


Остановите войну!
for scientists:


default search action
Peter Y. A. Ryan
Peter Ryan 0001
Person information

- affiliation: University of Luxembourg
Other persons with the same name
- Peter Ryan — disambiguation page
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j26]Constantin Catalin Dragan
, François Dupressoir
, Ehsan Estaji, Kristian Gjøsteen, Thomas Haines, Peter Y. A. Ryan
, Peter B. Rønne
, Morten Rotvold Solberg:
Machine-checked proofs of privacy against malicious boards for Selene & Co. J. Comput. Secur. 31(5): 469-499 (2023) - [c114]Fatima-Ezzahra El Orche, Marcel Hollenstein, Sarah Houdaigoui, David Naccache, Daria Pchelina, Peter B. Rønne, Peter Y. A. Ryan, Julien Weibel, Robert Weil:
Taphonomical Security: DNA Information with a Foreseeable Lifespan. FICC (2) 2023: 674-694 - [i41]Wojciech Jamroga, Peter Y. A. Ryan, Steve Schneider, Carsten Schürmann, Philip B. Stark:
A Declaration of Software Independence. CoRR abs/2311.03372 (2023) - 2022
- [j25]Isa Sertkaya
, Peter B. Rønne, Peter Y. A. Ryan:
Estonian Internet voting with anonymous credentials. Turkish J. Electr. Eng. Comput. Sci. 30(2): 420-435 (2022) - [j24]Hao Cheng, Georgios Fotiadis, Johann Großschädl, Peter Y. A. Ryan:
Highly Vectorized SIKE for AVX-512. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(2): 41-68 (2022) - [c113]Constantin Catalin Dragan, François Dupressoir, Ehsan Estaji, Kristian Gjøsteen, Thomas Haines, Peter Y. A. Ryan
, Peter B. Rønne
, Morten Rotvold Solberg:
Machine-Checked Proofs of Privacy Against Malicious Boards for Selene & Co. CSF 2022: 335-347 - [c112]Fatima-Ezzahra El Orche, Rémi Géraud-Stewart
, Peter B. Rønne
, Gergei Bana, David Naccache, Peter Y. A. Ryan
, Marco Biroli, Megi Dervishi, Hugo Waltsburger:
Time, Privacy, Robustness, Accuracy: Trade-Offs for the Open Vote Network Protocol. E-Vote-ID 2022: 19-35 - [e18]Peter Y. A. Ryan
, Cristian Toma
:
Innovative Security Solutions for Information Technology and Communications - 14th International Conference, SecITC 2021, Virtual Event, November 25-26, 2021, Revised Selected Papers. Lecture Notes in Computer Science 13195, Springer 2022, ISBN 978-3-031-17509-1 [contents] - [i40]Wojciech Jamroga
, Peter Y. A. Ryan, Yan Kim:
Verification of the Socio-Technical Aspects of Voting: The Case of the Polish Postal Vote 2020. CoRR abs/2210.10694 (2022) - [i39]Constantin Catalin Dragan, François Dupressoir, Ehsan Estaji, Kristian Gjøsteen, Thomas Haines, Peter Y. A. Ryan, Peter B. Rønne, Morten Rotvold Solberg:
Machine-Checked Proofs of Privacy Against Malicious Boards for Selene & Co. IACR Cryptol. ePrint Arch. 2022: 1182 (2022) - 2021
- [j23]Ellis Fenske, Dane Brown, Jeremy Martin, Travis Mayberry, Peter Ryan, Erik C. Rye:
Three Years Later: A Study of MAC Address Randomization In Mobile Devices And When It Succeeds. Proc. Priv. Enhancing Technol. 2021(3): 164-181 (2021) - [j22]Hao Cheng, Georgios Fotiadis, Johann Großschädl, Peter Y. A. Ryan, Peter B. Rønne
:
Batching CSIDH Group Actions using AVX-512. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(4): 618-649 (2021) - [j21]Karola Marky, Marie-Laure Zollinger
