Peter Ryan
Peter Ryan
Professor of applied security, university of luxembourg
E-mail megerősítve itt: uni.lu - Kezdőlap
Cím
Hivatkozott rá
Hivatkozott rá
Év
The modelling and analysis of security protocols: the csp approach
P Ryan, SA Schneider, M Goldsmith, G Lowe, B Roscoe
Addison-Wesley Professional, 2001
7222001
A practical voter-verifiable election scheme
D Chaum, PYA Ryan, S Schneider
European Symposium on Research in Computer Security, 118-139, 2005
4562005
Process algebra and non-interference
PYA Ryan, SA Schneider
Journal of Computer Security 9 (1-2), 75-103, 2001
3032001
Opacity generalised to transition systems
JW Bryans, M Koutny, L Mazaré, PYA Ryan
International Journal of Information Security 7 (6), 421-435, 2008
2852008
PrÊt À Voter:a Voter-Verifiable Voting System
PYA Ryan, D Bismark, J Heather, S Schneider, Z Xia
IEEE transactions on information forensics and security 4 (4), 662-673, 2009
219*2009
Scantegrity II: End-to-End Verifiability for Optical Scan Election Systems using Invisible Ink Confirmation Codes.
D Chaum, R Carback, J Clark, A Essex, S Popoveniuc, RL Rivest, ...
EVT 8, 1-13, 2008
2012008
Prêt à voter with re-encryption mixes
PYA Ryan, SA Schneider
European Symposium on Research in Computer Security, 313-326, 2006
1662006
An attack on a recursive authentication protocol A cautionary tale
PYA Ryan, SA Schneider
Information Processing Letters 65 (1), 7-10, 1998
1481998
Mathematical models of computer security
PYA Ryan
International School on Foundations of Security Analysis and Design, 1-62, 2000
1452000
Modelling opacity using Petri nets
JW Bryans, M Koutny, PYA Ryan
Electronic Notes in Theoretical Computer Science 121, 101-115, 2005
1232005
Scantegrity II: End-to-end verifiability by voters of optical scan elections through confirmation codes
D Chaum, RT Carback, J Clark, A Essex, S Popoveniuc, RL Rivest, ...
IEEE transactions on information forensics and security 4 (4), 611-627, 2009
1142009
Anonymous voting by two-round public discussion
F Hao, PYA Ryan, P Zieliński
IET Information Security 4 (2), 62-67, 2010
1042010
Pretty good democracy
PYA Ryan, V Teague
International Workshop on Security Protocols, 111-130, 2009
1042009
Prêt à Voter: a system perspective
P Ryan, T Peacock
University of Newcastle upon Tyne, 2005
972005
Collaborative Networked Communication: MUDs as Systems Tools.
R Evard
LISA 7, 1-8, 1993
921993
Non-interference, who needs it?
J McLean, NRLJ Millen, V Gligor
Proceedings of the IEEE Workshop on Computer Security Foundations, 237-238, 2001
912001
Voting technologies and trust
B Randell, PYA Ryan
IEEE Security & Privacy 4 (5), 50-56, 2006
882006
J-PAKE: authenticated key exchange without PKI
F Hao, P Ryan
Transactions on computational science XI, 192-206, 2010
812010
A variant of the Chaum voter-verifiable scheme
PYA Ryan
Proceedings of the 2005 Workshop on Issues in the Theory of Security, 81-88, 2005
812005
A CSP formulation of non-interference and unwinding
PYA Ryan
Cipher: IEEE Computer Society Technical Committee Newsletter on Security …, 1991
731991
A rendszer jelenleg nem tudja elvégezni a műveletet. Próbálkozzon újra később.
Cikkek 1–20