2008 |
41 | | David Chaum,
Miroslaw Kutylowski,
Ronald L. Rivest,
Peter Y. A. Ryan:
Frontiers of Electronic Voting, 29.07. - 03.08.2007
Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany 2008 |
40 | EE | David Lundin,
Peter Y. A. Ryan:
Human Readable Paper Verification of Prêt à Voter.
ESORICS 2008: 379-395 |
39 | EE | David Chaum,
Richard Carback,
Jeremy Clark,
Aleksander Essex,
Stefan Popoveniuc,
Ronald L. Rivest,
Peter Y. A. Ryan,
Emily Shen,
Alan T. Sherman:
Scantegrity II: End-to-End Verifiability for Optical Scan Election Systems using Invisible Ink Confirmation Codes.
EVT 2008 |
38 | | Roberto Araujo,
Peter Y. A. Ryan:
Improving the Farnel Voting Scheme.
Electronic Voting 2008: 169-184 |
37 | EE | Jeremy Bryans,
Maciej Koutny,
Laurent Mazaré,
Peter Y. A. Ryan:
Opacity generalised to transition systems.
Int. J. Inf. Sec. 7(6): 421-435 (2008) |
2007 |
36 | | Theodosis Dimitrakos,
Fabio Martinelli,
Peter Y. A. Ryan,
Steve A. Schneider:
Formal Aspects in Security and Trust, Fourth International Workshop, FAST 2006, Hamilton, Ontario, Canada, August 26-27, 2006, Revised Selected Papers
Springer 2007 |
35 | EE | David Chaum,
Miroslaw Kutylowski,
Ronald L. Rivest,
Peter Y. A. Ryan:
07311 Abstracts Collection -- Frontiers of Electronic Voting.
Frontiers of Electronic Voting 2007 |
34 | EE | David Chaum,
Miroslaw Kutylowski,
Ronald L. Rivest,
Peter Y. A. Ryan:
07311 Executive Summary -- Frontiers of Electronic Voting.
Frontiers of Electronic Voting 2007 |
33 | EE | Theodosis Dimitrakos,
Fabio Martinelli,
Peter Y. A. Ryan,
Steve Schneider:
Guest Editors' Preface.
Int. J. Inf. Sec. 6(2-3): 65-66 (2007) |
2006 |
32 | | Theodosis Dimitrakos,
Fabio Martinelli,
Peter Y. A. Ryan,
Steve A. Schneider:
Formal Aspects in Security and Trust, Third International Workshop, FAST 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected Papers
Springer 2006 |
31 | EE | Jeremy Bryans,
Bev Littlewood,
Peter Y. A. Ryan,
Lorenzo Strigini:
E-voting: Dependability Requirements and Design for Dependability.
ARES 2006: 988-995 |
30 | EE | Peter Y. A. Ryan,
Steve A. Schneider:
Prêt à Voter with Re-encryption Mixes.
ESORICS 2006: 313-326 |
29 | EE | Giampaolo Bella,
Peter Y. A. Ryan:
Editorial message: special track on computer security.
SAC 2006: 321-322 |
2005 |
28 | EE | Peter Ryan:
Prospects for E-Voting.
COMPSAC (1) 2005: 501 |
27 | EE | David Chaum,
Peter Y. A. Ryan,
Steve A. Schneider:
A Practical Voter-Verifiable Election Scheme.
ESORICS 2005: 118-139 |
26 | EE | Brian Randell,
Peter Y. A. Ryan:
Voting Technologies and Trust.
Formal Aspects in Security and Trust 2005: 1-4 |
25 | EE | Jeremy Bryans,
Maciej Koutny,
Laurent Mazaré,
Peter Y. A. Ryan:
Opacity Generalised to Transition Systems.
Formal Aspects in Security and Trust 2005: 81-95 |
24 | EE | Giampaolo Bella,
Peter Y. A. Ryan:
Special track on computer security.
SAC 2005: 304-305 |
23 | EE | Peter Y. A. Ryan:
A variant of the Chaum voter-verifiable scheme.