, Peter B. Roenne
, Peter Y. A. Ryan, Tim Grube
, Kai Kunze:
Investigating Usability and User Experience of Individually Verifiable Internet Voting Schemes. ACM Trans. Comput. Hum. Interact. 28(5): 30:1-30:36 (2021) - [c111]Geoffroy Couteau, A. W. Roscoe, Peter Y. A. Ryan:
Partially-Fair Computation from Timed-Release Encryption and Oblivious Transfer. ACISP 2021: 330-349 - [c110]Wojciech Jamroga
, Peter Y. A. Ryan, Steve Schneider, Carsten Schürmann, Philip B. Stark:
A Declaration of Software Independence. Protocols, Strands, and Logic 2021: 198-217 - [c109]Hao Cheng, Johann Großschädl, Peter B. Rønne
, Peter Y. A. Ryan:
AVRNTRU: Lightweight NTRU-based Post-Quantum Cryptography for 8-bit AVR Microcontrollers. DATE 2021: 1272-1277 - [c108]Peter Y. A. Ryan
, Peter B. Roenne
, Dimiter Ostrev
, Fatima-Ezzahra El Orche, Najmeh Soroush
, Philip B. Stark
:
Who Was that Masked Voter? The Tally Won't Tell! E-VOTE-ID 2021: 106-123 - [c107]Marie-Laure Zollinger
, Ehsan Estaji, Peter Y. A. Ryan, Karola Marky:
"Just for the Sake of Transparency": Exploring Voter Mental Models of Verifiability. E-VOTE-ID 2021: 155-170 - [c106]Peter B. Rønne
, Peter Y. A. Ryan, Ben Smyth:
Cast-as-Intended: A Formal Definition and Case Studies. Financial Cryptography Workshops 2021: 251-262 - [c105]Georgios Fotiadis
, José Moreira
, Thanassis Giannetsos
, Liqun Chen
, Peter B. Rønne
, Mark Ryan
, Peter Y. A. Ryan
:
Root-of-Trust Abstractions for Symbolic Analysis: Application to Attestation Protocols. STM 2021: 163-184 - [i38]Gergei Bana, Wojciech Jamroga, David Naccache, Peter Y. A. Ryan:
Convergence Voting: From Pairwise Comparisons to Consensus. CoRR abs/2102.01995 (2021) - [i37]Peter B. Rønne, Peter Y. A. Ryan, Marie-Laure Zollinger:
Electryo, In-person Voting with Transparent Voter Verifiability and Eligibility Verifiability. CoRR abs/2105.14783 (2021) - [i36]Marie-Laure Zollinger, Verena Distler, Peter B. Rønne, Peter Y. A. Ryan, Carine Lallemand, Vincent Koenig:
User Experience Design for E-Voting: How mental models align with security mechanisms. CoRR abs/2105.14901 (2021) - [i35]Itzel Vázquez Sandoval, Arash Atashpendar, Gabriele Lenzini, Peter Y. A. Ryan:
PakeMail: authentication and key management in decentralized secure email and messaging via PAKE. CoRR abs/2107.06090 (2021) - [i34]Michel Abdalla, Manuel Barbosa, Peter B. Rønne, Peter Y. A. Ryan, Petra Sala:
Security Characterization of J-PAKE and its Variants. IACR Cryptol. ePrint Arch. 2021: 824 (2021) - [i33]Gergei Bana, Marco Biroli, Megi Dervishi, Fatima-Ezzahra El Orche, Rémi Géraud-Stewart, David Naccache, Peter B. Rønne, Peter Y. A. Ryan, Hugo Waltsburger:
Time, Privacy, Robustness, Accuracy: Trade Offs for the Open Vote Network Protocol. IACR Cryptol. ePrint Arch. 2021: 1065 (2021) - [i32]Fatima-Ezzahra El Orche, Marcel Hollenstein, Sarah Houdaigoui, David Naccache, Daria Pchelina, Peter B. Rønne, Peter Y. A. Ryan, Julien Weibel, Robert Weil:
Taphonomical Security: (DNA) Information with Foreseeable Lifespan. IACR Cryptol. ePrint Arch. 2021: 1066 (2021) - [i31]Marcel Hollenstein, David Naccache, Peter B. Rønne, Peter Y. A. Ryan, Robert Weil, Ofer Yifrach-Stav:
