BibTeX records: Peter Y. A. Ryan

download as .bib file

@article{DBLP:journals/iacr/ArriagaRS24,
  author       = {Afonso Arriaga and
                  Peter Y. A. Ryan and
                  Marjan Skrobot},
  title        = {SweetPAKE: Key exchange with decoy passwords},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {307},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/307},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ArriagaRS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/DraganDEGHRRS23,
  author       = {Constantin Catalin Dragan and
                  Fran{\c{c}}ois Dupressoir and
                  Ehsan Estaji and
                  Kristian Gj{\o}steen and
                  Thomas Haines and
                  Peter Y. A. Ryan and
                  Peter B. R{\o}nne and
                  Morten Rotvold Solberg},
  title        = {Machine-checked proofs of privacy against malicious boards for Selene
                  {\&} Co},
  journal      = {J. Comput. Secur.},
  volume       = {31},
  number       = {5},
  pages        = {469--499},
  year         = {2023},
  url          = {https://doi.org/10.3233/JCS-230045},
  doi          = {10.3233/JCS-230045},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcs/DraganDEGHRRS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ficc/OrcheHHNPRRWW23,
  author       = {Fatima{-}Ezzahra El Orche and
                  Marcel Hollenstein and
                  Sarah Houdaigoui and
                  David Naccache and
                  Daria Pchelina and
                  Peter B. R{\o}nne and
                  Peter Y. A. Ryan and
                  Julien Weibel and
                  Robert Weil},
  editor       = {Kohei Arai},
  title        = {Taphonomical Security: {DNA} Information with a Foreseeable Lifespan},
  booktitle    = {Advances in Information and Communication - Proceedings of the 2023
                  Future of Information and Communication Conference (FICC), Volume
                  2, San Francisco, CA, USA, 2-3 March 2023},
  series       = {Lecture Notes in Networks and Systems},
  volume       = {652},
  pages        = {674--694},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-28073-3\_46},
  doi          = {10.1007/978-3-031-28073-3\_46},
  timestamp    = {Fri, 05 May 2023 14:43:05 +0200},
  biburl       = {https://dblp.org/rec/conf/ficc/OrcheHHNPRRWW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mspn/ChengFGR23,
  author       = {Hao Cheng and
                  Georgios Fotiadis and
                  Johann Gro{\ss}sch{\"{a}}dl and
                  Peter Y. A. Ryan},
  editor       = {Samia Bouzefrane and
                  Soumya Banerjee and
                  Fabrice Mourlin and
                  Selma Boumerdassi and
                  {\'{E}}ric Renault},
  title        = {IoTDisco: Strong yet Lightweight End-to-End Security for the Internet
                  of Constrained Things},
  booktitle    = {Mobile, Secure, and Programmable Networking - 9th International Conference,
                  {MSPN} 2023, Paris, France, October 26-27, 2023, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14482},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-52426-4\_1},
  doi          = {10.1007/978-3-031-52426-4\_1},
  timestamp    = {Tue, 13 Feb 2024 21:48:08 +0100},
  biburl       = {https://dblp.org/rec/conf/mspn/ChengFGR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2311-03372,
  author       = {Wojciech Jamroga and
                  Peter Y. A. Ryan and
                  Steve Schneider and
                  Carsten Sch{\"{u}}rmann and
                  Philip B. Stark},
  title        = {A Declaration of Software Independence},
  journal      = {CoRR},
  volume       = {abs/2311.03372},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2311.03372},
  doi          = {10.48550/ARXIV.2311.03372},
  eprinttype    = {arXiv},
  eprint       = {2311.03372},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2311-03372.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/elektrik/SertkayaRR22,
  author       = {Isa Sertkaya and
                  Peter B. R{\o}nne and
                  Peter Y. A. Ryan},
  title        = {Estonian Internet voting with anonymous credentials},
  journal      = {Turkish J. Electr. Eng. Comput. Sci.},
  volume       = {30},
  number       = {2},
  pages        = {420--435},
  year         = {2022},
  url          = {https://doi.org/10.3906/elk-2105-197},
  doi          = {10.3906/ELK-2105-197},
  timestamp    = {Sat, 28 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/elektrik/SertkayaRR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ChengFGR22,
  author       = {Hao Cheng and
                  Georgios Fotiadis and
                  Johann Gro{\ss}sch{\"{a}}dl and
                  Peter Y. A. Ryan},
  title        = {Highly Vectorized {SIKE} for {AVX-512}},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {2},
  pages        = {41--68},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i2.41-68},
  doi          = {10.46586/TCHES.V2022.I2.41-68},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/ChengFGR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/DraganDEGHRRS22,
  author       = {Constantin Catalin Dragan and
                  Fran{\c{c}}ois Dupressoir and
                  Ehsan Estaji and
                  Kristian Gj{\o}steen and
                  Thomas Haines and
                  Peter Y. A. Ryan and
                  Peter B. R{\o}nne and
                  Morten Rotvold Solberg},
  title        = {Machine-Checked Proofs of Privacy Against Malicious Boards for Selene
                  {\&} Co},
  booktitle    = {35th {IEEE} Computer Security Foundations Symposium, {CSF} 2022, Haifa,
                  Israel, August 7-10, 2022},
  pages        = {335--347},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CSF54842.2022.9919663},
  doi          = {10.1109/CSF54842.2022.9919663},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/DraganDEGHRRS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/evoteid/OrcheGRBNRBDW22,
  author       = {Fatima{-}Ezzahra El Orche and
                  R{\'{e}}mi G{\'{e}}raud{-}Stewart and
                  Peter B. R{\o}nne and
                  Gergei Bana and
                  David Naccache and
                  Peter Y. A. Ryan and
                  Marco Biroli and
                  Megi Dervishi and
                  Hugo Waltsburger},
  editor       = {Robert Krimmer and
                  Melanie Volkamer and
                  David Duenas{-}Cid and
                  Peter B. R{\o}nne and
                  Micha Germann},
  title        = {Time, Privacy, Robustness, Accuracy: Trade-Offs for the Open Vote
                  Network Protocol},
  booktitle    = {Electronic Voting - 7th International Joint Conference, E-Vote-ID
                  2022, Bregenz, Austria, October 4-7, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13553},
  pages        = {19--35},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15911-4\_2},
  doi          = {10.1007/978-3-031-15911-4\_2},
  timestamp    = {Mon, 24 Oct 2022 20:50:57 +0200},
  biburl       = {https://dblp.org/rec/conf/evoteid/OrcheGRBNRBDW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/secitc/2021,
  editor       = {Peter Y. A. Ryan and
                  Cristian Toma},
  title        = {Innovative Security Solutions for Information Technology and Communications
                  - 14th International Conference, SecITC 2021, Virtual Event, November
                  25-26, 2021, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13195},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17510-7},
  doi          = {10.1007/978-3-031-17510-7},
  isbn         = {978-3-031-17509-1},
  timestamp    = {Fri, 21 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/2021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2210-10694,
  author       = {Wojciech Jamroga and
                  Peter Y. A. Ryan and
                  Yan Kim},
  title        = {Verification of the Socio-Technical Aspects of Voting: The Case of
                  the Polish Postal Vote 2020},
  journal      = {CoRR},
  volume       = {abs/2210.10694},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2210.10694},
  doi          = {10.48550/ARXIV.2210.10694},
  eprinttype    = {arXiv},
  eprint       = {2210.10694},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2210-10694.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DraganDEGHRRS22,
  author       = {Constantin Catalin Dragan and
                  Fran{\c{c}}ois Dupressoir and
                  Ehsan Estaji and
                  Kristian Gj{\o}steen and
                  Thomas Haines and
                  Peter Y. A. Ryan and
                  Peter B. R{\o}nne and
                  Morten Rotvold Solberg},
  title        = {Machine-Checked Proofs of Privacy Against Malicious Boards for Selene
                  {\&} Co},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1182},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1182},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DraganDEGHRRS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/FenskeBMMRR21,
  author       = {Ellis Fenske and
                  Dane Brown and
                  Jeremy Martin and
                  Travis Mayberry and
                  Peter Ryan and
                  Erik C. Rye},
  title        = {Three Years Later: {A} Study of {MAC} Address Randomization In Mobile
                  Devices And When It Succeeds},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2021},
  number       = {3},
  pages        = {164--181},
  year         = {2021},
  url          = {https://doi.org/10.2478/popets-2021-0042},
  doi          = {10.2478/POPETS-2021-0042},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/FenskeBMMRR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ChengFGRR21,
  author       = {Hao Cheng and
                  Georgios Fotiadis and
                  Johann Gro{\ss}sch{\"{a}}dl and
                  Peter Y. A. Ryan and
                  Peter B. R{\o}nne},
  title        = {Batching {CSIDH} Group Actions using {AVX-512}},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {4},
  pages        = {618--649},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i4.618-649},
  doi          = {10.46586/TCHES.V2021.I4.618-649},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/ChengFGRR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tochi/MarkyZRRGK21,
  author       = {Karola Marky and
                  Marie{-}Laure Zollinger and
                  Peter B. Roenne and
                  Peter Y. A. Ryan and
                  Tim Grube and
                  Kai Kunze},
  title        = {Investigating Usability and User Experience of Individually Verifiable
                  Internet Voting Schemes},
  journal      = {{ACM} Trans. Comput. Hum. Interact.},
  volume       = {28},
  number       = {5},
  pages        = {30:1--30:36},
  year         = {2021},
  url          = {https://doi.org/10.1145/3459604},
  doi          = {10.1145/3459604},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tochi/MarkyZRRGK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/CouteauRR21,
  author       = {Geoffroy Couteau and
                  A. W. Roscoe and
                  Peter Y. A. Ryan},
  editor       = {Joonsang Baek and
                  Sushmita Ruj},
  title        = {Partially-Fair Computation from Timed-Release Encryption and Oblivious
                  Transfer},
  booktitle    = {Information Security and Privacy - 26th Australasian Conference, {ACISP}
                  2021, Virtual Event, December 1-3, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13083},
  pages        = {330--349},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90567-5\_17},
  doi          = {10.1007/978-3-030-90567-5\_17},
  timestamp    = {Mon, 08 Nov 2021 16:43:35 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/CouteauRR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/JamrogaRSSS21,
  author       = {Wojciech Jamroga and
                  Peter Y. A. Ryan and
                  Steve Schneider and
                  Carsten Sch{\"{u}}rmann and
                  Philip B. Stark},
  editor       = {Daniel Dougherty and
                  Jos{\'{e}} Meseguer and
                  Sebastian Alexander M{\"{o}}dersheim and
                  Paul D. Rowe},
  title        = {A Declaration of Software Independence},
  booktitle    = {Protocols, Strands, and Logic - Essays Dedicated to Joshua Guttman
                  on the Occasion of his 66.66th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {13066},
  pages        = {198--217},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-91631-2\_11},
  doi          = {10.1007/978-3-030-91631-2\_11},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/birthday/JamrogaRSSS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/0009GRR21,
  author       = {Hao Cheng and
                  Johann Gro{\ss}sch{\"{a}}dl and
                  Peter B. R{\o}nne and
                  Peter Y. A. Ryan},
  title        = {{AVRNTRU:} Lightweight NTRU-based Post-Quantum Cryptography for 8-bit
                  {AVR} Microcontrollers},
  booktitle    = {Design, Automation {\&} Test in Europe Conference {\&} Exhibition,
                  {DATE} 2021, Grenoble, France, February 1-5, 2021},
  pages        = {1272--1277},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.23919/DATE51398.2021.9474033},
  doi          = {10.23919/DATE51398.2021.9474033},
  timestamp    = {Thu, 22 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/date/0009GRR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/evoteid/RyanROOSS21,
  author       = {Peter Y. A. Ryan and
                  Peter B. Roenne and
                  Dimiter Ostrev and
                  Fatima{-}Ezzahra El Orche and
                  Najmeh Soroush and
                  Philip B. Stark},
  editor       = {Robert Krimmer and
                  Melanie Volkamer and
                  David Duenas{-}Cid and
                  Oksana Kulyk and
                  Peter B. R{\o}nne and
                  Mihkel Solvak and
                  Micha Germann},
  title        = {Who Was that Masked Voter? The Tally Won't Tell!},
  booktitle    = {Electronic Voting - 6th International Joint Conference, E-Vote-ID
                  2021, Virtual Event, October 5-8, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12900},
  pages        = {106--123},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-86942-7\_8},