WITS 2005: 81-88 |
22 | EE | Jeremy Bryans,
Maciej Koutny,
Peter Y. A. Ryan:
Modelling Opacity Using Petri Nets.
Electr. Notes Theor. Comput. Sci. 121: 101-115 (2005) |
21 | EE | Giampaolo Bella,
Peter Y. A. Ryan:
Guest Editors' preface.
Journal of Computer Security 13(5): 697- (2005) |
2004 |
20 | | Pierangela Samarati,
Peter Y. A. Ryan,
Dieter Gollmann,
Refik Molva:
Computer Security - ESORICS 2004, 9th European Symposium on Research Computer Security, Sophia Antipolis, France, September 13-15, 2004, Proceedings
Springer 2004 |
19 | EE | Peter Y. A. Ryan:
Shedding Light on Haunted Corners of Information Security.
25 Years Communicating Sequential Processes 2004: 264-264 |
18 | EE | Robert J. Stroud,
Ian S. Welch,
John P. Warne,
Peter Y. A. Ryan:
A Qualitative Analysis of the Intrusion-Tolerance Capabilities of the MAFTIA Architecture.
DSN 2004: 453- |
17 | EE | Peter Y. A. Ryan:
Of Elections and Electrons.
FORMATS/FTRTFT 2004: 3-4 |
16 | EE | Jeremy Bryans,
Maciej Koutny,
Peter Y. A. Ryan:
Modelling Dynamic Opacity Using Petri Nets with Silent Actions.
Formal Aspects in Security and Trust 2004: 159-172 |
15 | EE | Giampaolo Bella,
Peter Ryan:
Editoral message: special track on computer security.
SAC 2004: 373-374 |
2003 |
14 | | Ali E. Abdallah,
Peter Ryan,
Steve Schneider:
Formal Aspects of Security, First International Conference, FASec 2002, London, UK, December 16-18, 2002, Revised Papers
Springer 2003 |
13 | EE | Peter Y. A. Ryan:
Enforcing the Unenforceable.
Security Protocols Workshop 2003: 178-182 |
2002 |
12 | | Peter Ryan,
Ragni Ryvold Arnesen:
A Process Algebraic Approach to Security Policies.
DBSec 2002: 301-312 |
2001 |
11 | EE | Peter Ryan,
John D. McLean,
Jonathan K. Millen,
Virgil D. Gligor:
Non-Interference: Who Needs It?
CSFW 2001: 237- |
10 | | Peter Y. A. Ryan,
Steve A. Schneider:
Process Algebra and Non-Interference.
Journal of Computer Security 9(1/2): 75-103 (2001) |
2000 |
9 | EE | Peter Y. A. Ryan:
Mathematical Models of Computer Security.
FOSAD 2000: 1-62 |
8 | EE | Peter Y. A. Ryan:
Open Questions (Transcript of Discussion).
Security Protocols Workshop 2000: 49-53 |
7 | EE | Steve Schneider,
Peter Ryan:
Preface.
Electr. Notes Theor. Comput. Sci. 32: (2000) |
6 | EE | Peter Y. A. Ryan:
Process Algebra and Information Flow.
Electr. Notes Theor. Comput. Sci. 40: (2000) |
1999 |
5 | EE | Peter Y. A. Ryan,
Steve A. Schneider:
Process Algebra and Non-Interference.
CSFW 1999: 214-227 |
1998 |
4 | EE | Peter Y. A. Ryan,
Dieter Gollmann,
Li Gong,
Günter Karjoth,
Chris J. Mitchell:
Panel Introduction: The Security Impact of Distributed Computing Technologies.
CSFW 1998: 164-166 |
3 | EE | Peter Y. A. Ryan,
Steve A. Schneider:
An Attack on a Recursive Authentication Protocol. A Cautionary Tale.
Inf. Process. Lett. 65(1): 7-10 (1998) |
1996 |
2 | EE | Peter Ryan:
A Genealogy of Non-Interference.
CSFW 1996: 158- |
1991 |
1 | EE | Dan Craigen,
Peter Ryan:
FM91: Formal Methods Workshop.
ICSE 1991: 140-142 |