to our database1, Peter Y. A. Ryan authored at least 126 papers between 1991 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2018
A Proof of Entropy Minimization for Outputs in Deletion Channels via Hidden Word Statistics.
CoRR, 2018

CryptoRec: Secure Recommendations as a Service.
CoRR, 2018

From Clustering Supersequences to Entropy Minimizing Subsequences for Single and Double Deletions.
CoRR, 2018

An Offline Dictionary Attack against zkPAKE Protocol.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018

A Security Analysis, and a Fix, of a Code-Corrupted Honeywords System.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

No Random, No Ransom: A Key to Stop Cryptographic Ransomware.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2018

2017
A Vote of Confidence?
IEEE Security & Privacy, 2017

Public Evidence from Secret Ballots.
CoRR, 2017

Trustworthy exams without trusted parties.
Computers & Security, 2017

Security in the shell: An optical physical unclonable function made of shells of cholesteric liquid crystals.
Proceedings of the 2017 IEEE Workshop on Information Forensics and Security, 2017

Public Evidence from Secret Ballots.
Proceedings of the Electronic Voting - Second International Joint Conference, 2017

Auditable PAKEs: Approaching Fair Exchange Without a TTP (Transcript of Discussion).
Proceedings of the Security Protocols XXV, 2017

Auditable PAKEs: Approaching Fair Exchange Without a TTP.
Proceedings of the Security Protocols XXV, 2017

Securing the Foundations of Democracy.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2017

Using Selene to Verify Your Vote in JCJ.
Proceedings of the Financial Cryptography and Data Security, 2017

Cipher, the Random and the Ransom: A Survey on Current and Future Ransomware.
Proceedings of the Advances in Cybersecurity, 2017

A Brief History of Security Protocols.
Proceedings of the Concurrency, Security, and Puzzles, 2017

2016
(Universal) Unconditional Verifiability in E-Voting without Trusted Parties.
IACR Cryptology ePrint Archive, 2016

(Universal) Unconditional Verifiability in E-Voting without Trusted Parties.
CoRR, 2016

Selene: Voting with Transparent Verifiability and Coercion-Mitigation.
Proceedings of the Financial Cryptography and Data Security, 2016

Expressing Receipt-Freeness and Coercion-Resistance in Logics of Strategic Ability: Preliminary Attempt.
Proceedings of the 1st International Workshop on AI for Privacy and Security, 2016

Crypto Santa.
Proceedings of the New Codebreakers, 2016

2015
vVote: A Verifiable Voting System.
ACM Trans. Inf. Syst. Secur., 2015

End-to-End Verifiability in Voting Systems, from Theory to Practice.
IEEE Security & Privacy, 2015

Selene: Voting with Transparent Verifiability and Coercion-Mitigation.
IACR Cryptology ePrint Archive, 2015

Privacy and Security in an Age of Surveillance (Dagstuhl Perspectives Workshop 14401).
Dagstuhl Manifestos, 2015

End-to-end verifiability.
CoRR, 2015

Information Leakage Due to Revealing Randomly Selected Bits.
Proceedings of the Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31, 2015

A Secure Exam Protocol Without Trusted Parties.
Proceedings of the ICT Systems Security and Privacy Protection, 2015

2014
High fidelity simulation using the updated distributed interactive simulation standard.
IJIDSS, 2014

DoubleMod and SingleMod: Simple Randomized Secret-Key Encryption with Bounded Homomorphicity.
IACR Cryptology ePrint Archive, 2014

Privacy and Security in an Age of Surveillance (Dagstuhl Perspectives Workshop 14401).
Dagstuhl Reports, 2014

vVote: a Verifiable Voting System (DRAFT).
CoRR, 2014

Faster Print on Demand for Prêt à Voter.
Proceedings of the 2014 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections, 2014

Remark!: A Secure Protocol for Remote Exams.
Proceedings of the Security Protocols XXII, 2014

Formal Analysis of Electronic Exams.
Proceedings of the SECRYPT 2014, 2014

Formal Security Analysis of Traditional and Electronic Exams.
Proceedings of the E-Business and Telecommunications - 11th International Joint Conference, 2014

Trapdoor Privacy in Asymmetric Searchable Encryption Schemes.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2014, 2014

2013
Generalized information theory for hints.
Int. J. Approx. Reasoning, 2013

Prêt à Voter Providing Everlasting Privacy.
Proceedings of the E-Voting and Identify, 2013

Testing Voters' Understanding of a Security Mechanism Used in Verifiable Voting.
Proceedings of the 2013 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2013

Proving Prêt à Voter Receipt Free Using Computational Security Models.
Proceedings of the 2013 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2013

Enhancements to Prepare-and-Measure Based QKD Protocols.
Proceedings of the Security Protocols XXI, 2013

