Peter Ryan
University of Luxembourg
List of publications from the DBLP Bibliography Server - FAQ
2010 | ||
---|---|---|
50 | Ali Nasrat Haidar, P. V. Coveney, Ali E. Abdallah, Peter Y. A. Ryan, B. Beckles, J. M. Brooke, M. A. S. Jones: Formal Modelling of a Usable Identity Management Solution for Virtual Organisations CoRR abs/1001.5050: (2010) | |
2009 | ||
49 | Peter Y. A. Ryan, Berry Schoenmakers: E-Voting and Identity, Second International Conference, VOTE-ID 2009, Luxembourg, September 7-8, 2009. Proceedings Springer 2009 | |
48 | Peter Y. A. Ryan: How Many Election Officials Does It Take to Change an Election? ARSPA-WITS 2009: 211-221 | |
47 | Giampaolo Bella, Peter Y. A. Ryan: Journal of Computer SecuritySpecial Number devoted to the best papers of the Security Track at the 2006 ACM Symposium on Applied Computing. Journal of Computer Security 17(3): 237 (2009) | |
2008 | ||
46 | David Chaum, Miroslaw Kutylowski, Ronald L. Rivest, Peter Y. A. Ryan: Frontiers of Electronic Voting, 29.07. - 03.08.2007 Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany 2008 | |
45 | David Lundin, Peter Y. A. Ryan: Human Readable Paper Verification of Prêt à Voter. ESORICS 2008: 379-395 | |
44 | David Chaum, Richard Carback, Jeremy Clark, Aleksander Essex, Stefan Popoveniuc, Ronald L. Rivest, Peter Y. A. Ryan, Emily Shen, Alan T. Sherman: Scantegrity II: End-to-End Verifiability for Optical Scan Election Systems using Invisible Ink Confirmation Codes. EVT 2008 | |
43 | Roberto Araujo, Peter Y. A. Ryan: Improving the Farnel Voting Scheme. Electronic Voting 2008: 169-184 | |
42 | Jeremy Bryans, Maciej Koutny, Laurent Mazaré, Peter Y. A. Ryan: Opacity generalised to transition systems. Int. J. Inf. Sec. 7(6): 421-435 (2008) | |
2007 | ||
41 | Theodosis Dimitrakos, Fabio Martinelli, Peter Y. A. Ryan, Steve A. Schneider: Formal Aspects in Security and Trust, Fourth International Workshop, FAST 2006, Hamilton, Ontario, Canada, August 26-27, 2006, Revised Selected Papers Springer 2007 | |
40 | David Chaum, Miroslaw Kutylowski, Ronald L. Rivest, Peter Y. A. Ryan: 07311 Abstracts Collection -- Frontiers of Electronic Voting. Frontiers of Electronic Voting 2007 | |
39 | David Chaum, Miroslaw Kutylowski, Ronald L. Rivest, Peter Y. A. Ryan: 07311 Executive Summary -- Frontiers of Electronic Voting. Frontiers of Electronic Voting 2007 | |
38 | Theodosis Dimitrakos, Fabio Martinelli, Peter Y. A. Ryan, Steve Schneider: Guest Editors' Preface. Int. J. Inf. Sec. 6(2-3): 65-66 (2007) | |
2006 | ||
37 | Theodosis Dimitrakos, Fabio Martinelli, Peter Y. A. Ryan, Steve A. Schneider: Formal Aspects in Security and Trust, Third International Workshop, FAST 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected Papers Springer 2006 | |
36 | Jeremy Bryans, Bev Littlewood, Peter Y. A. Ryan, Lorenzo Strigini: E-voting: Dependability Requirements and Design for Dependability. ARES 2006: 988-995 | |
35 | Peter Y. A. Ryan, Steve A. Schneider: Prêt à Voter with Re-encryption Mixes. ESORICS 2006: 313-326 | |
34 | Giampaolo Bella, Peter Y. A. Ryan: Editorial message: special track on computer security. SAC 2006: 321-322 | |
33 | Peter Y. A. Ryan, Thea Peacock: Putting the Human Back in Voting Protocols. Security Protocols Workshop 2006: 13-19 | |
32 | Peter Y. A. Ryan: Putting the Human Back in Voting Protocols. Security Protocols Workshop 2006: 20-25 | |
31 | Brian Randell, Peter Y. A. Ryan: Voting Technologies and Trust. IEEE Security & Privacy 4(5): 50-56 (2006) | |
2005 | ||
30 | Peter Ryan: Prospects for E-Voting. COMPSAC (1) 2005: 501 | |
29 | David Chaum, Peter Y. A. Ryan, Steve A. Schneider: A Practical Voter-Verifiable Election Scheme. ESORICS 2005: 118-139 | |