  doi          = {10.1007/978-3-030-86942-7\_8},
  timestamp    = {Tue, 05 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/evoteid/RyanROOSS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/evoteid/ZollingerERM21,
  author       = {Marie{-}Laure Zollinger and
                  Ehsan Estaji and
                  Peter Y. A. Ryan and
                  Karola Marky},
  editor       = {Robert Krimmer and
                  Melanie Volkamer and
                  David Duenas{-}Cid and
                  Oksana Kulyk and
                  Peter B. R{\o}nne and
                  Mihkel Solvak and
                  Micha Germann},
  title        = {"Just for the Sake of Transparency": Exploring Voter Mental
                  Models of Verifiability},
  booktitle    = {Electronic Voting - 6th International Joint Conference, E-Vote-ID
                  2021, Virtual Event, October 5-8, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12900},
  pages        = {155--170},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-86942-7\_11},
  doi          = {10.1007/978-3-030-86942-7\_11},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/evoteid/ZollingerERM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/RonneRS21,
  author       = {Peter B. R{\o}nne and
                  Peter Y. A. Ryan and
                  Ben Smyth},
  editor       = {Matthew Bernhard and
                  Andrea Bracciali and
                  Lewis Gudgeon and
                  Thomas Haines and
                  Ariah Klages{-}Mundt and
                  Shin'ichiro Matsuo and
                  Daniel Perez and
                  Massimiliano Sala and
                  Sam Werner},
  title        = {Cast-as-Intended: {A} Formal Definition and Case Studies},
  booktitle    = {Financial Cryptography and Data Security. {FC} 2021 International
                  Workshops - CoDecFin, DeFi, VOTING, and WTSC, Virtual Event, March
                  5, 2021, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12676},
  pages        = {251--262},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-662-63958-0\_22},
  doi          = {10.1007/978-3-662-63958-0\_22},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/RonneRS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/FotiadisMGCRRR21,
  author       = {Georgios Fotiadis and
                  Jos{\'{e}} Moreira and
                  Thanassis Giannetsos and
                  Liqun Chen and
                  Peter B. R{\o}nne and
                  Mark Ryan and
                  Peter Y. A. Ryan},
  editor       = {Rodrigo Roman and
                  Jianying Zhou},
  title        = {Root-of-Trust Abstractions for Symbolic Analysis: Application to Attestation
                  Protocols},
  booktitle    = {Security and Trust Management - 17th International Workshop, {STM}
                  2021, Darmstadt, Germany, October 8, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13075},
  pages        = {163--184},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-91859-0\_9},
  doi          = {10.1007/978-3-030-91859-0\_9},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stm/FotiadisMGCRRR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2102-01995,
  author       = {Gergei Bana and
                  Wojciech Jamroga and
                  David Naccache and
                  Peter Y. A. Ryan},
  title        = {Convergence Voting: From Pairwise Comparisons to Consensus},
  journal      = {CoRR},
  volume       = {abs/2102.01995},
  year         = {2021},
  url          = {https://arxiv.org/abs/2102.01995},
  eprinttype    = {arXiv},
  eprint       = {2102.01995},
  timestamp    = {Tue, 09 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2102-01995.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2105-14783,
  author       = {Peter B. R{\o}nne and
                  Peter Y. A. Ryan and
                  Marie{-}Laure Zollinger},
  title        = {Electryo, In-person Voting with Transparent Voter Verifiability and
                  Eligibility Verifiability},
  journal      = {CoRR},
  volume       = {abs/2105.14783},
  year         = {2021},
  url          = {https://arxiv.org/abs/2105.14783},
  eprinttype    = {arXiv},
  eprint       = {2105.14783},
  timestamp    = {Wed, 02 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2105-14783.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2105-14901,
  author       = {Marie{-}Laure Zollinger and
                  Verena Distler and
                  Peter B. R{\o}nne and
                  Peter Y. A. Ryan and
                  Carine Lallemand and
                  Vincent Koenig},
  title        = {User Experience Design for E-Voting: How mental models align with
                  security mechanisms},
  journal      = {CoRR},
  volume       = {abs/2105.14901},
  year         = {2021},
  url          = {https://arxiv.org/abs/2105.14901},
  eprinttype    = {arXiv},
  eprint       = {2105.14901},
  timestamp    = {Wed, 02 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2105-14901.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2107-06090,
  author       = {Itzel V{\'{a}}zquez Sandoval and
                  Arash Atashpendar and
                  Gabriele Lenzini and
                  Peter Y. A. Ryan},
  title        = {PakeMail: authentication and key management in decentralized secure
                  email and messaging via {PAKE}},
  journal      = {CoRR},
  volume       = {abs/2107.06090},
  year         = {2021},
  url          = {https://arxiv.org/abs/2107.06090},
  eprinttype    = {arXiv},
  eprint       = {2107.06090},
  timestamp    = {Wed, 21 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2107-06090.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdallaBRRS21,
  author       = {Michel Abdalla and
                  Manuel Barbosa and
                  Peter B. R{\o}nne and
                  Peter Y. A. Ryan and
                  Petra Sala},
  title        = {Security Characterization of {J-PAKE} and its Variants},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {824},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/824},
  timestamp    = {Wed, 07 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdallaBRRS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BanaBDOGNRRW21,
  author       = {Gergei Bana and
                  Marco Biroli and
                  Megi Dervishi and
                  Fatima{-}Ezzahra El Orche and
                  R{\'{e}}mi G{\'{e}}raud{-}Stewart and
                  David Naccache and
                  Peter B. R{\o}nne and
                  Peter Y. A. Ryan and
                  Hugo Waltsburger},
  title        = {Time, Privacy, Robustness, Accuracy: Trade Offs for the Open Vote
                  Network Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1065},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1065},
  timestamp    = {Mon, 06 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BanaBDOGNRRW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OrcheHHNPRRWW21,
  author       = {Fatima{-}Ezzahra El Orche and
                  Marcel Hollenstein and
                  Sarah Houdaigoui and
                  David Naccache and
                  Daria Pchelina and
                  Peter B. R{\o}nne and
                  Peter Y. A. Ryan and
                  Julien Weibel and
                  Robert Weil},
  title        = {Taphonomical Security: {(DNA)} Information with Foreseeable Lifespan},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1066},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1066},
  timestamp    = {Mon, 06 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OrcheHHNPRRWW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HollensteinNRRW21,
  author       = {Marcel Hollenstein and
                  David Naccache and
                  Peter B. R{\o}nne and
                  Peter Y. A. Ryan and
                  Robert Weil and
                  Ofer Yifrach{-}Stav},
  title        = {Preservation of {DNA} Privacy During the Large Scale Detection of
                  {COVID}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1108},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1108},
  timestamp    = {Mon, 06 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HollensteinNRRW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/ChengGRR20,
  author       = {Hao Cheng and
                  Johann Gro{\ss}sch{\"{a}}dl and
                  Peter B. R{\o}nne and
                  Peter Y. A. Ryan},
  editor       = {Pierre{-}Yvan Liardet and
                  Nele Mentens},
  title        = {Lightweight Post-quantum Key Encapsulation for 8-bit {AVR} Microcontrollers},
  booktitle    = {Smart Card Research and Advanced Applications - 19th International
                  Conference, {CARDIS} 2020, Virtual Event, November 18-19, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12609},
  pages        = {18--33},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-68487-7\_2},
  doi          = {10.1007/978-3-030-68487-7\_2},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cardis/ChengGRR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/IovinoRRR20,
  author       = {Vincenzo Iovino and
                  Alfredo Rial and
                  Peter B. R{\o}nne and
                  Peter Y. A. Ryan},
  title        = {Universal Unconditional Verifiability in E-Voting without Trusted
                  Parties},
  booktitle    = {33rd {IEEE} Computer Security Foundations Symposium, {CSF} 2020, Boston,
                  MA, USA, June 22-26, 2020},
  pages        = {33--48},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CSF49147.2020.00011},
  doi          = {10.1109/CSF49147.2020.00011},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/IovinoRRR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/evoteid/EstajiHGRRS20,
  author       = {Ehsan Estaji and
                  Thomas Haines and
                  Kristian Gj{\o}steen and
                  Peter B. R{\o}nne and
                  Peter Y. A. Ryan and
                  Najmeh Soroush},
  editor       = {Robert Krimmer and
                  Melanie Volkamer and
                  Bernhard Beckert and
                  Ralf K{\"{u}}sters and
                  Oksana Kulyk and
                  David Duenas{-}Cid and
                  Mikhel Solvak},
  title        = {Revisiting Practical and Usable Coercion-Resistant Remote E-Voting},
  booktitle    = {Electronic Voting - 5th International Joint Conference, E-Vote-ID
                  2020, Bregenz, Austria, October 6-9, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12455},
  pages        = {50--66},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-60347-2\_4},
  doi          = {10.1007/978-3-030-60347-2\_4},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/evoteid/EstajiHGRRS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/evoteid/JamrogaKKR20,
  author       = {Wojciech Jamroga and
                  Yan Kim and
                  Damian Kurpiewski and
                  Peter Y. A. Ryan},
  editor       = {Robert Krimmer and
                  Melanie Volkamer and
                  Bernhard Beckert and
                  Ralf K{\"{u}}sters and
                  Oksana Kulyk and
                  David Duenas{-}Cid and
                  Mikhel Solvak},
  title        = {Towards Model Checking of Voting Protocols in Uppaal},
  booktitle    = {Electronic Voting - 5th International Joint Conference, E-Vote-ID
                  2020, Bregenz, Austria, October 6-9, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12455},
  pages        = {129--146},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-60347-2\_9},
  doi          = {10.1007/978-3-030-60347-2\_9},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/evoteid/JamrogaKKR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/ZollingerRR20,
  author       = {Marie{-}Laure Zollinger and
                  Peter B. R{\o}nne and
                  Peter Y. A. Ryan},
  editor       = {Matthew Bernhard and
                  Andrea Bracciali and
                  L. Jean Camp and
                  Shin'ichiro Matsuo and
                  Alana Maurushat and
                  Peter B. R{\o}nne and
                  Massimiliano Sala},
  title        = {Short Paper: Mechanized Proofs of Verifiability and Privacy in a Paper-Based
                  E-Voting Scheme},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2020 International
                  Workshops, AsiaUSEC, CoDeFi, VOTING, and WTSC, Kota Kinabalu, Malaysia,
                  February 14, 2020, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12063},
  pages        = {310--318},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-54455-3\_22},
  doi          = {10.1007/978-3-030-54455-3\_22},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/ZollingerRR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/SandovalALR20,
  author       = {Itzel V{\'{a}}zquez Sandoval and
                  Arash Atashpendar and
                  Gabriele Lenzini and
                  Peter Y. A. Ryan},
  editor       = {Mohammad S. Obaidat and
                  Jalel Ben{-}Othman},
  title        = {PakeMail: Authentication and Key Management in Decentralized Secure
                  Email and Messaging via {PAKE}},
  booktitle    = {E-Business and Telecommunications - 17th International Conference
                  on E-Business and Telecommunications, {ICETE} 2020, Online Event,
                  July 8-10, 2020, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1484},
  pages        = {102--128},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-90428-9\_5},
  doi          = {10.1007/978-3-030-90428-9\_5},
  timestamp    = {Mon, 29 Nov 2021 09:41:38 +0100},
  biburl       = {https://dblp.org/rec/conf/icete/SandovalALR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/SoroushIRRR20,
  author       = {Najmeh Soroush and
                  Vincenzo Iovino and
                  Alfredo Rial and
                  Peter B. R{\o}nne and
                  Peter Y. A. Ryan},
  editor       = {Aggelos Kiayias and
                  Markulf Kohlweiss and
                  Petros Wallden and
                  Vassilis Zikas},
  title        = {Verifiable Inner Product Encryption Scheme},
  booktitle    = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Edinburgh, UK,
                  May 4-7, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12110},