Enhancements to Prepare-and-Measure-Based QKD Protocols (Transcript of Discussion).
Proceedings of the Security Protocols XXI, 2013

Verifiable Postal Voting.
Proceedings of the Security Protocols XXI, 2013

Caveat Coercitor: Coercion-Evidence in Electronic Voting.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

2012
Using Prêt à Voter in Victoria State Elections.
Proceedings of the 2012 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2012

Foreword from the Programme Chairs - STAST 2012.
Proceedings of the 2nd Workshop on Socio-Technical Aspects in Security and Trust, 2012

A Fair and Robust Voting System by Broadcast.
Proceedings of the 5th International Conference on Electronic Voting 2012, 2012

A Supervised Verifiable Voting Protocol for the Victorian Electoral Commission.
Proceedings of the 5th International Conference on Electronic Voting 2012, 2012

2011
Receipt Freeness of Prêt à Voter Provably Secure.
IACR Cryptology ePrint Archive, 2011

Verifiable Elections and the Public (Dagstuhl Seminar 11281).
Dagstuhl Reports, 2011

Feasibility Analysis of Prêt à Voter for German Federal Elections.
Proceedings of the E-Voting and Identity, 2011

Prêt à Voter with Confirmation Codes.
Proceedings of the 2011 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2011

How to Sync with Alice.
Proceedings of the Security Protocols XIX, 2011

A modular multi-modal specification of real-timed, end-to-end voter-verifiable voting systems.
Proceedings of the 2011 International Workshop on Requirements Engineering for Electronic Voting Systems, 2011

2010
Corrections to scantegrity II: end-to-end verifiability by voters of optical scan elections through confirmation codes.
IEEE Trans. Information Forensics and Security, 2010

J-PAKE: Authenticated Key Exchange without PKI.
Trans. Computational Science, 2010

Anonymous voting by two-round public discussion.
IET Information Security, 2010

J-PAKE: Authenticated Key Exchange Without PKI.
IACR Cryptology ePrint Archive, 2010

A Threat Analysis of Prêt à Voter.
Proceedings of the Towards Trustworthy Elections, New Directions in Electronic Voting, 2010

Virtually Perfect Democracy (Transcript of Discussion).
Proceedings of the Security Protocols XVIII, 2010

Security Protocols for Secret Santa.
Proceedings of the Security Protocols XVIII, 2010

Virtually Perfect Democracy.
Proceedings of the Security Protocols XVIII, 2010

Versatile Prêt à Voter: Handling Multiple Election Methods with a Unified Interface.
Proceedings of the Progress in Cryptology - INDOCRYPT 2010, 2010

Pretty Good Democracy for More Expressive Voting Schemes.
Proceedings of the Computer Security, 2010

2009
Prêt à voter: a voter-verifiable voting system.
IEEE Trans. Information Forensics and Security, 2009

Scantegrity II: end-to-end verifiability by voters of optical scan elections through confirmation codes.
IEEE Trans. Information Forensics and Security, 2009

Journal of Computer SecuritySpecial Number devoted to the best papers of the Security Track at the 2006 ACM Symposium on Applied Computing.
Journal of Computer Security, 2009

Formal Modelling of a Usable Identity Management Solution for Virtual Organisations
Proceedings of the Proceedings Second Workshop on Formal Aspects of Virtual Organisations, 2009

Permutations in Prêt à Voter.
Proceedings of the 2009 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2009

Pretty Good Democracy.
Proceedings of the Security Protocols XVII, 2009

Pretty Good Democracy.
Proceedings of the Security Protocols XVII, 2009

Experiences Gained from the first Prêt à Voter Implementation.
Proceedings of the First International Workshop on Requirements Engineering for e-Voting Systems, 2009

How Many Election Officials Does It Take to Change an Election?
Proceedings of the Foundations and Applications of Security Analysis, 2009

09311 Abstracts Collection - Classical and Quantum Information Assurance Foundations and Practice.
Proceedings of the Classical and Quantum Information Assurance Foundations and Practice, 26.07., 2009

2008
Prêt à Voter with Paillier encryption.
Mathematical and Computer Modelling, 2008

Opacity generalised to transition systems.
Int. J. Inf. Sec., 2008

Improving the Farnel, Threeballot, and Randell-Ryan Voting Schemes.
IACR Cryptology ePrint Archive, 2008

Scantegrity II: End-to-End Verifiability for Optical Scan Election Systems using Invisible Ink Confirmation Codes.
Proceedings of the 2008 USENIX/ACCURATE Electronic Voting Workshop, 2008

Remodelling the Attacker in Voting Protocols (Transcript of Discussion).
Proceedings of the Security Protocols XVI, 2008

Remodelling the Attacker in Voting Protocols.
Proceedings of the Security Protocols XVI, 2008