Preservation of DNA Privacy During the Large Scale Detection of COVID. IACR Cryptol. ePrint Arch. 2021: 1108 (2021) - 2020
- [c104]Hao Cheng, Johann Großschädl, Peter B. Rønne
, Peter Y. A. Ryan:
Lightweight Post-quantum Key Encapsulation for 8-bit AVR Microcontrollers. CARDIS 2020: 18-33 - [c103]Vincenzo Iovino, Alfredo Rial, Peter B. Rønne
, Peter Y. A. Ryan:
Universal Unconditional Verifiability in E-Voting without Trusted Parties. CSF 2020: 33-48 - [c102]Ehsan Estaji, Thomas Haines, Kristian Gjøsteen, Peter B. Rønne
, Peter Y. A. Ryan, Najmeh Soroush:
Revisiting Practical and Usable Coercion-Resistant Remote E-Voting. E-VOTE-ID 2020: 50-66 - [c101]Wojciech Jamroga
, Yan Kim, Damian Kurpiewski, Peter Y. A. Ryan:
Towards Model Checking of Voting Protocols in Uppaal. E-VOTE-ID 2020: 129-146 - [c100]Marie-Laure Zollinger
, Peter B. Rønne
, Peter Y. A. Ryan:
Short Paper: Mechanized Proofs of Verifiability and Privacy in a Paper-Based E-Voting Scheme. Financial Cryptography Workshops 2020: 310-318 - [c99]Itzel Vázquez Sandoval, Arash Atashpendar, Gabriele Lenzini, Peter Y. A. Ryan:
PakeMail: Authentication and Key Management in Decentralized Secure Email and Messaging via PAKE. ICETE (Selected Papers) 2020: 102-128 - [c98]Najmeh Soroush, Vincenzo Iovino, Alfredo Rial, Peter B. Rønne
, Peter Y. A. Ryan:
Verifiable Inner Product Encryption Scheme. Public Key Cryptography (1) 2020: 65-94 - [c97]Hao Cheng, Johann Großschädl, Jiaqi Tian, Peter B. Rønne
, Peter Y. A. Ryan:
High-Throughput Elliptic Curve Cryptography Using AVX2 Vector Instructions. SAC 2020: 698-719 - [i30]Marcel Hollenstein, David Naccache, Peter B. Rønne, Peter Y. A. Ryan, Robert Weil, Ofer Yifrach-Stav:
Preservation of DNA Privacy During the Large Scale Detection of COVID-19. CoRR abs/2007.09085 (2020) - [i29]Wojciech Jamroga, Yan Kim, Damian Kurpiewski, Peter Y. A. Ryan:
Model Checkers Are Cool: How to Model Check Voting Protocols in Uppaal. CoRR abs/2007.12412 (2020) - [i28]Wojciech Jamroga, David Mestel, Peter B. Rønne, Peter Y. A. Ryan, Marjan Skrobot:
A Survey of Requirements for COVID-19 Mitigation Strategies. Part I: Newspaper Clips. CoRR abs/2011.07887 (2020) - [i27]Najmeh Soroush, Vincenzo Iovino, Alfredo Rial, Peter B. Rønne, Peter Y. A. Ryan:
Verifiable Inner Product Encryption Scheme. IACR Cryptol. ePrint Arch. 2020: 122 (2020) - [i26]Jintai Ding, Doug Emery, Johannes Müller, Peter Y. A. Ryan, Vonn Kee Wong:
Post-Quantum Anonymous Veto Networks. IACR Cryptol. ePrint Arch. 2020: 1023 (2020)
2010 – 2019
- 2019
- [c96]Verena Distler
, Marie-Laure Zollinger
, Carine Lallemand
, Peter B. Rønne
, Peter Y. A. Ryan
, Vincent Koenig:
Security - Visible, Yet Unseen? CHI 2019: 605 - [c95]Ziya Alper Genç, Gabriele Lenzini, Peter Y. A. Ryan:
NoCry: No More Secure Encryption Keys for Cryptographic Ransomware. ETAA@ESORICS 2019: 69-85 - [c94]Karola Marky
, Marie-Laure Zollinger
, Markus Funk
, Peter Y. A. Ryan, Max Mühlhäuser
:
How to Assess the Usability Metrics of E-Voting Schemes. Financial Cryptography Workshops 2019: 257-271 - [c93]Jun Wang, Qiang Tang
