Search the dblp DataBase
Peter Y. A. Ryan :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
J. W. Bryans , Bev Littlewood , Peter Y. A. Ryan , Lorenzo Strigini E-voting: Dependability Requirements and Design for Dependability. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:988-995 [Conf ] Peter Y. A. Ryan Shedding Light on Haunted Corners of Information Security. [Citation Graph (0, 0)][DBLP ] 25 Years Communicating Sequential Processes, 2004, pp:264-264 [Conf ] Peter Y. A. Ryan , Dieter Gollmann , Li Gong , Günter Karjoth , Chris J. Mitchell Panel Introduction: The Security Impact of Distributed Computing Technologies. [Citation Graph (0, 0)][DBLP ] CSFW, 1998, pp:164-166 [Conf ] Peter Y. A. Ryan , Steve A. Schneider Process Algebra and Non-Interference. [Citation Graph (0, 0)][DBLP ] CSFW, 1999, pp:214-227 [Conf ] Robert J. Stroud , Ian S. Welch , John P. Warne , Peter Y. A. Ryan A Qualitative Analysis of the Intrusion-Tolerance Capabilities of the MAFTIA Architecture. [Citation Graph (0, 0)][DBLP ] DSN, 2004, pp:453-0 [Conf ] David Chaum , Peter Y. A. Ryan , Steve A. Schneider A Practical Voter-Verifiable Election Scheme. [Citation Graph (0, 0)][DBLP ] ESORICS, 2005, pp:118-139 [Conf ] Peter Y. A. Ryan , Steve A. Schneider Prêt à Voter with Re-encryption Mixes. [Citation Graph (0, 0)][DBLP ] ESORICS, 2006, pp:313-326 [Conf ] Peter Y. A. Ryan Of Elections and Electrons. [Citation Graph (0, 0)][DBLP ] FORMATS/FTRTFT, 2004, pp:3-4 [Conf ] Peter Y. A. Ryan Mathematical Models of Computer Security. [Citation Graph (0, 0)][DBLP ] FOSAD, 2000, pp:1-62 [Conf ] Jeremy Bryans , Maciej Koutny , Laurent Mazaré , Peter Y. A. Ryan Opacity Generalised to Transition Systems. [Citation Graph (0, 0)][DBLP ] Formal Aspects in Security and Trust, 2005, pp:81-95 [Conf ] Jeremy Bryans , Maciej Koutny , Peter Y. A. Ryan Modelling Dynamic Opacity Using Petri Nets with Silent Actions. [Citation Graph (0, 0)][DBLP ] Formal Aspects in Security and Trust, 2004, pp:159-172 [Conf ] Brian Randell , Peter Y. A. Ryan Voting Technologies and Trust. [Citation Graph (0, 0)][DBLP ] Formal Aspects in Security and Trust, 2005, pp:1-4 [Conf ] Giampaolo Bella , Peter Y. A. Ryan Special track on computer security. [Citation Graph (0, 0)][DBLP ] SAC, 2005, pp:304-305 [Conf ] Giampaolo Bella , Peter Y. A. Ryan Editorial message: special track on computer security. [Citation Graph (0, 0)][DBLP ] SAC, 2006, pp:321-322 [Conf ] Peter Y. A. Ryan Open Questions (Transcript of Discussion). [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2000, pp:49-53 [Conf ] Peter Y. A. Ryan Enforcing the Unenforceable. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2003, pp:178-182 [Conf ] Jeremy Bryans , Maciej Koutny , Peter Y. A. Ryan Modelling Opacity Using Petri Nets. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2005, v:121, n:, pp:101-115 [Journal ] Peter Y. A. Ryan Process Algebra and Information Flow. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2000, v:40, n:, pp:- [Journal ] Peter Y. A. Ryan , Steve A. Schneider An Attack on a Recursive Authentication Protocol. A Cautionary Tale. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1998, v:65, n:1, pp:7-10 [Journal ] Giampaolo Bella , Peter Y. A. Ryan Guest Editors' preface. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2005, v:13, n:5, pp:697-0 [Journal ] Peter Y. A. Ryan , Steve A. Schneider Process Algebra and Non-Interference. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2001, v:9, n:1/2, pp:75-103 [Journal ] Theodosis Dimitrakos , Fabio Martinelli , Peter Y. A. Ryan , Steve Schneider Guest Editors' Preface. [Citation Graph (0, 0)][DBLP ] Int. J. Inf. Sec., 2007, v:6, n:2-3, pp:65-66 [Journal ] 07311 Executive Summary -- Frontiers of Electronic Voting. [Citation Graph (, )][DBLP ] 07311 Abstracts Collection -- Frontiers of Electronic Voting. [Citation Graph (, )][DBLP ] Human Readable Paper Verification of Prêt à Voter. [Citation Graph (, )][DBLP ] Pretty Good Democracy for More Expressive Voting Schemes. [Citation Graph (, )][DBLP ] How Many Election Officials Does It Take to Change an Election? [Citation Graph (, )][DBLP ] A variant of the Chaum voter-verifiable scheme. [Citation Graph (, )][DBLP ] Putting the Human Back in Voting Protocols. [Citation Graph (, )][DBLP ] Putting the Human Back in Voting Protocols. [Citation Graph (, )][DBLP ] Scantegrity II: End-to-End Verifiability for Optical Scan Election Systems using Invisible Ink Confirmation Codes. [Citation Graph (, )][DBLP ] Improving the Farnel Voting Scheme. [Citation Graph (, )][DBLP ] A Threat Analysis of Prêt à Voter. [Citation Graph (, )][DBLP ] Formal Modelling of a Usable Identity Management Solution for Virtual Organisations [Citation Graph (, )][DBLP ] Search in 0.002secs, Finished in 0.301secs