  pages        = {65--94},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45374-9\_3},
  doi          = {10.1007/978-3-030-45374-9\_3},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/SoroushIRRR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/ChengGTRR20,
  author       = {Hao Cheng and
                  Johann Gro{\ss}sch{\"{a}}dl and
                  Jiaqi Tian and
                  Peter B. R{\o}nne and
                  Peter Y. A. Ryan},
  editor       = {Orr Dunkelman and
                  Michael J. Jacobson Jr. and
                  Colin O'Flynn},
  title        = {High-Throughput Elliptic Curve Cryptography Using {AVX2} Vector Instructions},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2020 - 27th International Conference,
                  Halifax, NS, Canada (Virtual Event), October 21-23, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12804},
  pages        = {698--719},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-81652-0\_27},
  doi          = {10.1007/978-3-030-81652-0\_27},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacrypt/ChengGTRR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2007-09085,
  author       = {Marcel Hollenstein and
                  David Naccache and
                  Peter B. R{\o}nne and
                  Peter Y. A. Ryan and
                  Robert Weil and
                  Ofer Yifrach{-}Stav},
  title        = {Preservation of {DNA} Privacy During the Large Scale Detection of
                  {COVID-19}},
  journal      = {CoRR},
  volume       = {abs/2007.09085},
  year         = {2020},
  url          = {https://arxiv.org/abs/2007.09085},
  eprinttype    = {arXiv},
  eprint       = {2007.09085},
  timestamp    = {Tue, 28 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2007-09085.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2007-12412,
  author       = {Wojciech Jamroga and
                  Yan Kim and
                  Damian Kurpiewski and
                  Peter Y. A. Ryan},
  title        = {Model Checkers Are Cool: How to Model Check Voting Protocols in Uppaal},
  journal      = {CoRR},
  volume       = {abs/2007.12412},
  year         = {2020},
  url          = {https://arxiv.org/abs/2007.12412},
  eprinttype    = {arXiv},
  eprint       = {2007.12412},
  timestamp    = {Wed, 29 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2007-12412.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2011-07887,
  author       = {Wojciech Jamroga and
                  David Mestel and
                  Peter B. R{\o}nne and
                  Peter Y. A. Ryan and
                  Marjan Skrobot},
  title        = {A Survey of Requirements for {COVID-19} Mitigation Strategies. Part
                  {I:} Newspaper Clips},
  journal      = {CoRR},
  volume       = {abs/2011.07887},
  year         = {2020},
  url          = {https://arxiv.org/abs/2011.07887},
  eprinttype    = {arXiv},
  eprint       = {2011.07887},
  timestamp    = {Wed, 18 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2011-07887.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SoroushIRRR20,
  author       = {Najmeh Soroush and
                  Vincenzo Iovino and
                  Alfredo Rial and
                  Peter B. R{\o}nne and
                  Peter Y. A. Ryan},
  title        = {Verifiable Inner Product Encryption Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {122},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/122},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SoroushIRRR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DingEMRW20,
  author       = {Jintai Ding and
                  Doug Emery and
                  Johannes M{\"{u}}ller and
                  Peter Y. A. Ryan and
                  Vonn Kee Wong},
  title        = {Post-Quantum Anonymous Veto Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1023},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1023},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DingEMRW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/DistlerZLRRK19,
  author       = {Verena Distler and
                  Marie{-}Laure Zollinger and
                  Carine Lallemand and
                  Peter B. R{\o}nne and
                  Peter Y. A. Ryan and
                  Vincent Koenig},
  editor       = {Stephen A. Brewster and
                  Geraldine Fitzpatrick and
                  Anna L. Cox and
                  Vassilis Kostakos},
  title        = {Security - Visible, Yet Unseen?},
  booktitle    = {Proceedings of the 2019 {CHI} Conference on Human Factors in Computing
                  Systems, {CHI} 2019, Glasgow, Scotland, UK, May 04-09, 2019},
  pages        = {605},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3290605.3300835},
  doi          = {10.1145/3290605.3300835},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/chi/DistlerZLRRK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/GencLR19,
  author       = {Ziya Alper Gen{\c{c}} and
                  Gabriele Lenzini and
                  Peter Y. A. Ryan},
  editor       = {Andrea Saracino and
                  Paolo Mori},
  title        = {NoCry: No More Secure Encryption Keys for Cryptographic Ransomware},
  booktitle    = {Emerging Technologies for Authorization and Authentication - Second
                  International Workshop, {ETAA} 2019, Luxembourg City, Luxembourg,
                  September 27, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11967},
  pages        = {69--85},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-39749-4\_5},
  doi          = {10.1007/978-3-030-39749-4\_5},
  timestamp    = {Wed, 29 Jan 2020 13:02:14 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/GencLR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/MarkyZFRM19,
  author       = {Karola Marky and
                  Marie{-}Laure Zollinger and
                  Markus Funk and
                  Peter Y. A. Ryan and
                  Max M{\"{u}}hlh{\"{a}}user},
  editor       = {Andrea Bracciali and
                  Jeremy Clark and
                  Federico Pintore and
                  Peter B. R{\o}nne and
                  Massimiliano Sala},
  title        = {How to Assess the Usability Metrics of E-Voting Schemes},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2019 International
                  Workshops, {VOTING} and WTSC, St. Kitts, St. Kitts and Nevis, February
                  18-22, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11599},
  pages        = {257--271},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-43725-1\_18},
  doi          = {10.1007/978-3-030-43725-1\_18},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/MarkyZFRM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcai/00200AR19,
  author       = {Jun Wang and
                  Qiang Tang and
                  Afonso Arriaga and
                  Peter Y. A. Ryan},
  editor       = {Sarit Kraus},
  title        = {Novel Collaborative Filtering Recommender Friendly to Privacy Protection},
  booktitle    = {Proceedings of the Twenty-Eighth International Joint Conference on
                  Artificial Intelligence, {IJCAI} 2019, Macao, China, August 10-16,
                  2019},
  pages        = {4809--4815},
  publisher    = {ijcai.org},
  year         = {2019},
  url          = {https://doi.org/10.24963/ijcai.2019/668},
  doi          = {10.24963/IJCAI.2019/668},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ijcai/00200AR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/BecerraRSS19,
  author       = {Jos{\'{e}} Becerra and
                  Peter Y. A. Ryan and
                  Petra Sala and
                  Marjan Skrobot},
  editor       = {Gurpreet Dhillon and
                  Fredrik Karlsson and
                  Karin Hedstr{\"{o}}m and
                  Andr{\'{e}} Z{\'{u}}quete},
  title        = {An Offline Dictionary Attack Against zkPAKE Protocol},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 34th {IFIP} {TC} 11
                  International Conference, {SEC} 2019, Lisbon, Portugal, June 25-27,
                  2019, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {562},
  pages        = {81--90},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-22312-0\_6},
  doi          = {10.1007/978-3-030-22312-0\_6},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/BecerraRSS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/BeunardeauOMNRR19,
  author       = {Marc Beunardeau and
                  Fatima{-}Ezzahra El Orche and
                  Diana Maimut and
                  David Naccache and
                  Peter B. R{\o}nne and
                  Peter Y. A. Ryan},
  editor       = {Emil Simion and
                  R{\'{e}}mi G{\'{e}}raud{-}Stewart},
  title        = {Authenticated Key Distribution: When the Coupon Collector is Your
                  Enemy},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 12th International Conference, SecITC 2019, Bucharest, Romania,
                  November 14-15, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12001},
  pages        = {1--20},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-41025-4\_1},
  doi          = {10.1007/978-3-030-41025-4\_1},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/BeunardeauOMNRR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/voteid/JamrogaRRS19,
  author       = {Wojciech Jamroga and
                  Peter B. R{\o}nne and
                  Peter Y. A. Ryan and
                  Philip B. Stark},
  editor       = {Robert Krimmer and
                  Melanie Volkamer and
                  V{\'{e}}ronique Cortier and
                  Bernhard Beckert and
                  Ralf K{\"{u}}sters and
                  Uwe Serd{\"{u}}lt and
                  David Duenas{-}Cid},
  title        = {Risk-Limiting Tallies},
  booktitle    = {Electronic Voting - 4th International Joint Conference, E-Vote-ID
                  2019, Bregenz, Austria, October 1-4, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11759},
  pages        = {183--199},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-30625-0\_12},
  doi          = {10.1007/978-3-030-30625-0\_12},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/voteid/JamrogaRRS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/ChengDGRR19,
  author       = {Hao Cheng and
                  Daniel Dinu and
                  Johann Gro{\ss}sch{\"{a}}dl and
                  Peter B. R{\o}nne and
                  Peter Y. A. Ryan},
  editor       = {Maryline Laurent and
                  Thanassis Giannetsos},
  title        = {A Lightweight Implementation of {NTRU} Prime for the Post-quantum
                  Internet of Things},
  booktitle    = {Information Security Theory and Practice - 13th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2019, Paris, France, December 11-12, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12024},
  pages        = {103--119},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-41702-4\_7},
  doi          = {10.1007/978-3-030-41702-4\_7},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wistp/ChengDGRR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2019-1,
  editor       = {Kazue Sako and
                  Steve A. Schneider and
                  Peter Y. A. Ryan},
  title        = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research
                  in Computer Security, Luxembourg, September 23-27, 2019, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11735},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-29959-0},
  doi          = {10.1007/978-3-030-29959-0},
  isbn         = {978-3-030-29958-3},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/2019-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2019-2,
  editor       = {Kazue Sako and
                  Steve A. Schneider and
                  Peter Y. A. Ryan},
  title        = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research
                  in Computer Security, Luxembourg, September 23-27, 2019, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11736},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-29962-0},
  doi          = {10.1007/978-3-030-29962-0},
  isbn         = {978-3-030-29961-3},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/2019-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1901-02560,
  author       = {Peter B. R{\o}nne and
                  Arash Atashpendar and
                  Kristian Gj{\o}steen and
                  Peter Y. A. Ryan},
  title        = {Coercion-Resistant Voting in Linear Time via Fully Homomorphic Encryption:
                  Towards a Quantum-Safe Scheme},
  journal      = {CoRR},
  volume       = {abs/1901.02560},
  year         = {2019},
  url          = {http://arxiv.org/abs/1901.02560},
  eprinttype    = {arXiv},
  eprint       = {1901.02560},
  timestamp    = {Fri, 01 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1901-02560.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1906-02686,
  author       = {Brian Thompson and
                  Dave Cedel and
                  Jeremy Martin and
                  Peter Y. A. Ryan and
                  Sarah Kern},
  title        = {Fusion of Mobile Device Signal Data Attributes Enables Multi-Protocol
                  Entity Resolution and Enhanced Large-Scale Tracking},
  journal      = {CoRR},
  volume       = {abs/1906.02686},
  year         = {2019},
  url          = {http://arxiv.org/abs/1906.02686},
  eprinttype    = {arXiv},
  eprint       = {1906.02686},
  timestamp    = {Wed, 15 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1906-02686.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1908-04947,
  author       = {Wojciech Jamroga and
                  Peter B. R{\o}nne and
                  Peter Y. A. Ryan and
                  Philip B. Stark},
  title        = {Risk-Limiting Tallies},
  journal      = {CoRR},
  volume       = {abs/1908.04947},
  year         = {2019},
  url          = {http://arxiv.org/abs/1908.04947},
  eprinttype    = {arXiv},
  eprint       = {1908.04947},
  timestamp    = {Mon, 19 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1908-04947.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CouteauRR19,
  author       = {Geoffroy Couteau and
                  Bill Roscoe and
                  Peter Y. A. Ryan},
  title        = {Partially-Fair Computation from Timed-Release Encryption and Oblivious
                  Transfer},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1281},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1281},
