Peter Ryan
University of Luxembourg
List of publications from the DBLP Bibliography Server - FAQ
![]() | 2010 | |
---|---|---|
50 | ![]() ![]() ![]() ![]() ![]() ![]() | Ali Nasrat Haidar, P. V. Coveney, Ali E. Abdallah, Peter Y. A. Ryan, B. Beckles, J. M. Brooke, M. A. S. Jones: Formal Modelling of a Usable Identity Management Solution for Virtual Organisations CoRR abs/1001.5050: (2010) |
2009 | ||
49 | ![]() ![]() ![]() ![]() ![]() ![]() | Peter Y. A. Ryan, Berry Schoenmakers: E-Voting and Identity, Second International Conference, VOTE-ID 2009, Luxembourg, September 7-8, 2009. Proceedings Springer 2009 |
48 | ![]() ![]() ![]() ![]() ![]() ![]() | Peter Y. A. Ryan: How Many Election Officials Does It Take to Change an Election? ARSPA-WITS 2009: 211-221 |
47 | ![]() ![]() ![]() ![]() ![]() ![]() | Giampaolo Bella, Peter Y. A. Ryan: Journal of Computer SecuritySpecial Number devoted to the best papers of the Security Track at the 2006 ACM Symposium on Applied Computing. Journal of Computer Security 17(3): 237 (2009) |
2008 | ||
46 | ![]() ![]() ![]() ![]() ![]() ![]() | David Chaum, Miroslaw Kutylowski, Ronald L. Rivest, Peter Y. A. Ryan: Frontiers of Electronic Voting, 29.07. - 03.08.2007 Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany 2008 |
45 | ![]() ![]() ![]() ![]() ![]() ![]() | David Lundin, Peter Y. A. Ryan: Human Readable Paper Verification of Prêt à Voter. ESORICS 2008: 379-395 |
44 | ![]() ![]() ![]() ![]() ![]() ![]() | David Chaum, Richard Carback, Jeremy Clark, Aleksander Essex, Stefan Popoveniuc, Ronald L. Rivest, Peter Y. A. Ryan, Emily Shen, Alan T. Sherman: Scantegrity II: End-to-End Verifiability for Optical Scan Election Systems using Invisible Ink Confirmation Codes. EVT 2008 |
43 | ![]() ![]() ![]() ![]() ![]() ![]() | Roberto Araujo, Peter Y. A. Ryan: Improving the Farnel Voting Scheme. Electronic Voting 2008: 169-184 |
42 | ![]() ![]() ![]() ![]() ![]() ![]() | Jeremy Bryans, Maciej Koutny, Laurent Mazaré, Peter Y. A. Ryan: Opacity generalised to transition systems. Int. J. Inf. Sec. 7(6): 421-435 (2008) |
2007 | ||
41 | ![]() ![]() ![]() ![]() ![]() ![]() | Theodosis Dimitrakos, Fabio Martinelli, Peter Y. A. Ryan, Steve A. Schneider: Formal Aspects in Security and Trust, Fourth International Workshop, FAST 2006, Hamilton, Ontario, Canada, August 26-27, 2006, Revised Selected Papers Springer 2007 |
40 | ![]() ![]() ![]() ![]() ![]() ![]() | David Chaum, Miroslaw Kutylowski, Ronald L. Rivest, Peter Y. A. Ryan: 07311 Abstracts Collection -- Frontiers of Electronic Voting. Frontiers of Electronic Voting 2007 |
39 | ![]() ![]() ![]() ![]() ![]() ![]() | David Chaum, Miroslaw Kutylowski, Ronald L. Rivest, Peter Y. A. Ryan: 07311 Executive Summary -- Frontiers of Electronic Voting. Frontiers of Electronic Voting 2007 |
38 | ![]() ![]() ![]() ![]() ![]() ![]() | Theodosis Dimitrakos, Fabio Martinelli, Peter Y. A. Ryan, Steve Schneider: Guest Editors' Preface. Int. J. Inf. Sec. 6(2-3): 65-66 (2007) |
2006 | ||
