Follow
Peter Ryan
Peter Ryan
Professor of applied security, university of luxembourg
Verified email at uni.lu - Homepage
Title
Cited by
Cited by
Year
The modelling and analysis of security protocols: the CSP approach
P Ryan, SA Schneider
Addison-Wesley Professional, 2001
7872001
A practical voter-verifiable election scheme
D Chaum, PYA Ryan, S Schneider
Computer Security–ESORICS 2005: 10th European Symposium on Research in …, 2005
5142005
Opacity generalised to transition systems
JW Bryans, M Koutny, L Mazaré, PYA Ryan
International Journal of Information Security 7, 421-435, 2008
3792008
Process algebra and non-interference
PYA Ryan, SA Schneider
Journal of Computer Security 9 (1-2), 75-103, 2001
3222001
PrÊt À Voter:a Voter-Verifiable Voting System
PYA Ryan, D Bismark, J Heather, S Schneider, Z Xia
IEEE transactions on information forensics and security 4 (4), 662-673, 2009
295*2009
Scantegrity II: End-to-End Verifiability for Optical Scan Election Systems using Invisible Ink Confirmation Codes.
D Chaum, R Carback, J Clark, A Essex, S Popoveniuc, RL Rivest, ...
EVT 8 (1), 13, 2008
2432008
Prêt à voter with re-encryption mixes
PYA Ryan, SA Schneider
Computer Security–ESORICS 2006: 11th European Symposium on Research in …, 2006
1962006
Modelling opacity using Petri nets
JW Bryans, M Koutny, PYA Ryan
Electronic Notes in Theoretical Computer Science 121, 101-115, 2005
1892005
Anonymous voting by two-round public discussion
F Hao, PYA Ryan, P Zieliński
IET Information Security 4 (2), 62-67, 2010
1842010
Mathematical models of computer security
PYA Ryan
International School on Foundations of Security Analysis and Design, 1-62, 2000
1592000
An attack on a recursive authentication protocol A cautionary tale
PYA Ryan, SA Schneider
Information Processing Letters 65 (1), 7-10, 1998
1461998
Scantegrity II: End-to-end verifiability by voters of optical scan elections through confirmation codes
D Chaum, RT Carback, J Clark, A Essex, S Popoveniuc, RL Rivest, ...
IEEE transactions on information forensics and security 4 (4), 611-627, 2009
1382009
Pretty good democracy
PYA Ryan, V Teague
Security Protocols XVII: 17th International Workshop, Cambridge, UK, April 1 …, 2013
1352013
Selene: Voting with transparent verifiability and coercion-mitigation
PYA Ryan, PB Rønne, V Iovino
Financial Cryptography and Data Security: FC 2016 International Workshops …, 2016
1282016
A fair and robust voting system by broadcast
D Khader, B Smyth, P Ryan, F Hao
Lecture Notes in Informatics, 285-299, 2012
1152012
J-PAKE: authenticated key exchange without PKI
F Hao, P Ryan
Transactions on Computational Science XI: Special Issue on Security in …, 2010
1082010
Cholesteric liquid crystal shells as enabling material for information‐rich design and architecture
M Schwartz, G Lenzini, Y Geng, PB Rønne, PYA Ryan, JPF Lagerwall
Advanced Materials 30 (30), 1707382, 2018
1062018
Prêt à Voter: a system perspective
P Ryan, T Peacock
School of Computing Science Technical Report Series, 2005
1042005
Non-interference, who needs it?
J McLean, J Millen, V Gligor
Proceedings of the IEEE Workshop on Computer Security Foundations, 237-238, 2001
1012001
Voting technologies and trust
B Randell, PYA Ryan
IEEE Security & Privacy 4 (5), 50-56, 2006
1002006
The system can't perform the operation now. Try again later.
Articles 1–20