  timestamp    = {Wed, 15 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CouteauRR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeunardeauOMNRR19,
  author       = {Marc Beunardeau and
                  Fatima{-}Ezzahra El Orche and
                  Diana Maimut and
                  David Naccache and
                  Peter B. R{\o}nne and
                  Peter Y. A. Ryan},
  title        = {Authenticated Key Distribution: When the Coupon Collector is Your
                  Enemy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1499},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1499},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeunardeauOMNRR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/0020A0R18,
  author       = {Jun Wang and
                  Afonso Arriaga and
                  Qiang Tang and
                  Peter Y. A. Ryan},
  editor       = {David Lie and
                  Mohammad Mannan and
                  Michael Backes and
                  XiaoFeng Wang},
  title        = {Facilitating Privacy-preserving Recommendation-as-a-Service with Machine
                  Learning},
  booktitle    = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2018, Toronto, ON, Canada, October
                  15-19, 2018},
  pages        = {2306--2308},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3243734.3278504},
  doi          = {10.1145/3243734.3278504},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/0020A0R18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cecc/GencLR18,
  author       = {Ziya Alper Gen{\c{c}} and
                  Gabriele Lenzini and
                  Peter Y. A. Ryan},
  title        = {Security Analysis of Key Acquiring Strategies Used by Cryptographic
                  Ransomware},
  booktitle    = {Proceedings of the Central European Cybersecurity Conference 2018,
                  {CECC} 2018, Ljubljana, Slovenia, November 15-16, 2018},
  pages        = {7:1--7:6},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3277570.3277577},
  doi          = {10.1145/3277570.3277577},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cecc/GencLR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/GencLR18,
  author       = {Ziya Alper Gen{\c{c}} and
                  Gabriele Lenzini and
                  Peter Y. A. Ryan},
  editor       = {Cristiano Giuffrida and
                  S{\'{e}}bastien Bardin and
                  Gregory Blanc},
  title        = {No Random, No Ransom: {A} Key to Stop Cryptographic Ransomware},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 15th International Conference, {DIMVA} 2018, Saclay, France, June
                  28-29, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10885},
  pages        = {234--255},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93411-2\_11},
  doi          = {10.1007/978-3-319-93411-2\_11},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/GencLR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/GencLRS18,
  author       = {Ziya Alper Gen{\c{c}} and
                  Gabriele Lenzini and
                  Peter Y. A. Ryan and
                  Itzel V{\'{a}}zquez Sandoval},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {A Security Analysis, and a Fix, of a Code-Corrupted Honeywords System},
  booktitle    = {Proceedings of the 4th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal,
                  January 22-24, 2018},
  pages        = {83--95},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006609100830095},
  doi          = {10.5220/0006609100830095},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/GencLRS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/GencLRS18a,
  author       = {Ziya Alper Gen{\c{c}} and
                  Gabriele Lenzini and
                  Peter Y. A. Ryan and
                  Itzel V{\'{a}}zquez Sandoval},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {A Critical Security Analysis of the Password-Based Authentication
                  Honeywords System Under Code-Corruption Attack},
  booktitle    = {Information Systems Security and Privacy - 4th International Conference,
                  {ICISSP} 2018, Funchal, Madeira, Portugal, January 22-24, 2018, Revised
                  Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {977},
  pages        = {125--151},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-25109-3\_7},
  doi          = {10.1007/978-3-030-25109-3\_7},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/GencLRS18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/AtashpendarPRR18,
  author       = {Arash Atashpendar and
                  Guru{-}Vamsi Policharla and
                  Peter B. R{\o}nne and
                  Peter Y. A. Ryan},
  editor       = {Nils Gruschka},
  title        = {Revisiting Deniability in Quantum Key Exchange - via Covert Communication
                  and Entanglement Distillation},
  booktitle    = {Secure {IT} Systems - 23rd Nordic Conference, NordSec 2018, Oslo,
                  Norway, November 28-30, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11252},
  pages        = {104--120},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03638-6\_7},
  doi          = {10.1007/978-3-030-03638-6\_7},
  timestamp    = {Mon, 25 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/AtashpendarPRR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/GencLR18,
  author       = {Ziya Alper Gen{\c{c}} and
                  Gabriele Lenzini and
                  Peter Y. A. Ryan},
  editor       = {Nils Gruschka},
  title        = {Next Generation Cryptographic Ransomware},
  booktitle    = {Secure {IT} Systems - 23rd Nordic Conference, NordSec 2018, Oslo,
                  Norway, November 28-30, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11252},
  pages        = {385--401},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03638-6\_24},
  doi          = {10.1007/978-3-030-03638-6\_24},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/GencLR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BecerraRRS18,
  author       = {Jos{\'{e}} Becerra and
                  Peter B. R{\o}nne and
                  Peter Y. A. Ryan and
                  Petra Sala},
  editor       = {Vashek Maty{\'{a}}s and
                  Petr Svenda and
                  Frank Stajano and
                  Bruce Christianson and
                  Jonathan Anderson},
  title        = {HoneyPAKEs},
  booktitle    = {Security Protocols {XXVI} - 26th International Workshop, Cambridge,
                  UK, March 19-21, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11286},
  pages        = {63--77},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03251-7\_7},
  doi          = {10.1007/978-3-030-03251-7\_7},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/BecerraRRS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Ryan18,
  author       = {Peter Y. A. Ryan},
  editor       = {Vashek Maty{\'{a}}s and
                  Petr Svenda and
                  Frank Stajano and
                  Bruce Christianson and
                  Jonathan Anderson},
  title        = {HoneyPAKEs (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXVI} - 26th International Workshop, Cambridge,
                  UK, March 19-21, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11286},
  pages        = {78--83},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03251-7\_8},
  doi          = {10.1007/978-3-030-03251-7\_8},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Ryan18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/BecerraRSS18,
  author       = {Jos{\'{e}} Becerra and
                  Peter Y. A. Ryan and
                  Petra Sala and
                  Marjan Skrobot},
  editor       = {Panos Papadimitratos and
                  Kevin R. B. Butler and
                  Christina P{\"{o}}pper},
  title        = {An Offline Dictionary Attack against zkPAKE Protocol},
  booktitle    = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June
                  18-20, 2018},
  pages        = {291--292},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3212480.3226110},
  doi          = {10.1145/3212480.3226110},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/BecerraRSS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1802-00703,
  author       = {Arash Atashpendar and
                  Marc Beunardeau and
                  Aisling Connolly and
                  R{\'{e}}mi G{\'{e}}raud and
                  David Mestel and
                  A. W. Roscoe and
                  Peter Y. A. Ryan},
  title        = {From Clustering Supersequences to Entropy Minimizing Subsequences
                  for Single and Double Deletions},
  journal      = {CoRR},
  volume       = {abs/1802.00703},
  year         = {2018},
  url          = {http://arxiv.org/abs/1802.00703},
  eprinttype    = {arXiv},
  eprint       = {1802.00703},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1802-00703.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1802-02432,
  author       = {Jun Wang and
                  Afonso Arriaga and
                  Qiang Tang and
                  Peter Y. A. Ryan},
  title        = {CryptoRec: Secure Recommendations as a Service},
  journal      = {CoRR},
  volume       = {abs/1802.02432},
  year         = {2018},
  url          = {http://arxiv.org/abs/1802.02432},
  eprinttype    = {arXiv},
  eprint       = {1802.02432},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1802-02432.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1807-11609,
  author       = {Arash Atashpendar and
                  David Mestel and
                  A. W. Roscoe and
                  Peter Y. A. Ryan},
  title        = {A Proof of Entropy Minimization for Outputs in Deletion Channels via
                  Hidden Word Statistics},
  journal      = {CoRR},
  volume       = {abs/1807.11609},
  year         = {2018},
  url          = {http://arxiv.org/abs/1807.11609},
  eprinttype    = {arXiv},
  eprint       = {1807.11609},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1807-11609.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1812-02245,
  author       = {Arash Atashpendar and
                  Guru{-}Vamsi Policharla and
                  Peter B. R{\o}nne and
                  Peter Y. A. Ryan},
  title        = {Revisiting Deniability in Quantum Key Exchange via Covert Communication
                  and Entanglement Distillation},
  journal      = {CoRR},
  volume       = {abs/1812.02245},
  year         = {2018},
  url          = {http://arxiv.org/abs/1812.02245},
  eprinttype    = {arXiv},
  eprint       = {1812.02245},
  timestamp    = {Mon, 25 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1812-02245.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BellaGLR17,
  author       = {Giampaolo Bella and
                  Rosario Giustolisi and
                  Gabriele Lenzini and
                  Peter Y. A. Ryan},
  title        = {Trustworthy exams without trusted parties},
  journal      = {Comput. Secur.},
  volume       = {67},
  pages        = {291--307},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.cose.2016.12.005},
  doi          = {10.1016/J.COSE.2016.12.005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BellaGLR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/BenalohRST17,
  author       = {Josh Benaloh and
                  Peter Y. A. Ryan and
                  Steve A. Schneider and
                  Vanessa Teague},
  title        = {A Vote of Confidence?},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {15},
  number       = {3},
  pages        = {12--13},
  year         = {2017},
  url          = {https://doi.org/10.1109/MSP.2017.53},
  doi          = {10.1109/MSP.2017.53},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/BenalohRST17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/Ryan17,
  author       = {Peter Y. A. Ryan},
  editor       = {Thomas Gibson{-}Robinson and
                  Philippa J. Hopcroft and
                  Ranko Lazic},
  title        = {A Brief History of Security Protocols},
  booktitle    = {Concurrency, Security, and Puzzles - Essays Dedicated to Andrew William
                  Roscoe on the Occasion of His 60th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {10160},
  pages        = {223--245},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-51046-0\_12},
  doi          = {10.1007/978-3-319-51046-0\_12},
  timestamp    = {Thu, 22 Jul 2021 15:35:06 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/Ryan17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cecc/GencLR17,
  author       = {Ziya Alper Gen{\c{c}} and
                  Gabriele Lenzini and
                  Peter Y. A. Ryan},
  editor       = {Igor Bernik and
                  Blaz Markelj and
                  Simon Vrhovec},
  title        = {Cipher, the Random and the Ransom: {A} Survey on Current and Future
                  Ransomware},
  booktitle    = {Advances in Cybersecurity - Proceedings of the 2017 Central European
                  Cybersecurity Conference, {CECC} 2017, Ljubljana, Slovenia, November
                  16-17, 2017},
  pages        = {89--102},
  publisher    = {University of Maribor Press},
  year         = {2017},
  url          = {https://doi.org/10.18690/978-961-286-114-8.8},
  doi          = {10.18690/978-961-286-114-8.8},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cecc/GencLR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/IovinoRRR17,
  author       = {Vincenzo Iovino and
                  Alfredo Rial and
                  Peter B. R{\o}nne and
                  Peter Y. A. Ryan},
  editor       = {Michael Brenner and
                  Kurt Rohloff and
                  Joseph Bonneau and
                  Andrew Miller and
                  Peter Y. A. Ryan and
                  Vanessa Teague and
                  Andrea Bracciali and
                  Massimiliano Sala and
                  Federico Pintore and
                  Markus Jakobsson},
  title        = {Using Selene to Verify Your Vote in {JCJ}},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2017 International
                  Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April
                  7, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10323},
  pages        = {385--403},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70278-0\_24},
  doi          = {10.1007/978-3-319-70278-0\_24},