, Afonso Arriaga
, Peter Y. A. Ryan:
Novel Collaborative Filtering Recommender Friendly to Privacy Protection. IJCAI 2019: 4809-4815 - [c92]José Becerra, Peter Y. A. Ryan
, Petra Sala, Marjan Skrobot
:
An Offline Dictionary Attack Against zkPAKE Protocol. SEC 2019: 81-90 - [c91]Marc Beunardeau, Fatima-Ezzahra El Orche, Diana Maimut
, David Naccache, Peter B. Rønne
, Peter Y. A. Ryan:
Authenticated Key Distribution: When the Coupon Collector is Your Enemy. SECITC 2019: 1-20 - [c90]Wojciech Jamroga
, Peter B. Rønne
, Peter Y. A. Ryan, Philip B. Stark:
Risk-Limiting Tallies. E-VOTE-ID 2019: 183-199 - [c89]Hao Cheng, Daniel Dinu, Johann Großschädl, Peter B. Rønne
, Peter Y. A. Ryan:
A Lightweight Implementation of NTRU Prime for the Post-quantum Internet of Things. WISTP 2019: 103-119 - [e17]Kazue Sako, Steve A. Schneider, Peter Y. A. Ryan:
Computer Security - ESORICS 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part I. Lecture Notes in Computer Science 11735, Springer 2019, ISBN 978-3-030-29958-3 [contents] - [e16]Kazue Sako, Steve A. Schneider, Peter Y. A. Ryan:
Computer Security - ESORICS 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part II. Lecture Notes in Computer Science 11736, Springer 2019, ISBN 978-3-030-29961-3 [contents] - [i25]Peter B. Rønne, Arash Atashpendar, Kristian Gjøsteen, Peter Y. A. Ryan:
Coercion-Resistant Voting in Linear Time via Fully Homomorphic Encryption: Towards a Quantum-Safe Scheme. CoRR abs/1901.02560 (2019) - [i24]Brian Thompson, Dave Cedel, Jeremy Martin, Peter Y. A. Ryan, Sarah Kern:
Fusion of Mobile Device Signal Data Attributes Enables Multi-Protocol Entity Resolution and Enhanced Large-Scale Tracking. CoRR abs/1906.02686 (2019) - [i23]Wojciech Jamroga, Peter B. Rønne, Peter Y. A. Ryan, Philip B. Stark:
Risk-Limiting Tallies. CoRR abs/1908.04947 (2019) - [i22]Geoffroy Couteau, Bill Roscoe, Peter Y. A. Ryan:
Partially-Fair Computation from Timed-Release Encryption and Oblivious Transfer. IACR Cryptol. ePrint Arch. 2019: 1281 (2019) - [i21]Marc Beunardeau, Fatima-Ezzahra El Orche, Diana Maimut, David Naccache, Peter B. Rønne, Peter Y. A. Ryan:
Authenticated Key Distribution: When the Coupon Collector is Your Enemy. IACR Cryptol. ePrint Arch. 2019: 1499 (2019) - 2018
- [c88]Jun Wang, Afonso Arriaga, Qiang Tang
, Peter Y. A. Ryan:
Facilitating Privacy-preserving Recommendation-as-a-Service with Machine Learning. CCS 2018: 2306-2308 - [c87]Ziya Alper Genç, Gabriele Lenzini
, Peter Y. A. Ryan
:
Security Analysis of Key Acquiring Strategies Used by Cryptographic Ransomware. CECC 2018: 7:1-7:6 - [c86]Ziya Alper Genç, Gabriele Lenzini, Peter Y. A. Ryan
:
No Random, No Ransom: A Key to Stop Cryptographic Ransomware. DIMVA 2018: 234-255 - [c85]Ziya Alper Genç, Gabriele Lenzini
, Peter Y. A. Ryan, Itzel Vázquez Sandoval:
A Security Analysis, and a Fix, of a Code-Corrupted Honeywords System. ICISSP 2018: 83-95 - [c84]Ziya Alper Genç, Gabriele Lenzini, Peter Y. A. Ryan
, Itzel Vázquez Sandoval:
A Critical Security Analysis of the Password-Based Authentication Honeywords System Under Code-Corruption Attack. ICISSP (Revised Selected Papers) 2018: 125-151 - [c83]Arash Atashpendar, Guru-Vamsi Policharla, Peter B. Rønne
, Peter Y. A. Ryan
:
Revisiting Deniability in Quantum Key Exchange - via Covert Communication and Entanglement Distillation. NordSec 2018: 104-120 - [c82]Ziya Alper Genç
, Gabriele Lenzini
, Peter Y. A. Ryan
:
Next Generation Cryptographic Ransomware. NordSec 2018: 385-401 - [c81]José Becerra, Peter B. Rønne
, Peter Y. A. Ryan
, Petra Sala
:
HoneyPAKEs. Security Protocols Workshop 2018: 63-77 - [c80]Peter Y. A. Ryan
:
HoneyPAKEs (Transcript of Discussion). Security Protocols Workshop 2018: 78-83 - [c79]José Becerra, Peter Y. A. Ryan
, Petra Sala, Marjan Skrobot
:
An Offline Dictionary Attack against zkPAKE Protocol. WISEC 2018: 291-292 - [i20]Arash Atashpendar, Marc Beunardeau, Aisling Connolly, Rémi Géraud, David Mestel, A. W. Roscoe, Peter Y. A. Ryan:
From Clustering Supersequences to Entropy Minimizing Subsequences for Single and Double Deletions. CoRR abs/1802.00703 (2018) - [i19]Jun Wang, Afonso Arriaga, Qiang Tang, Peter Y. A. Ryan:
CryptoRec: Secure Recommendations as a Service. CoRR abs/1802.02432 (2018) - [i18]Arash Atashpendar, David Mestel, A. W. Roscoe, Peter Y. A. Ryan:
A Proof of Entropy Minimization for Outputs in Deletion Channels via Hidden Word Statistics. CoRR abs/1807.11609 (2018) - [i17]Arash Atashpendar, Guru-Vamsi Policharla, Peter B. Rønne, Peter Y. A. Ryan:
Revisiting Deniability in Quantum Key Exchange via Covert Communication and Entanglement Distillation. CoRR abs/1812.02245 (2018) - 2017
- [j20]Giampaolo Bella
, Rosario Giustolisi, Gabriele Lenzini, Peter Y. A. Ryan
:
Trustworthy exams without trusted parties. Comput. Secur. 67: 291-307 (2017) - [j19]Josh Benaloh, Peter Y. A. Ryan
, Steve A. Schneider, Vanessa Teague:
A Vote of Confidence? IEEE Secur. Priv. 15(3): 12-13 (2017) - [c78]Peter Y. A. Ryan
:
A Brief History of Security Protocols. Concurrency, Security, and Puzzles 2017: 223-245 - [c77]Ziya Alper Genç, Gabriele Lenzini
, Peter Y. A. Ryan:
Cipher, the Random and the Ransom: A Survey on Current and Future Ransomware. CECC 2017: 89-102 - [c76]Vincenzo Iovino
, Alfredo Rial, Peter B. Rønne
, Peter Y. A. Ryan
:
Using Selene to Verify Your Vote in JCJ. Financial Cryptography Workshops 2017: 385-403 - [c75]Peter Y. A. Ryan
:
Securing the Foundations of Democracy. SECITC 2017: 52-66 - [c74]A. W. Roscoe, Peter Y. A. Ryan
:
Auditable PAKEs: Approaching Fair Exchange Without a TTP. Security Protocols Workshop 2017: 278-297 - [c73]Peter Y. A. Ryan
:
Auditable PAKEs: Approaching Fair Exchange Without a TTP (Transcript of Discussion). Security Protocols Workshop 2017: 298-305 - [c72]Matthew Bernhard, Josh Benaloh, J. Alex Halderman, Ronald L. Rivest, Peter Y. A. Ryan
, Philip B. Stark, Vanessa Teague, Poorvi L. Vora, Dan S. Wallach:
Public Evidence from Secret Ballots. E-VOTE-ID 2017: 84-109 - [c71]Gabriele Lenzini
, Samir Ouchani
, Peter B. Rønne
, Peter Y. A. Ryan
, Yong Geng, Jan Lagerwall, JungHyun Noh:
Security in the shell: An optical physical unclonable function made of shells of cholesteric liquid crystals. WIFS 2017: 1-6 - [e15]Michael Brenner, Kurt Rohloff, Joseph Bonneau, Andrew Miller, Peter Y. A. Ryan, Vanessa Teague, Andrea Bracciali, Massimiliano Sala, Federico Pintore, Markus Jakobsson:
Financial Cryptography and Data Security - FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Papers. Lecture Notes in Computer Science 10323, Springer 2017, ISBN 978-3-319-70277-3 [contents] - [e14]Robert Krimmer, Melanie Volkamer, Jordi Barrat, Josh Benaloh, Nicole J. Goodman, Peter Y. A. Ryan, Vanessa Teague:
Electronic Voting - First International Joint Conference, E-Vote-ID 2016, Bregenz, Austria, October 18-21, 2016, Proceedings. Lecture Notes in Computer Science 10141, Springer 2017, ISBN 978-3-319-52239-5 [contents] - [i16]Josh Benaloh, Matthew Bernhard, J. Alex Halderman, Ronald L. Rivest, Peter Y. A. Ryan, Philip B. Stark, Vanessa Teague, Poorvi L. Vora, Dan S. Wallach:
Public Evidence from Secret Ballots. CoRR abs/1707.08619 (2017) - 2016
- [c70]Peter Y. A. Ryan
:
Crypto Santa. The New Codebreakers 2016: 543-549 - [c69]Masoud Tabatabaei, Wojciech Jamroga
, Peter Y. A. Ryan
:
Expressing Receipt-Freeness and Coercion-Resistance in Logics of Strategic Ability: Preliminary Attempt. PrAISe@ECAI 2016: 1:1-1:8 - [c68]Peter Y. A. Ryan
, Peter B. Rønne
, Vincenzo Iovino
:
Selene: Voting with Transparent Verifiability and Coercion-Mitigation. Financial Cryptography Workshops 2016: 176-192 - [e13]Peter Y. A. Ryan
, David Naccache, Jean-Jacques Quisquater:
The New Codebreakers - Essays Dedicated to David Kahn on the Occasion of His 85th Birthday. Lecture Notes in Computer Science 9100, Springer 2016, ISBN 978-3-662-49300-7 [contents] - [e12]Jeremy Clark, Sarah Meiklejohn, Peter Y. A. Ryan, Dan S. Wallach, Michael Brenner, Kurt Rohloff:
Financial Cryptography and Data Security - FC 2016 International Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February 26, 2016, Revised Selected Papers. Lecture Notes in Computer Science 9604, Springer 2016, ISBN 978-3-662-53356-7 [contents] - [i15]Gina Gallegos-García, Vincenzo Iovino, Alfredo Rial, Peter B. Rønne, Peter Y. A. Ryan:
(Universal) Unconditional Verifiability in E-Voting without Trusted Parties. CoRR abs/1610.06343 (2016) - [i14]Gina Gallegos-García, Vincenzo Iovino, Alfredo Rial, Peter B. Rønne, Peter Y. A. Ryan:
(Universal) Unconditional Verifiability in E-Voting without Trusted Parties. IACR Cryptol. ePrint Arch. 2016: 975 (2016) - 2015
- [j18]Bart Preneel, Phillip Rogaway, Mark Dermot Ryan, Peter Y. A. Ryan:
Privacy and Security in an Age of Surveillance (Dagstuhl Perspectives Workshop 14401). Dagstuhl Manifestos 5(1): 25-37 (2015) - [j17]Peter Y. A. Ryan
, Steve A. Schneider
, Vanessa Teague:
End-to-End Verifiability in Voting Systems, from Theory to Practice. IEEE Secur. Priv. 13(3): 59-62 (2015) - [j16]Chris Culnane
, Peter Y. A. Ryan
, Steve A. Schneider
, Vanessa Teague:
vVote: A Verifiable Voting System. ACM Trans. Inf. Syst. Secur. 18(1): 3:1-3:30 (2015) - [c67]Giampaolo Bella
, Rosario Giustolisi, Gabriele Lenzini
, Peter Y. A. Ryan
:
A Secure Exam Protocol Without Trusted Parties. SEC 2015: 495-509 - [c66]Arash Atashpendar, A. W. Roscoe, Peter Y. A. Ryan