37 | ![]() ![]() ![]() ![]() ![]() ![]() | Theodosis Dimitrakos, Fabio Martinelli, Peter Y. A. Ryan, Steve A. Schneider: Formal Aspects in Security and Trust, Third International Workshop, FAST 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected Papers Springer 2006 |
36 | ![]() ![]() ![]() ![]() ![]() ![]() | Jeremy Bryans, Bev Littlewood, Peter Y. A. Ryan, Lorenzo Strigini: E-voting: Dependability Requirements and Design for Dependability. ARES 2006: 988-995 |
35 | ![]() ![]() ![]() ![]() ![]() ![]() | Peter Y. A. Ryan, Steve A. Schneider: Prêt à Voter with Re-encryption Mixes. ESORICS 2006: 313-326 |
34 | ![]() ![]() ![]() ![]() ![]() ![]() | Giampaolo Bella, Peter Y. A. Ryan: Editorial message: special track on computer security. SAC 2006: 321-322 |
33 | ![]() ![]() ![]() ![]() ![]() ![]() | Peter Y. A. Ryan, Thea Peacock: Putting the Human Back in Voting Protocols. Security Protocols Workshop 2006: 13-19 |
32 | ![]() ![]() ![]() ![]() ![]() ![]() | Peter Y. A. Ryan: Putting the Human Back in Voting Protocols. Security Protocols Workshop 2006: 20-25 |
31 | ![]() ![]() ![]() ![]() ![]() ![]() | Brian Randell, Peter Y. A. Ryan: Voting Technologies and Trust. IEEE Security & Privacy 4(5): 50-56 (2006) |
2005 | ||
30 | ![]() ![]() ![]() ![]() ![]() ![]() | Peter Ryan: Prospects for E-Voting. COMPSAC (1) 2005: 501 |
29 | ![]() ![]() ![]() ![]() ![]() ![]() | David Chaum, Peter Y. A. Ryan, Steve A. Schneider: A Practical Voter-Verifiable Election Scheme. ESORICS 2005: 118-139 |
28 | ![]() ![]() ![]() ![]() ![]() ![]() | Brian Randell, Peter Y. A. Ryan: Voting Technologies and Trust. Formal Aspects in Security and Trust 2005: 1-4 |
27 | ![]() ![]() ![]() ![]() ![]() ![]() | Jeremy Bryans, Maciej Koutny, Laurent Mazaré, Peter Y. A. Ryan: Opacity Generalised to Transition Systems. Formal Aspects in Security and Trust 2005: 81-95 |
26 | ![]() ![]() ![]() ![]() ![]() ![]() | Giampaolo Bella, Peter Y. A. Ryan: Special track on computer security. SAC 2005: 304-305 |
25 | ![]() ![]() ![]() ![]() ![]() ![]() | Peter Y. A. Ryan: A variant of the Chaum voter-verifiable scheme. WITS 2005: 81-88 |
24 | ![]() ![]() ![]() ![]() ![]() ![]() | Jeremy Bryans, Maciej Koutny, Peter Y. A. Ryan: Modelling Opacity Using Petri Nets. Electr. Notes Theor. Comput. Sci. 121: 101-115 (2005) |
23 | ![]() ![]() ![]() ![]() ![]() ![]() | Terry Butler, Peter Ryan, Tracy Chao: Gender and Technology in the Liberal Arts: Aptitudes, Attitudes, and Skills Acquisition. JITE 4: 347-362 (2005) |
22 | ![]() ![]() ![]() ![]() ![]() ![]() | Giampaolo Bella, Peter Y. A. Ryan: Guest Editors' preface. Journal of Computer Security 13(5): 697- (2005) |
2004 | ||
21 | ![]() ![]() ![]() ![]() ![]() ![]() | Pierangela Samarati, Peter Y. A. Ryan, Dieter Gollmann, Refik Molva: Computer Security - ESORICS 2004, 9th European Symposium on Research Computer Security, Sophia Antipolis, France, September 13-15, 2004, Proceedings Springer 2004 |
20 | ![]() ![]() ![]() ![]() ![]() ![]() | Peter Y. A. Ryan: Shedding Light on Haunted Corners of Information Security. 25 Years Communicating Sequential Processes 2004: 264-264 |