  timestamp    = {Tue, 16 Aug 2022 23:04:23 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/IovinoRRR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/Ryan17,
  author       = {Peter Y. A. Ryan},
  editor       = {Pooya Farshim and
                  Emil Simion},
  title        = {Securing the Foundations of Democracy},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 10th International Conference, SecITC 2017, Bucharest, Romania,
                  June 8-9, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10543},
  pages        = {52--66},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-69284-5\_5},
  doi          = {10.1007/978-3-319-69284-5\_5},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/Ryan17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/RoscoeR17,
  author       = {A. W. Roscoe and
                  Peter Y. A. Ryan},
  editor       = {Frank Stajano and
                  Jonathan Anderson and
                  Bruce Christianson and
                  Vashek Maty{\'{a}}s},
  title        = {Auditable PAKEs: Approaching Fair Exchange Without a {TTP}},
  booktitle    = {Security Protocols {XXV} - 25th International Workshop, Cambridge,
                  UK, March 20-22, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10476},
  pages        = {278--297},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-71075-4\_31},
  doi          = {10.1007/978-3-319-71075-4\_31},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/RoscoeR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Ryan17b,
  author       = {Peter Y. A. Ryan},
  editor       = {Frank Stajano and
                  Jonathan Anderson and
                  Bruce Christianson and
                  Vashek Maty{\'{a}}s},
  title        = {Auditable PAKEs: Approaching Fair Exchange Without a {TTP} (Transcript
                  of Discussion)},
  booktitle    = {Security Protocols {XXV} - 25th International Workshop, Cambridge,
                  UK, March 20-22, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10476},
  pages        = {298--305},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-71075-4\_32},
  doi          = {10.1007/978-3-319-71075-4\_32},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Ryan17b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/voteid/BernhardBHRRSTV17,
  author       = {Matthew Bernhard and
                  Josh Benaloh and
                  J. Alex Halderman and
                  Ronald L. Rivest and
                  Peter Y. A. Ryan and
                  Philip B. Stark and
                  Vanessa Teague and
                  Poorvi L. Vora and
                  Dan S. Wallach},
  editor       = {Robert Krimmer and
                  Melanie Volkamer and
                  Nadja Braun Binder and
                  Norbert Kersting and
                  Olivier Pereira and
                  Carsten Sch{\"{u}}rmann},
  title        = {Public Evidence from Secret Ballots},
  booktitle    = {Electronic Voting - Second International Joint Conference, E-Vote-ID
                  2017, Bregenz, Austria, October 24-27, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10615},
  pages        = {84--109},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68687-5\_6},
  doi          = {10.1007/978-3-319-68687-5\_6},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/voteid/BernhardBHRRSTV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/LenziniORRGLN17,
  author       = {Gabriele Lenzini and
                  Samir Ouchani and
                  Peter B. R{\o}nne and
                  Peter Y. A. Ryan and
                  Yong Geng and
                  Jan Lagerwall and
                  JungHyun Noh},
  title        = {Security in the shell: An optical physical unclonable function made
                  of shells of cholesteric liquid crystals},
  booktitle    = {2017 {IEEE} Workshop on Information Forensics and Security, {WIFS}
                  2017, Rennes, France, December 4-7, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/WIFS.2017.8267644},
  doi          = {10.1109/WIFS.2017.8267644},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/LenziniORRGLN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2017w,
  editor       = {Michael Brenner and
                  Kurt Rohloff and
                  Joseph Bonneau and
                  Andrew Miller and
                  Peter Y. A. Ryan and
                  Vanessa Teague and
                  Andrea Bracciali and
                  Massimiliano Sala and
                  Federico Pintore and
                  Markus Jakobsson},
  title        = {Financial Cryptography and Data Security - {FC} 2017 International
                  Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April
                  7, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10323},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70278-0},
  doi          = {10.1007/978-3-319-70278-0},
  isbn         = {978-3-319-70277-3},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/2017w.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/voteid/2016,
  editor       = {Robert Krimmer and
                  Melanie Volkamer and
                  Jordi Barrat and
                  Josh Benaloh and
                  Nicole J. Goodman and
                  Peter Y. A. Ryan and
                  Vanessa Teague},
  title        = {Electronic Voting - First International Joint Conference, E-Vote-ID
                  2016, Bregenz, Austria, October 18-21, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10141},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-52240-1},
  doi          = {10.1007/978-3-319-52240-1},
  isbn         = {978-3-319-52239-5},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/voteid/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BenalohBHRRSTVW17,
  author       = {Josh Benaloh and
                  Matthew Bernhard and
                  J. Alex Halderman and
                  Ronald L. Rivest and
                  Peter Y. A. Ryan and
                  Philip B. Stark and
                  Vanessa Teague and
                  Poorvi L. Vora and
                  Dan S. Wallach},
  title        = {Public Evidence from Secret Ballots},
  journal      = {CoRR},
  volume       = {abs/1707.08619},
  year         = {2017},
  url          = {http://arxiv.org/abs/1707.08619},
  eprinttype    = {arXiv},
  eprint       = {1707.08619},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/BenalohBHRRSTVW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/Ryan16,
  author       = {Peter Y. A. Ryan},
  editor       = {Peter Y. A. Ryan and
                  David Naccache and
                  Jean{-}Jacques Quisquater},
  title        = {Crypto Santa},
  booktitle    = {The New Codebreakers - Essays Dedicated to David Kahn on the Occasion
                  of His 85th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {9100},
  pages        = {543--549},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49301-4\_33},
  doi          = {10.1007/978-3-662-49301-4\_33},
  timestamp    = {Sat, 19 Oct 2019 20:29:10 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/Ryan16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecai/TabatabaeiJR16,
  author       = {Masoud Tabatabaei and
                  Wojciech Jamroga and
                  Peter Y. A. Ryan},
  title        = {Expressing Receipt-Freeness and Coercion-Resistance in Logics of Strategic
                  Ability: Preliminary Attempt},
  booktitle    = {Proceedings of the 1st International Workshop on {AI} for Privacy
                  and Security, PrAISe@ECAI 2016, The Hague, Netherlands, August 29-30,
                  2016},
  pages        = {1:1--1:8},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2970030.2970039},
  doi          = {10.1145/2970030.2970039},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecai/TabatabaeiJR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/RyanRI16,
  author       = {Peter Y. A. Ryan and
                  Peter B. R{\o}nne and
                  Vincenzo Iovino},
  editor       = {Jeremy Clark and
                  Sarah Meiklejohn and
                  Peter Y. A. Ryan and
                  Dan S. Wallach and
                  Michael Brenner and
                  Kurt Rohloff},
  title        = {Selene: Voting with Transparent Verifiability and Coercion-Mitigation},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2016 International
                  Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February
                  26, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9604},
  pages        = {176--192},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53357-4\_12},
  doi          = {10.1007/978-3-662-53357-4\_12},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/RyanRI16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/birthday/2016kahn,
  editor       = {Peter Y. A. Ryan and
                  David Naccache and
                  Jean{-}Jacques Quisquater},
  title        = {The New Codebreakers - Essays Dedicated to David Kahn on the Occasion
                  of His 85th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {9100},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49301-4},
  doi          = {10.1007/978-3-662-49301-4},
  isbn         = {978-3-662-49300-7},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/2016kahn.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2016w,
  editor       = {Jeremy Clark and
                  Sarah Meiklejohn and
                  Peter Y. A. Ryan and
                  Dan S. Wallach and
                  Michael Brenner and
                  Kurt Rohloff},
  title        = {Financial Cryptography and Data Security - {FC} 2016 International
                  Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February
                  26, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9604},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53357-4},
  doi          = {10.1007/978-3-662-53357-4},
  isbn         = {978-3-662-53356-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/2016w.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/Gallegos-Garcia16,
  author       = {Gina Gallegos{-}Garc{\'{\i}}a and
                  Vincenzo Iovino and
                  Alfredo Rial and
                  Peter B. R{\o}nne and
                  Peter Y. A. Ryan},
  title        = {(Universal) Unconditional Verifiability in E-Voting without Trusted
                  Parties},
  journal      = {CoRR},
  volume       = {abs/1610.06343},
  year         = {2016},
  url          = {http://arxiv.org/abs/1610.06343},
  eprinttype    = {arXiv},
  eprint       = {1610.06343},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/Gallegos-Garcia16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Gallegos-Garcia16,
  author       = {Gina Gallegos{-}Garc{\'{\i}}a and
                  Vincenzo Iovino and
                  Alfredo Rial and
                  Peter B. R{\o}nne and
                  Peter Y. A. Ryan},
  title        = {(Universal) Unconditional Verifiability in E-Voting without Trusted
                  Parties},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {975},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/975},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Gallegos-Garcia16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dagstuhl-manifestos/PreneelRRR15,
  author       = {Bart Preneel and
                  Phillip Rogaway and
                  Mark Dermot Ryan and
                  Peter Y. A. Ryan},
  title        = {Privacy and Security in an Age of Surveillance (Dagstuhl Perspectives
                  Workshop 14401)},
  journal      = {Dagstuhl Manifestos},
  volume       = {5},
  number       = {1},
  pages        = {25--37},
  year         = {2015},
  url          = {https://doi.org/10.4230/DagMan.5.1.25},
  doi          = {10.4230/DAGMAN.5.1.25},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dagstuhl-manifestos/PreneelRRR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/RyanST15,
  author       = {Peter Y. A. Ryan and
                  Steve A. Schneider and
                  Vanessa Teague},
  title        = {End-to-End Verifiability in Voting Systems, from Theory to Practice},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {13},
  number       = {3},
  pages        = {59--62},
  year         = {2015},
  url          = {https://doi.org/10.1109/MSP.2015.54},
  doi          = {10.1109/MSP.2015.54},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/RyanST15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/CulnaneRST15,
  author       = {Chris Culnane and
                  Peter Y. A. Ryan and
                  Steve A. Schneider and
                  Vanessa Teague},
  title        = {vVote: {A} Verifiable Voting System},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {18},
  number       = {1},
  pages        = {3:1--3:30},
  year         = {2015},
  url          = {https://doi.org/10.1145/2746338},
  doi          = {10.1145/2746338},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/CulnaneRST15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/BellaGLR15,
  author       = {Giampaolo Bella and
                  Rosario Giustolisi and
                  Gabriele Lenzini and
                  Peter Y. A. Ryan},
  editor       = {Hannes Federrath and
                  Dieter Gollmann},
  title        = {A Secure Exam Protocol Without Trusted Parties},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11
                  International Conference, {SEC} 2015, Hamburg, Germany, May 26-28,
                  2015, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {455},
  pages        = {495--509},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-18467-8\_33},
  doi          = {10.1007/978-3-319-18467-8\_33},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/BellaGLR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/AtashpendarRR15,
  author       = {Arash Atashpendar and
                  A. W. Roscoe and
                  Peter Y. A. Ryan},
  editor       = {Bruce Christianson and
                  Petr Svenda and
                  Vashek Maty{\'{a}}s and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Information Leakage Due to Revealing Randomly Selected Bits},
  booktitle    = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge,
                  UK, March 31 - April 2, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9379},
