The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Peter Y. A. Ryan: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. J. W. Bryans, Bev Littlewood, Peter Y. A. Ryan, Lorenzo Strigini
    E-voting: Dependability Requirements and Design for Dependability. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:988-995 [Conf]
  2. Peter Y. A. Ryan
    Shedding Light on Haunted Corners of Information Security. [Citation Graph (0, 0)][DBLP]
    25 Years Communicating Sequential Processes, 2004, pp:264-264 [Conf]
  3. Peter Y. A. Ryan, Dieter Gollmann, Li Gong, Günter Karjoth, Chris J. Mitchell
    Panel Introduction: The Security Impact of Distributed Computing Technologies. [Citation Graph (0, 0)][DBLP]
    CSFW, 1998, pp:164-166 [Conf]
  4. Peter Y. A. Ryan, Steve A. Schneider
    Process Algebra and Non-Interference. [Citation Graph (0, 0)][DBLP]
    CSFW, 1999, pp:214-227 [Conf]
  5. Robert J. Stroud, Ian S. Welch, John P. Warne, Peter Y. A. Ryan
    A Qualitative Analysis of the Intrusion-Tolerance Capabilities of the MAFTIA Architecture. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:453-0 [Conf]
  6. David Chaum, Peter Y. A. Ryan, Steve A. Schneider
    A Practical Voter-Verifiable Election Scheme. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2005, pp:118-139 [Conf]
  7. Peter Y. A. Ryan, Steve A. Schneider
    Prêt à Voter with Re-encryption Mixes. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2006, pp:313-326 [Conf]
  8. Peter Y. A. Ryan
    Of Elections and Electrons. [Citation Graph (0, 0)][DBLP]
    FORMATS/FTRTFT, 2004, pp:3-4 [Conf]
  9. Peter Y. A. Ryan
    Mathematical Models of Computer Security. [Citation Graph (0, 0)][DBLP]
    FOSAD, 2000, pp:1-62 [Conf]
  10. Jeremy Bryans, Maciej Koutny, Laurent Mazaré, Peter Y. A. Ryan
    Opacity Generalised to Transition Systems. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2005, pp:81-95 [Conf]
  11. Jeremy Bryans, Maciej Koutny, Peter Y. A. Ryan
    Modelling Dynamic Opacity Using Petri Nets with Silent Actions. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2004, pp:159-172 [Conf]
  12. Brian Randell, Peter Y. A. Ryan
    Voting Technologies and Trust. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2005, pp:1-4 [Conf]
  13. Giampaolo Bella, Peter Y. A. Ryan
    Special track on computer security. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:304-305 [Conf]
  14. Giampaolo Bella, Peter Y. A. Ryan
    Editorial message: special track on computer security. [Citation Graph (0, 0)][DBLP]
    SAC, 2006, pp:321-322 [Conf]
  15. Peter Y. A. Ryan
    Open Questions (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2000, pp:49-53 [Conf]
  16. Peter Y. A. Ryan
    Enforcing the Unenforceable. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2003, pp:178-182 [Conf]
  17. Jeremy Bryans, Maciej Koutny, Peter Y. A. Ryan
    Modelling Opacity Using Petri Nets. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2005, v:121, n:, pp:101-115 [Journal]
  18. Peter Y. A. Ryan
    Process Algebra and Information Flow. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2000, v:40, n:, pp:- [Journal]
  19. Peter Y. A. Ryan, Steve A. Schneider
    An Attack on a Recursive Authentication Protocol. A Cautionary Tale. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1998, v:65, n:1, pp:7-10 [Journal]
  20. Giampaolo Bella, Peter Y. A. Ryan
    Guest Editors' preface. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2005, v:13, n:5, pp:697-0 [Journal]
  21. Peter Y. A. Ryan, Steve A. Schneider
    Process Algebra and Non-Interference. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2001, v:9, n:1/2, pp:75-103 [Journal]
  22. Theodosis Dimitrakos, Fabio Martinelli, Peter Y. A. Ryan, Steve Schneider
    Guest Editors' Preface. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2007, v:6, n:2-3, pp:65-66 [Journal]

  23. 07311 Executive Summary -- Frontiers of Electronic Voting. [Citation Graph (, )][DBLP]


  24. 07311 Abstracts Collection -- Frontiers of Electronic Voting. [Citation Graph (, )][DBLP]


  25. Human Readable Paper Verification of Prêt à Voter. [Citation Graph (, )][DBLP]


  26. Pretty Good Democracy for More Expressive Voting Schemes. [Citation Graph (, )][DBLP]


  27. How Many Election Officials Does It Take to Change an Election? [Citation Graph (, )][DBLP]


  28. A variant of the Chaum voter-verifiable scheme. [Citation Graph (, )][DBLP]


  29. Putting the Human Back in Voting Protocols. [Citation Graph (, )][DBLP]


  30. Putting the Human Back in Voting Protocols. [Citation Graph (, )][DBLP]


  31. Scantegrity II: End-to-End Verifiability for Optical Scan Election Systems using Invisible Ink Confirmation Codes. [Citation Graph (, )][DBLP]


  32. Improving the Farnel Voting Scheme. [Citation Graph (, )][DBLP]


  33. A Threat Analysis of Prêt à Voter. [Citation Graph (, )][DBLP]


  34. Formal Modelling of a Usable Identity Management Solution for Virtual Organisations [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.006secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002