:
Information Leakage Due to Revealing Randomly Selected Bits. Security Protocols Workshop 2015: 325-341 - [e11]Günther Pernul, Peter Y. A. Ryan
, Edgar R. Weippl:
Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I. Lecture Notes in Computer Science 9326, Springer 2015, ISBN 978-3-319-24173-9 [contents] - [e10]Günther Pernul, Peter Y. A. Ryan
, Edgar R. Weippl:
Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part II. Lecture Notes in Computer Science 9327, Springer 2015, ISBN 978-3-319-24176-0 [contents] - [i13]Josh Benaloh, Ronald L. Rivest, Peter Y. A. Ryan, Philip B. Stark, Vanessa Teague, Poorvi L. Vora:
End-to-end verifiability. CoRR abs/1504.03778 (2015) - [i12]Peter Y. A. Ryan, Peter B. Rønne, Vincenzo Iovino:
Selene: Voting with Transparent Verifiability and Coercion-Mitigation. IACR Cryptol. ePrint Arch. 2015: 1105 (2015) - 2014
- [c65]Afonso Arriaga
, Qiang Tang, Peter Y. A. Ryan
:
Trapdoor Privacy in Asymmetric Searchable Encryption Schemes. AFRICACRYPT 2014: 31-50 - [c64]Jannik Dreier, Rosario Giustolisi, Ali Kassem, Pascal Lafourcade
, Gabriele Lenzini, Peter Y. A. Ryan
:
Formal Security Analysis of Traditional and Electronic Exams. ICETE (Selected Papers) 2014: 294-318 - [c63]Jannik Dreier, Rosario Giustolisi, Ali Kassem, Pascal Lafourcade
, Gabriele Lenzini, Peter Y. A. Ryan:
Formal Analysis of Electronic Exams. SECRYPT 2014: 101-112 - [c62]Rosario Giustolisi, Gabriele Lenzini
, Peter Y. A. Ryan
:
Remark!: A Secure Protocol for Remote Exams. Security Protocols Workshop 2014: 38-48 - [c61]Chris Culnane, James Heather, Rui Joaquim, Peter Y. A. Ryan, Steve A. Schneider, Vanessa Teague:
Faster Print on Demand for Prêt à Voter. EVT/WOTE 2014 - [i11]Chris Culnane, Peter Y. A. Ryan, Steve A. Schneider, Vanessa Teague:
vVote: a Verifiable Voting System (DRAFT). CoRR abs/1404.6822 (2014) - [i10]Bart Preneel, Phillip Rogaway, Mark Dermot Ryan, Peter Y. A. Ryan:
Privacy and Security in an Age of Surveillance (Dagstuhl Perspectives Workshop 14401). Dagstuhl Reports 4(9): 106-123 (2014) - [i9]Dhananjay S. Phatak, Qiang Tang
, Alan T. Sherman, Warren D. Smith, Peter Y. A. Ryan, Konstantinos Kalpakis:
DoubleMod and SingleMod: Simple Randomized Secret-Key Encryption with Bounded Homomorphicity. IACR Cryptol. ePrint Arch. 2014: 670 (2014) - 2013
- [j15]Marc Pouly
, Jürg Kohlas, Peter Y. A. Ryan
:
Generalized information theory for hints. Int. J. Approx. Reason. 54(1): 228-251 (2013) - [c60]Gurchetan S. Grewal, Mark Dermot Ryan
, Sergiu Bursuc, Peter Y. A. Ryan
:
Caveat Coercitor: Coercion-Evidence in Electronic Voting. IEEE Symposium on Security and Privacy 2013: 367-381 - [c59]Josh Benaloh, Peter Y. A. Ryan
, Vanessa Teague:
Verifiable Postal Voting. Security Protocols Workshop 2013: 54-65 - [c58]Peter Y. A. Ryan
, Bruce Christianson
:
Enhancements to Prepare-and-Measure Based QKD Protocols. Security Protocols Workshop 2013: 123-133 - [c57]Peter Y. A. Ryan:
Enhancements to Prepare-and-Measure-Based QKD Protocols (Transcript of Discussion). Security Protocols Workshop 2013: 134-142 - [c56]