19 | ![]() ![]() ![]() ![]() ![]() ![]() | Robert J. Stroud, Ian S. Welch, John P. Warne, Peter Y. A. Ryan: A Qualitative Analysis of the Intrusion-Tolerance Capabilities of the MAFTIA Architecture. DSN 2004: 453- |
18 | ![]() ![]() ![]() ![]() ![]() ![]() | Peter Y. A. Ryan: Of Elections and Electrons. FORMATS/FTRTFT 2004: 3-4 |
17 | ![]() ![]() ![]() ![]() ![]() ![]() | Jeremy Bryans, Maciej Koutny, Peter Y. A. Ryan: Modelling Dynamic Opacity Using Petri Nets with Silent Actions. Formal Aspects in Security and Trust 2004: 159-172 |
16 | ![]() ![]() ![]() ![]() ![]() ![]() | Giampaolo Bella, Peter Ryan: Editoral message: special track on computer security. SAC 2004: 373-374 |
2003 | ||
15 | ![]() ![]() ![]() ![]() ![]() ![]() | Ali E. Abdallah, Peter Ryan, Steve Schneider: Formal Aspects of Security, First International Conference, FASec 2002, London, UK, December 16-18, 2002, Revised Papers Springer 2003 |
14 | ![]() ![]() ![]() ![]() ![]() ![]() | Peter Y. A. Ryan: Enforcing the Unenforceable. Security Protocols Workshop 2003: 178-182 |
13 | ![]() ![]() ![]() ![]() ![]() ![]() | Tracy Chao, Terry Butler, Peter Ryan: Providing a Technology Edge for Liberal Arts Students. JITE 2: 331-348 (2003) |
2002 | ||
12 | ![]() ![]() ![]() ![]() ![]() ![]() | Peter Ryan, Ragni Ryvold Arnesen: A Process Algebraic Approach to Security Policies. DBSec 2002: 301-312 |
2001 | ||
11 | ![]() ![]() ![]() ![]() ![]() ![]() | Peter Ryan, John D. McLean, Jonathan K. Millen, Virgil D. Gligor: Non-Interference: Who Needs It? CSFW 2001: 237- |
10 | ![]() ![]() ![]() ![]() ![]() ![]() | Peter Y. A. Ryan, Steve A. Schneider: Process Algebra and Non-Interference. Journal of Computer Security 9(1/2): 75-103 (2001) |
2000 | ||
9 | ![]() ![]() ![]() ![]() ![]() ![]() | Peter Y. A. Ryan: Mathematical Models of Computer Security. FOSAD 2000: 1-62 |
8 | ![]() ![]() ![]() ![]() ![]() ![]() | Peter Y. A. Ryan: Open Questions (Transcript of Discussion). Security Protocols Workshop 2000: 49-53 |
7 | ![]() ![]() ![]() ![]() ![]() ![]() | Steve Schneider, Peter Ryan: Preface. Electr. Notes Theor. Comput. Sci. 32: (2000) |
6 | ![]() ![]() ![]() ![]() ![]() ![]() | Peter Y. A. Ryan: Process Algebra and Information Flow. Electr. Notes Theor. Comput. Sci. 40: (2000) |
1999 | ||
5 | ![]() ![]() ![]() ![]() ![]() ![]() | Peter Y. A. Ryan, Steve A. Schneider: Process Algebra and Non-Interference. CSFW 1999: 214-227 |
1998 | ||
4 | ![]() ![]() ![]() ![]() ![]() ![]() | Peter Y. A. Ryan, Dieter Gollmann, Li Gong, Günter Karjoth, Chris J. Mitchell: Panel Introduction: The Security Impact of Distributed Computing Technologies. CSFW 1998: 164-166 |
3 | ![]() ![]() ![]() ![]() ![]() ![]() | Peter Y. A. Ryan, Steve A. Schneider: An Attack on a Recursive Authentication Protocol. A Cautionary Tale. Inf. Process. Lett. 65(1): 7-10 (1998) |
1996 | ||
2 | ![]() ![]() ![]() ![]() ![]() ![]() | Peter Ryan: A Genealogy of Non-Interference. CSFW 1996: 158- |
1991 | ||
1 | ![]() ![]() ![]() ![]() ![]() ![]() | Dan Craigen, Peter Ryan: FM91: Formal Methods Workshop. ICSE 1991: 140-142 |