28 | Brian Randell, Peter Y. A. Ryan: Voting Technologies and Trust. Formal Aspects in Security and Trust 2005: 1-4 | |
27 | Jeremy Bryans, Maciej Koutny, Laurent Mazaré, Peter Y. A. Ryan: Opacity Generalised to Transition Systems. Formal Aspects in Security and Trust 2005: 81-95 | |
26 | Giampaolo Bella, Peter Y. A. Ryan: Special track on computer security. SAC 2005: 304-305 | |
25 | Peter Y. A. Ryan: A variant of the Chaum voter-verifiable scheme. WITS 2005: 81-88 | |
24 | Jeremy Bryans, Maciej Koutny, Peter Y. A. Ryan: Modelling Opacity Using Petri Nets. Electr. Notes Theor. Comput. Sci. 121: 101-115 (2005) | |
23 | Terry Butler, Peter Ryan, Tracy Chao: Gender and Technology in the Liberal Arts: Aptitudes, Attitudes, and Skills Acquisition. JITE 4: 347-362 (2005) | |
22 | Giampaolo Bella, Peter Y. A. Ryan: Guest Editors' preface. Journal of Computer Security 13(5): 697- (2005) | |
2004 | ||
21 | Pierangela Samarati, Peter Y. A. Ryan, Dieter Gollmann, Refik Molva: Computer Security - ESORICS 2004, 9th European Symposium on Research Computer Security, Sophia Antipolis, France, September 13-15, 2004, Proceedings Springer 2004 | |
20 | Peter Y. A. Ryan: Shedding Light on Haunted Corners of Information Security. 25 Years Communicating Sequential Processes 2004: 264-264 | |
19 | Robert J. Stroud, Ian S. Welch, John P. Warne, Peter Y. A. Ryan: A Qualitative Analysis of the Intrusion-Tolerance Capabilities of the MAFTIA Architecture. DSN 2004: 453- | |
18 | Peter Y. A. Ryan: Of Elections and Electrons. FORMATS/FTRTFT 2004: 3-4 | |
17 | Jeremy Bryans, Maciej Koutny, Peter Y. A. Ryan: Modelling Dynamic Opacity Using Petri Nets with Silent Actions. Formal Aspects in Security and Trust 2004: 159-172 | |
16 | Giampaolo Bella, Peter Ryan: Editoral message: special track on computer security. SAC 2004: 373-374 | |
2003 | ||
15 | Ali E. Abdallah, Peter Ryan, Steve Schneider: Formal Aspects of Security, First International Conference, FASec 2002, London, UK, December 16-18, 2002, Revised Papers Springer 2003 | |
14 | Peter Y. A. Ryan: Enforcing the Unenforceable. Security Protocols Workshop 2003: 178-182 | |
13 | Tracy Chao, Terry Butler, Peter Ryan: Providing a Technology Edge for Liberal Arts Students. JITE 2: 331-348 (2003) | |
2002 | ||
12 | Peter Ryan, Ragni Ryvold Arnesen: A Process Algebraic Approach to Security Policies. DBSec 2002: 301-312 | |
2001 | ||
11 | Peter Ryan, John D. McLean, Jonathan K. Millen, Virgil D. Gligor: Non-Interference: Who Needs It? CSFW 2001: 237- | |
10 | Peter Y. A. Ryan, Steve A. Schneider: Process Algebra and Non-Interference. Journal of Computer Security 9(1/2): 75-103 (2001) | |
2000 | ||
9 | Peter Y. A. Ryan: Mathematical Models of Computer Security. FOSAD 2000: 1-62 | |
8 | Peter Y. A. Ryan: Open Questions (Transcript of Discussion). Security Protocols Workshop 2000: 49-53 | |
7 | Steve Schneider, Peter Ryan: Preface. Electr. Notes Theor. Comput. Sci. 32: (2000) | |
6 | Peter Y. A. Ryan: Process Algebra and Information Flow. Electr. Notes Theor. Comput. Sci. 40: (2000) | |
1999 | ||
5 | Peter Y. A. Ryan, Steve A. Schneider: Process Algebra and Non-Interference. CSFW 1999: 214-227 | |
1998 | ||
4 | Peter Y. A. Ryan, Dieter Gollmann, Li Gong, Günter Karjoth, Chris J. Mitchell: Panel Introduction: The Security Impact of Distributed Computing Technologies. CSFW 1998: 164-166 | |
3 | Peter Y. A. Ryan, Steve A. Schneider: An Attack on a Recursive Authentication Protocol. A Cautionary Tale. Inf. Process. Lett. 65(1): 7-10 (1998) | |
1996 | ||
2 | Peter Ryan: A Genealogy of Non-Interference. CSFW 1996: 158- | |
1991 | ||
1 | Dan Craigen, Peter Ryan: FM91: Formal Methods Workshop. ICSE 1991: 140-142 |