  pages        = {325--341},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26096-9\_33},
  doi          = {10.1007/978-3-319-26096-9\_33},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/AtashpendarRR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2015-1,
  editor       = {G{\"{u}}nther Pernul and
                  Peter Y. A. Ryan and
                  Edgar R. Weippl},
  title        = {Computer Security - {ESORICS} 2015 - 20th European Symposium on Research
                  in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9326},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24174-6},
  doi          = {10.1007/978-3-319-24174-6},
  isbn         = {978-3-319-24173-9},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/2015-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2015-2,
  editor       = {G{\"{u}}nther Pernul and
                  Peter Y. A. Ryan and
                  Edgar R. Weippl},
  title        = {Computer Security - {ESORICS} 2015 - 20th European Symposium on Research
                  in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9327},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24177-7},
  doi          = {10.1007/978-3-319-24177-7},
  isbn         = {978-3-319-24176-0},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/2015-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BenalohRRSTV15,
  author       = {Josh Benaloh and
                  Ronald L. Rivest and
                  Peter Y. A. Ryan and
                  Philip B. Stark and
                  Vanessa Teague and
                  Poorvi L. Vora},
  title        = {End-to-end verifiability},
  journal      = {CoRR},
  volume       = {abs/1504.03778},
  year         = {2015},
  url          = {http://arxiv.org/abs/1504.03778},
  eprinttype    = {arXiv},
  eprint       = {1504.03778},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/BenalohRRSTV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RyanRI15,
  author       = {Peter Y. A. Ryan and
                  Peter B. R{\o}nne and
                  Vincenzo Iovino},
  title        = {Selene: Voting with Transparent Verifiability and Coercion-Mitigation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1105},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1105},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RyanRI15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/ArriagaTR14,
  author       = {Afonso Arriaga and
                  Qiang Tang and
                  Peter Y. A. Ryan},
  editor       = {David Pointcheval and
                  Damien Vergnaud},
  title        = {Trapdoor Privacy in Asymmetric Searchable Encryption Schemes},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2014 - 7th International Conference
                  on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8469},
  pages        = {31--50},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-06734-6\_3},
  doi          = {10.1007/978-3-319-06734-6\_3},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/ArriagaTR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/DreierG0LLR14,
  author       = {Jannik Dreier and
                  Rosario Giustolisi and
                  Ali Kassem and
                  Pascal Lafourcade and
                  Gabriele Lenzini and
                  Peter Y. A. Ryan},
  editor       = {Mohammad S. Obaidat and
                  Andreas Holzinger and
                  Joaquim Filipe},
  title        = {Formal Security Analysis of Traditional and Electronic Exams},
  booktitle    = {E-Business and Telecommunications - 11th International Joint Conference,
                  {ICETE} 2014, Vienna, Austria, August 28-30, 2014, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {554},
  pages        = {294--318},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-25915-4\_16},
  doi          = {10.1007/978-3-319-25915-4\_16},
  timestamp    = {Tue, 16 Aug 2022 23:04:29 +0200},
  biburl       = {https://dblp.org/rec/conf/icete/DreierG0LLR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/DreierGKLLR14,
  author       = {Jannik Dreier and
                  Rosario Giustolisi and
                  Ali Kassem and
                  Pascal Lafourcade and
                  Gabriele Lenzini and
                  Peter Y. A. Ryan},
  editor       = {Mohammad S. Obaidat and
                  Andreas Holzinger and
                  Pierangela Samarati},
  title        = {Formal Analysis of Electronic Exams},
  booktitle    = {{SECRYPT} 2014 - Proceedings of the 11th International Conference
                  on Security and Cryptography, Vienna, Austria, 28-30 August, 2014},
  pages        = {101--112},
  publisher    = {SciTePress},
  year         = {2014},
  url          = {https://doi.org/10.5220/0005050901010112},
  doi          = {10.5220/0005050901010112},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/DreierGKLLR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/GiustolisiLR14,
  author       = {Rosario Giustolisi and
                  Gabriele Lenzini and
                  Peter Y. A. Ryan},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Maty{\'{a}}s and
                  Petr Svenda and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Remark!: {A} Secure Protocol for Remote Exams},
  booktitle    = {Security Protocols {XXII} - 22nd International Workshop Cambridge,
                  UK, March 19-21, 2014 Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8809},
  pages        = {38--48},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12400-1\_5},
  doi          = {10.1007/978-3-319-12400-1\_5},
  timestamp    = {Mon, 05 Feb 2024 20:35:15 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/GiustolisiLR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/CulnaneHJRST14,
  author       = {Chris Culnane and
                  James Heather and
                  Rui Joaquim and
                  Peter Y. A. Ryan and
                  Steve A. Schneider and
                  Vanessa Teague},
  title        = {Faster Print on Demand for Pr{\^{e}}t {\`{a}} Voter},
  booktitle    = {2014 Electronic Voting Technology Workshop/Workshop on Trustworthy
                  Elections, {EVT/WOTE} '14, San Diego, CA, USA, August 18-19, 2014},
  publisher    = {{USENIX} Association},
  year         = {2014},
  url          = {https://www.usenix.org/conference/evtwote14/workshop-program/presentation/culnane},
  timestamp    = {Mon, 01 Feb 2021 08:42:52 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/CulnaneHJRST14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/CulnaneRST14,
  author       = {Chris Culnane and
                  Peter Y. A. Ryan and
                  Steve A. Schneider and
                  Vanessa Teague},
  title        = {vVote: a Verifiable Voting System {(DRAFT)}},
  journal      = {CoRR},
  volume       = {abs/1404.6822},
  year         = {2014},
  url          = {http://arxiv.org/abs/1404.6822},
  eprinttype    = {arXiv},
  eprint       = {1404.6822},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/CulnaneRST14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dagstuhl-reports/PreneelRRR14,
  author       = {Bart Preneel and
                  Phillip Rogaway and
                  Mark Dermot Ryan and
                  Peter Y. A. Ryan},
  title        = {Privacy and Security in an Age of Surveillance (Dagstuhl Perspectives
                  Workshop 14401)},
  journal      = {Dagstuhl Reports},
  volume       = {4},
  number       = {9},
  pages        = {106--123},
  year         = {2014},
  url          = {https://doi.org/10.4230/DagRep.4.9.106},
  doi          = {10.4230/DAGREP.4.9.106},
  timestamp    = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dagstuhl-reports/PreneelRRR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PhatakTSSRK14a,
  author       = {Dhananjay S. Phatak and
                  Qiang Tang and
                  Alan T. Sherman and
                  Warren D. Smith and
                  Peter Y. A. Ryan and
                  Konstantinos Kalpakis},
  title        = {DoubleMod and SingleMod: Simple Randomized Secret-Key Encryption with
                  Bounded Homomorphicity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {670},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/670},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PhatakTSSRK14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijar/PoulyKR13,
  author       = {Marc Pouly and
                  J{\"{u}}rg Kohlas and
                  Peter Y. A. Ryan},
  title        = {Generalized information theory for hints},
  journal      = {Int. J. Approx. Reason.},
  volume       = {54},
  number       = {1},
  pages        = {228--251},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.ijar.2012.08.004},
  doi          = {10.1016/J.IJAR.2012.08.004},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijar/PoulyKR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/GrewalRBR13,
  author       = {Gurchetan S. Grewal and
                  Mark Dermot Ryan and
                  Sergiu Bursuc and
                  Peter Y. A. Ryan},
  title        = {Caveat Coercitor: Coercion-Evidence in Electronic Voting},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley,
                  CA, USA, May 19-22, 2013},
  pages        = {367--381},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SP.2013.32},
  doi          = {10.1109/SP.2013.32},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/GrewalRBR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BenalohRT13,
  author       = {Josh Benaloh and
                  Peter Y. A. Ryan and
                  Vanessa Teague},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson and
                  Joseph Bonneau},
  title        = {Verifiable Postal Voting},
  booktitle    = {Security Protocols {XXI} - 21st International Workshop, Cambridge,
                  UK, March 19-20, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8263},
  pages        = {54--65},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41717-7\_8},
  doi          = {10.1007/978-3-642-41717-7\_8},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/BenalohRT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/RyanC13,
  author       = {Peter Y. A. Ryan and
                  Bruce Christianson},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson and
                  Joseph Bonneau},
  title        = {Enhancements to Prepare-and-Measure Based {QKD} Protocols},
  booktitle    = {Security Protocols {XXI} - 21st International Workshop, Cambridge,
                  UK, March 19-20, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8263},
  pages        = {123--133},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41717-7\_14},
  doi          = {10.1007/978-3-642-41717-7\_14},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/RyanC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Ryan13,
  author       = {Peter Y. A. Ryan},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson and
                  Joseph Bonneau},
  title        = {Enhancements to Prepare-and-Measure-Based {QKD} Protocols (Transcript
                  of Discussion)},
  booktitle    = {Security Protocols {XXI} - 21st International Workshop, Cambridge,
                  UK, March 19-20, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8263},
  pages        = {134--142},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41717-7\_15},
  doi          = {10.1007/978-3-642-41717-7\_15},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Ryan13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/KhaderTR13,
  author       = {Dalia Khader and
                  Qiang Tang and
                  Peter Y. A. Ryan},
  title        = {Proving Pr{\^{e}}t {\`{a}} Voter Receipt Free Using Computational
                  Security Models},
  booktitle    = {2013 Electronic Voting Technology Workshop / Workshop on Trustworthy
                  Elections, {EVT/WOTE} '13, Washington, D.C., USA, August 12-13, 2013},
  publisher    = {{USENIX} Association},
  year         = {2013},
  url          = {https://www.usenix.org/conference/evtwote13/workshop-program/presentation/khader},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/KhaderTR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/LlewellynSXCHRS13,
  author       = {Morgan Llewellyn and
                  Steve A. Schneider and
                  Zhe Xia and
                  Chris Culnane and
                  James Heather and
                  Peter Y. A. Ryan and
                  Sriramkrishnan Srinivasan},
  title        = {Testing Voters' Understanding of a Security Mechanism Used in Verifiable
                  Voting},
  booktitle    = {2013 Electronic Voting Technology Workshop / Workshop on Trustworthy
                  Elections, {EVT/WOTE} '13, Washington, D.C., USA, August 12-13, 2013},
  publisher    = {{USENIX} Association},
  year         = {2013},
  url          = {https://www.usenix.org/conference/evtwote13/workshop-program/presentation/llewellyn},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/LlewellynSXCHRS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/voteid/DemirelHGRB13,
  author       = {Denise Demirel and
                  Maria Henning and
                  Jeroen van de Graaf and
                  Peter Y. A. Ryan and
                  Johannes Buchmann},
  editor       = {James Heather and
                  Steve A. Schneider and
                  Vanessa Teague},
  title        = {Pr{\^{e}}t {\`{a}} Voter Providing Everlasting Privacy},
  booktitle    = {E-Voting and Identify - 4th International Conference, VoteID 2013,
                  Guildford, UK, July 17-19, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7985},
  pages        = {156--175},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39185-9\_10},
  doi          = {10.1007/978-3-642-39185-9\_10},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/voteid/DemirelHGRB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ev/BurtonCHPRSSTWX12,
  author       = {Craig Burton and
                  Chris Culnane and
                  James Heather and
                  Thea Peacock and
                  Peter Y. A. Ryan and
                  Steve A. Schneider and
                  Sriramkrishnan Srinivasan and
                  Vanessa Teague and
                  Roland Wen and
                  Zhe Xia},
  editor       = {Manuel J. Kripp and
                  Melanie Volkamer and
                  R{\"{u}}diger Grimm},
  title        = {A Supervised Verifiable Voting Protocol for the Victorian Electoral