Password Authenticated Key Exchange by Juggling.
Proceedings of the Security Protocols XVI, 2008

Improving the Farnel Voting Scheme.
Proceedings of the 3rd International Conference, 2008

Human Readable Paper Verification of Prêt à Voter.
Proceedings of the Computer Security, 2008

2007
Guest Editors' Preface.
Int. J. Inf. Sec., 2007

Secret Ballot Elections with Unconditional Integrity.
IACR Cryptology ePrint Archive, 2007

A Model for System-Based Analysis of Voting Systems.
Proceedings of the Security Protocols, 2007

07311 Abstracts Collection -- Frontiers of Electronic Voting.
Proceedings of the Frontiers of Electronic Voting, 29.07. - 03.08.2007, 2007

07311 Executive Summary -- Frontiers of Electronic Voting.
Proceedings of the Frontiers of Electronic Voting, 29.07. - 03.08.2007, 2007

2006
Voting Technologies and Trust.
IEEE Security & Privacy, 2006

Putting the Human Back in Voting Protocols.
Proceedings of the Security Protocols, 2006

Putting the Human Back in Voting Protocols.
Proceedings of the Security Protocols, 2006

Editorial message: special track on computer security.
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006

Prêt à Voter with Re-encryption Mixes.
Proceedings of the Computer Security, 2006

E-voting: Dependability Requirements and Design for Dependability.
Proceedings of the The First International Conference on Availability, 2006

2005
Gender and Technology in the Liberal Arts: Aptitudes, Attitudes, and Skills Acquisition.
JITE, 2005

Guest Editors' preface.
Journal of Computer Security, 2005

Modelling Opacity Using Petri Nets.
Electr. Notes Theor. Comput. Sci., 2005

Special track on computer security.
Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), 2005

A variant of the Chaum voter-verifiable scheme.
Proceedings of the POPL 2005 Workshop on Issues in the Theory of Security, 2005

Voting Technologies and Trust.
Proceedings of the Formal Aspects in Security and Trust, Third International Workshop, 2005

Opacity Generalised to Transition Systems.
Proceedings of the Formal Aspects in Security and Trust, Third International Workshop, 2005

A Practical Voter-Verifiable Election Scheme.
Proceedings of the Computer Security, 2005

Prospects for E-Voting.
Proceedings of the 29th Annual International Computer Software and Applications Conference, 2005

2004
Editoral message: special track on computer security.
Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), 2004

Modelling Dynamic Opacity Using Petri Nets with Silent Actions.
Proceedings of the Formal Aspects in Security and Trust: Second IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), 2004

Of Elections and Electrons.
Proceedings of the Formal Techniques, 2004

A Qualitative Analysis of the Intrusion-Tolerance Capabilities of the MAFTIA Architecture.
Proceedings of the 2004 International Conference on Dependable Systems and Networks (DSN 2004), 28 June, 2004

Shedding Light on Haunted Corners of Information Security.
Proceedings of the Communicating Sequential Processes: The First 25 Years, 2004

2003
Guest editorial overview.
IEEE Journal on Selected Areas in Communications, 2003

Providing a Technology Edge for Liberal Arts Students.
JITE, 2003

Enforcing the Unenforceable.
Proceedings of the Security Protocols, 2003

2002
A Process Algebraic Approach to Security Policies.
Proceedings of the Research Directions in Data and Applications Security, 2002

2001
Process Algebra and Non-Interference.
Journal of Computer Security, 2001

Non-Interference: Who Needs It?
Proceedings of the 14th IEEE Computer Security Foundations Workshop (CSFW-14 2001), 2001

Modelling and analysis of security protocols.
Addison-Wesley-Longman, ISBN: 978-0-201-67471-2, 2001

2000
Preface.
Electr. Notes Theor. Comput. Sci., 2000

Process Algebra and Information Flow.
Electr. Notes Theor. Comput. Sci., 2000

Open Questions (Transcript of Discussion).
Proceedings of the Security Protocols, 2000

Mathematical Models of Computer Security.
Proceedings of the Foundations of Security Analysis and Design, 2000

1999
Process Algebra and Non-Interference.
Proceedings of the 12th IEEE Computer Security Foundations Workshop, 1999

1998
An Attack on a Recursive Authentication Protocol. A Cautionary Tale.
Inf. Process. Lett., 1998

Panel Introduction: The Security Impact of Distributed Computing Technologies.
Proceedings of the 11th IEEE Computer Security Foundations Workshop, 1998

1996
A Genealogy of Non-Interference.
Proceedings of the Ninth IEEE Computer Security Foundations Workshop, March 10, 1996

1991
FM91: Formal Methods Workshop.
Proceedings of the 13th International Conference on Software Engineering, 1991


  Loading...