                  Commission},
  booktitle    = {5th International Conference on Electronic Voting 2012, {(EVOTE} 2012),
                  Co-organized by the Council of Europe, Gesellschaft f{\"{u}}r
                  Informatik and E-Voting.CC, July 11-14, 2012, Castle Hofen, Bregenz,
                  Austria},
  series       = {{LNI}},
  volume       = {{P-205}},
  pages        = {81--94},
  publisher    = {{GI}},
  year         = {2012},
  url          = {https://dl.gi.de/handle/20.500.12116/18227},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ev/BurtonCHPRSSTWX12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ev/KhaderSRH12,
  author       = {Dalia Khader and
                  Ben Smyth and
                  Peter Y. A. Ryan and
                  Feng Hao},
  editor       = {Manuel J. Kripp and
                  Melanie Volkamer and
                  R{\"{u}}diger Grimm},
  title        = {A Fair and Robust Voting System by Broadcast},
  booktitle    = {5th International Conference on Electronic Voting 2012, {(EVOTE} 2012),
                  Co-organized by the Council of Europe, Gesellschaft f{\"{u}}r
                  Informatik and E-Voting.CC, July 11-14, 2012, Castle Hofen, Bregenz,
                  Austria},
  series       = {{LNI}},
  volume       = {{P-205}},
  pages        = {285--299},
  publisher    = {{GI}},
  year         = {2012},
  url          = {https://dl.gi.de/handle/20.500.12116/18220},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ev/KhaderSRH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stast/Coles-KempR12,
  author       = {Lizzie Coles{-}Kemp and
                  Peter Y. A. Ryan},
  title        = {Foreword from the Programme Chairs - {STAST} 2012},
  booktitle    = {2nd Workshop on Socio-Technical Aspects in Security and Trust, {STAST}
                  2012, Cambridge, MA, USA, June 25, 2012},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/STAST.2012.5},
  doi          = {10.1109/STAST.2012.5},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stast/Coles-KempR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/BurtonCHPRSTWXS12,
  author       = {Craig Burton and
                  Chris Culnane and
                  James Heather and
                  Thea Peacock and
                  Peter Y. A. Ryan and
                  Steve A. Schneider and
                  Vanessa Teague and
                  Roland Wen and
                  Zhe Xia and
                  Sriramkrishnan Srinivasan},
  editor       = {J. Alex Halderman and
                  Olivier Pereira},
  title        = {Using Pr{\^{e}}t {\`{a}} Voter in Victoria State Elections},
  booktitle    = {2012 Electronic Voting Technology Workshop / Workshop on Trustworthy
                  Elections, {EVT/WOTE} '12, Bellevue, WA, USA, August 6-7, 2012},
  publisher    = {{USENIX} Association},
  year         = {2012},
  url          = {https://www.usenix.org/conference/evtwote12/workshop-program/presentation/burton},
  timestamp    = {Mon, 01 Feb 2021 08:43:08 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/BurtonCHPRSTWXS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/re/KramerR11,
  author       = {Simon Kramer and
                  Peter Y. A. Ryan},
  title        = {A modular multi-modal specification of real-timed, end-to-end voter-verifiable
                  voting systems},
  booktitle    = {2011 International Workshop on Requirements Engineering for Electronic
                  Voting Systems, {REVOTE} 2011, Trento, Italy, August 29, 2011},
  pages        = {9--21},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/REVOTE.2011.6045911},
  doi          = {10.1109/REVOTE.2011.6045911},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/re/KramerR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/HaoR11,
  author       = {Feng Hao and
                  Peter Y. A. Ryan},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Frank Stajano},
  title        = {How to Sync with Alice},
  booktitle    = {Security Protocols {XIX} - 19th International Workshop, Cambridge,
                  UK, March 28-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7114},
  pages        = {170--178},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25867-1\_16},
  doi          = {10.1007/978-3-642-25867-1\_16},
  timestamp    = {Mon, 12 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/HaoR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Ryan11,
  author       = {Peter Y. A. Ryan},
  editor       = {Hovav Shacham and
                  Vanessa Teague},
  title        = {Pr{\^{e}}t {\`{a}} Voter with Confirmation Codes},
  booktitle    = {2011 Electronic Voting Technology Workshop / Workshop on Trustworthy
                  Elections, {EVT/WOTE} '11, San Francisco, CA, USA, August 8-9, 2011},
  publisher    = {{USENIX} Association},
  year         = {2011},
  url          = {https://www.usenix.org/conference/evtwote-11/pr\%C3\%AAt-\%C3\%A0-voter-confirmation-codes},
  timestamp    = {Mon, 01 Feb 2021 08:42:50 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/Ryan11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/voteid/DemirelHRSV11,
  author       = {Denise Demirel and
                  Maria Henning and
                  Peter Y. A. Ryan and
                  Steve A. Schneider and
                  Melanie Volkamer},
  editor       = {Aggelos Kiayias and
                  Helger Lipmaa},
  title        = {Feasibility Analysis of Pr{\^{e}}t {\`{a}} Voter for German Federal
                  Elections},
  booktitle    = {E-Voting and Identity - Third International Conference, VoteID 2011,
                  Tallinn, Estonia, September 28-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7187},
  pages        = {158--173},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-32747-6\_10},
  doi          = {10.1007/978-3-642-32747-6\_10},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/voteid/DemirelHRSV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dagstuhl-reports/AlvarezBRR11,
  author       = {R. Michael Alvarez and
                  Josh Benaloh and
                  Alon Rosen and
                  Peter Y. A. Ryan},
  title        = {Verifiable Elections and the Public (Dagstuhl Seminar 11281)},
  journal      = {Dagstuhl Reports},
  volume       = {1},
  number       = {7},
  pages        = {36--52},
  year         = {2011},
  url          = {https://doi.org/10.4230/DagRep.1.7.36},
  doi          = {10.4230/DAGREP.1.7.36},
  timestamp    = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dagstuhl-reports/AlvarezBRR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KhaderR11,
  author       = {Dalia Khader and
                  Peter Y. A. Ryan},
  title        = {Receipt Freeness of Pr{\^{e}}t {\`{a}} Voter Provably Secure},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {594},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/594},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KhaderR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/HaoRZ10,
  author       = {Feng Hao and
                  Peter Y. A. Ryan and
                  Piotr Zielinski},
  title        = {Anonymous voting by two-round public discussion},
  journal      = {{IET} Inf. Secur.},
  volume       = {4},
  number       = {2},
  pages        = {62--67},
  year         = {2010},
  url          = {https://doi.org/10.1049/iet-ifs.2008.0127},
  doi          = {10.1049/IET-IFS.2008.0127},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/HaoRZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcos/HaoR10,
  author       = {Feng Hao and
                  Peter Y. A. Ryan},
  title        = {{J-PAKE:} Authenticated Key Exchange without {PKI}},
  journal      = {Trans. Comput. Sci.},
  volume       = {11},
  pages        = {192--206},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17697-5\_10},
  doi          = {10.1007/978-3-642-17697-5\_10},
  timestamp    = {Wed, 15 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcos/HaoR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChaumCCEPRRSSV10,
  author       = {David Chaum and
                  Richard Carback and
                  Jeremy Clark and
                  Aleksander Essex and
                  Stefan Popoveniuc and
                  Ronald L. Rivest and
                  Peter Y. A. Ryan and
                  Emily Shen and
                  Alan T. Sherman and
                  Poorvi L. Vora},
  title        = {Corrections to scantegrity {II:} end-to-end verifiability by voters
                  of optical scan elections through confirmation codes},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {5},
  number       = {1},
  pages        = {194},
  year         = {2010},
  url          = {https://doi.org/10.1109/TIFS.2010.2040672},
  doi          = {10.1109/TIFS.2010.2040672},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ChaumCCEPRRSSV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/HeatherRT10,
  author       = {James Heather and
                  Peter Y. A. Ryan and
                  Vanessa Teague},
  editor       = {Dimitris Gritzalis and
                  Bart Preneel and
                  Marianthi Theoharidou},
  title        = {Pretty Good Democracy for More Expressive Voting Schemes},
  booktitle    = {Computer Security - {ESORICS} 2010, 15th European Symposium on Research
                  in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6345},
  pages        = {405--423},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15497-3\_25},
  doi          = {10.1007/978-3-642-15497-3\_25},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/HeatherRT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/XiaCHJRSS10,
  author       = {Zhe Xia and
                  Chris Culnane and
                  James Heather and
                  Hugo Jonker and
                  Peter Y. A. Ryan and
                  Steve A. Schneider and
                  Sriramkrishnan Srinivasan},
  editor       = {Guang Gong and
                  Kishan Chand Gupta},
  title        = {Versatile Pr{\^{e}}t {\`{a}} Voter: Handling Multiple Election Methods
                  with a Unified Interface},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2010 - 11th International Conference
                  on Cryptology in India, Hyderabad, India, December 12-15, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6498},
  pages        = {98--114},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17401-8\_8},
  doi          = {10.1007/978-3-642-17401-8\_8},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/XiaCHJRSS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BellaRT10,
  author       = {Giampaolo Bella and
                  Peter Y. A. Ryan and
                  Vanessa Teague},
  editor       = {Bruce Christianson and
                  James A. Malcolm},
  title        = {Virtually Perfect Democracy},
  booktitle    = {Security Protocols {XVIII} - 18th International Workshop, Cambridge,
                  UK, March 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7061},
  pages        = {161--166},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-662-45921-8\_24},
  doi          = {10.1007/978-3-662-45921-8\_24},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/BellaRT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Ryan10,
  author       = {Peter Y. A. Ryan},
  editor       = {Bruce Christianson and
                  James A. Malcolm},
  title        = {Virtually Perfect Democracy (Transcript of Discussion)},
  booktitle    = {Security Protocols {XVIII} - 18th International Workshop, Cambridge,
                  UK, March 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7061},
  pages        = {167--174},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-662-45921-8\_25},
  doi          = {10.1007/978-3-662-45921-8\_25},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Ryan10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/MauwRR10,
  author       = {Sjouke Mauw and
                  Sasa Radomirovic and
                  Peter Y. A. Ryan},
  editor       = {Bruce Christianson and
                  James A. Malcolm},
  title        = {Security Protocols for Secret Santa},
  booktitle    = {Security Protocols {XVIII} - 18th International Workshop, Cambridge,
                  UK, March 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7061},
  pages        = {175--184},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-662-45921-8\_26},
  doi          = {10.1007/978-3-662-45921-8\_26},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/MauwRR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wote/RyanP10,
  author       = {Peter Y. A. Ryan and
                  Thea Peacock},
  editor       = {David Chaum and
                  Markus Jakobsson and
                  Ronald L. Rivest and
                  Peter Y. A. Ryan and
                  Josh Benaloh and
                  Miroslaw Kutylowski and
                  Ben Adida},
  title        = {A Threat Analysis of Pr{\^{e}}t {\`{a}} Voter},
  booktitle    = {Towards Trustworthy Elections, New Directions in Electronic Voting},
  series       = {Lecture Notes in Computer Science},
  volume       = {6000},
  pages        = {200--215},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12980-3\_12},
  doi          = {10.1007/978-3-642-12980-3\_12},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wote/RyanP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wote/2010lncs,
  editor       = {David Chaum and
                  Markus Jakobsson and
                  Ronald L. Rivest and
                  Peter Y. A. Ryan and
                  Josh Benaloh and
                  Miroslaw Kutylowski and
                  Ben Adida},
  title        = {Towards Trustworthy Elections, New Directions in Electronic Voting},
  series       = {Lecture Notes in Computer Science},
  volume       = {6000},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12980-3},
  doi          = {10.1007/978-3-642-12980-3},
  isbn         = {978-3-642-12979-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wote/2010lncs.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HaoR10,
  author       = {Feng Hao and
                  Peter Y. A. Ryan},
  title        = {{J-PAKE:} Authenticated Key Exchange Without {PKI}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {190},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/190},
  timestamp    = {Wed, 15 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HaoR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/BellaR09,
  author       = {Giampaolo Bella and
                  Peter Y. A. Ryan},
  title        = {Journal of Computer SecuritySpecial Number devoted to the best papers
                  of the Security Track at the 2006 {ACM} Symposium on Applied Computing},
  journal      = {J. Comput. Secur.},
  volume       = {17},
  number       = {3},
  pages        = {237},
  year         = {2009},
  url          = {https://doi.org/10.3233/JCS-2009-0346},
  doi          = {10.3233/JCS-2009-0346},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/BellaR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChaumCCEPRRSSV09,
  author       = {David Chaum and
                  Richard Carback and
                  Jeremy Clark and
                  Aleksander Essex and
                  Stefan Popoveniuc and
                  Ronald L. Rivest and
                  Peter Y. A. Ryan and
                  Emily Shen and
                  Alan T. Sherman and
                  Poorvi L. Vora},
  title        = {Scantegrity {II:} end-to-end verifiability by voters of optical scan
                  elections through confirmation codes},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {4},
  pages        = {611--627},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2009.2034919},
  doi          = {10.1109/TIFS.2009.2034919},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ChaumCCEPRRSSV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/RyanBHSX09,
  author       = {Peter Y. A. Ryan and
                  David Bismark and
                  James Heather and
                  Steve A. Schneider and
                  Zhe Xia},
  title        = {Pr{\^{e}}t {\`{a}} voter: a voter-verifiable voting system},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {4},
  pages        = {662--673},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2009.2033233},
  doi          = {10.1109/TIFS.2009.2033233},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/RyanBHSX09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/Ryan09,
  author       = {Peter Y. A. Ryan},
  editor       = {Pierpaolo Degano and
                  Luca Vigan{\`{o}}},
  title        = {How Many Election Officials Does It Take to Change an Election?},
  booktitle    = {Foundations and Applications of Security Analysis, Joint Workshop
                  on Automated Reasoning for Security Protocol Analysis and Issues in
                  the Theory of Security, {ARSPA-WITS} 2009, York, UK, March 28-29,
                  2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5511},
  pages        = {211--221},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03459-6\_14},
  doi          = {10.1007/978-3-642-03459-6\_14},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/Ryan09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/re/BismarkHPSXR09,
  author       = {David Bismark and
                  James Heather and
                  Roger M. A. Peel and
                  Steve A. Schneider and
                  Zhe Xia and
                  Peter Y. A. Ryan},
  title        = {Experiences Gained from the first Pr{\^{e}}t {\`{a}} Voter Implementation},
  booktitle    = {First International Workshop on Requirements Engineering for e-Voting
                  Systems, {RE-VOTE} 2009, Atlanta, Georgia, USA, August 31, 2009},
  pages        = {19--28},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/RE-VOTE.2009.5},
  doi          = {10.1109/RE-VOTE.2009.5},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/re/BismarkHPSXR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/RyanT09,
  author       = {Peter Y. A. Ryan and
                  Vanessa Teague},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {Pretty Good Democracy},
  booktitle    = {Security Protocols XVII, 17th International Workshop, Cambridge, UK,
                  April 1-3, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7028},
  pages        = {111--130},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-36213-2\_15},
  doi          = {10.1007/978-3-642-36213-2\_15},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/RyanT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Ryan09,
  author       = {Peter Y. A. Ryan},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {Pretty Good Democracy},
  booktitle    = {Security Protocols XVII, 17th International Workshop, Cambridge, UK,
                  April 1-3, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7028},
  pages        = {131--142},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-36213-2\_16},
  doi          = {10.1007/978-3-642-36213-2\_16},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Ryan09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/RyanT09,
  author       = {Peter Y. A. Ryan and
                  Vanessa Teague},
  editor       = {David Jefferson and
                  Joseph Lorenzo Hall and
                  Tal Moran},
  title        = {Permutations in Pr{\^{e}}t {\`{a}} Voter},
  booktitle    = {2009 Electronic Voting Technology Workshop / Workshop on Trustworthy
                  Elections, {EVT/WOTE} '09, Montreal, Canada, August 10-11, 2009},
  publisher    = {{USENIX} Association},
  year         = {2009},
  url          = {https://www.usenix.org/conference/evtwote-09/permutations-pr\%C3\%AAt-\%C3\%A0-voter},
  timestamp    = {Mon, 01 Feb 2021 08:43:14 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/RyanT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/corr/abs-1001-5050,
  author       = {Ali Nasrat Haidar and
                  Peter V. Coveney and
                  Ali E. Abdallah and
                  Peter Y. A. Ryan and
                  Bruce Beckles and
                  J. M. Brooke and
                  M. A. S. Jones},
  editor       = {Jeremy W. Bryans and
                  John S. Fitzgerald},
  title        = {Formal Modelling of a Usable Identity Management Solution for Virtual
                  Organisations},
  booktitle    = {Proceedings Second Workshop on Formal Aspects of Virtual Organisations,
                  {FAVO} 2009, Eindhoven, The Netherlands, 3rd November 2009},
  series       = {{EPTCS}},
  volume       = {16},
  pages        = {41--50},
  year         = {2009},
  url          = {https://doi.org/10.4204/EPTCS.16.4},
  doi          = {10.4204/EPTCS.16.4},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1001-5050.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dagstuhl/2009P9311,
  editor       = {Samuel L. Braunstein and
                  Hoi{-}Kwong Lo and
                  Kenny Paterson and
                  Peter Y. A. Ryan},
  title        = {Classical and Quantum Information Assurance Foundations and Practice,
                  26.07. - 31.07.2009},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {09311},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany},
  year         = {2009},
  url          = {http://drops.dagstuhl.de/portals/09311/},
  timestamp    = {Thu, 10 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/2009P9311.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/voteid/2009,
  editor       = {Peter Y. A. Ryan and
                  Berry Schoenmakers},
  title        = {E-Voting and Identity, Second International Conference, VoteID 2009,
                  Luxembourg, September 7-8, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5767},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04135-8},
  doi          = {10.1007/978-3-642-04135-8},
  isbn         = {978-3-642-04134-1},
  timestamp    = {Thu, 27 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/voteid/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/BraunsteinLPR09,
  author       = {Samuel L. Braunstein and
                  Hoi{-}Kwong Lo and
                  Kenny Paterson and
                  Peter Y. A. Ryan},
  editor       = {Samuel L. Braunstein and
                  Hoi{-}Kwong Lo and
                  Kenny Paterson and
                  Peter Y. A. Ryan},
  title        = {09311 Abstracts Collection - Classical and Quantum Information Assurance
                  Foundations and Practice},
  booktitle    = {Classical and Quantum Information Assurance Foundations and Practice,
                  26.07. - 31.07.2009},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {09311},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany},
  year         = {2009},
  url          = {http://drops.dagstuhl.de/opus/volltexte/2010/2365/},
  timestamp    = {Thu, 10 Jun 2021 13:02:05 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/BraunsteinLPR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/BryansKMR08,
  author       = {Jeremy W. Bryans and
                  Maciej Koutny and
                  Laurent Mazar{\'{e}} and
                  Peter Y. A. Ryan},
  title        = {Opacity generalised to transition systems},
  journal      = {Int. J. Inf. Sec.},
  volume       = {7},
  number       = {6},
  pages        = {421--435},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10207-008-0058-x},
  doi          = {10.1007/S10207-008-0058-X},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/BryansKMR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mcm/Ryan08,
  author       = {Peter Y. A. Ryan},
  title        = {Pr{\^{e}}t {\`{a}} Voter with Paillier encryption},
  journal      = {Math. Comput. Model.},
  volume       = {48},
  number       = {9-10},
  pages        = {1646--1662},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.mcm.2008.05.015},
  doi          = {10.1016/J.MCM.2008.05.015},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mcm/Ryan08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/LundinR08,
  author       = {David Lundin and
                  Peter Y. A. Ryan},
  editor       = {Sushil Jajodia and
                  Javier L{\'{o}}pez},
  title        = {Human Readable Paper Verification of Pr{\^{e}}t {\`{a}} Voter},
  booktitle    = {Computer Security - {ESORICS} 2008, 13th European Symposium on Research
                  in Computer Security, M{\'{a}}laga, Spain, October 6-8, 2008.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5283},
  pages        = {379--395},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88313-5\_25},
  doi          = {10.1007/978-3-540-88313-5\_25},
  timestamp    = {Thu, 29 Aug 2019 08:09:59 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/LundinR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ev/AraujoR08,
  author       = {Roberto Ara{\'{u}}jo and
                  Peter Y. A. Ryan},
  editor       = {Robert Krimmer and
                  R{\"{u}}diger Grimm},
  title        = {Improving the Farnel Voting Scheme},
  booktitle    = {3rd International Conference, Co-organized by Council of Europe, Gesellschaft
                  f{\"{u}}r Informatik and E-Voting.CC, August 6th-9th, 2008 in
                  Castle Hofen, Bregenz, Austria},
  series       = {{LNI}},
  volume       = {{P-131}},
  pages        = {169--182},
  publisher    = {{GI}},
  year         = {2008},
  url          = {https://dl.gi.de/handle/20.500.12116/29180},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ev/AraujoR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/HaoR08,
  author       = {Feng Hao and
                  Peter Y. A. Ryan},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {Password Authenticated Key Exchange by Juggling},
  booktitle    = {Security Protocols {XVI} - 16th International Workshop, Cambridge,
                  UK, April 16-18, 2008. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6615},
  pages        = {159--171},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-22137-8\_23},
  doi          = {10.1007/978-3-642-22137-8\_23},
  timestamp    = {Mon, 12 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/HaoR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Ryan08,
  author       = {Peter Y. A. Ryan},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {Remodelling the Attacker in Voting Protocols},
  booktitle    = {Security Protocols {XVI} - 16th International Workshop, Cambridge,
                  UK, April 16-18, 2008. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6615},
  pages        = {232--234},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-22137-8\_31},
  doi          = {10.1007/978-3-642-22137-8\_31},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Ryan08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Ryan08a,
  author       = {Peter Y. A. Ryan},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {Remodelling the Attacker in Voting Protocols (Transcript of Discussion)},
  booktitle    = {Security Protocols {XVI} - 16th International Workshop, Cambridge,
                  UK, April 16-18, 2008. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6615},
  pages        = {235--240},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-22137-8\_32},
  doi          = {10.1007/978-3-642-22137-8\_32},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Ryan08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ChaumCCEPRRSS08,
  author       = {David Chaum and
                  Richard Carback and
                  Jeremy Clark and
                  Aleksander Essex and
                  Stefan Popoveniuc and
                  Ronald L. Rivest and
                  Peter Y. A. Ryan and
                  Emily Shen and
                  Alan T. Sherman},
  editor       = {David L. Dill and
                  Tadayoshi Kohno},
  title        = {Scantegrity {II:} End-to-End Verifiability for Optical Scan Election
                  Systems using Invisible Ink Confirmation Codes},
  booktitle    = {2008 {USENIX/ACCURATE} Electronic Voting Workshop, {EVT} 2008, July
                  28-29, 2008, San Jose, CA, USA, Proceedings},
  publisher    = {{USENIX} Association},
  year         = {2008},
  url          = {http://www.usenix.org/events/evt08/tech/full\_papers/chaum/chaum.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/ChaumCCEPRRSS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dagstuhl/2007P7311,
  editor       = {David Chaum and
                  Miroslaw Kutylowski and
                  Ronald L. Rivest and
                  Peter Y. A. Ryan},
  title        = {Frontiers of Electronic Voting, 29.07. - 03.08.2007},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {07311},
  publisher    = {Internationales Begegnungs- und Forschungszentrum fuer Informatik
                  (IBFI), Schloss Dagstuhl, Germany},
  year         = {2008},
  url          = {http://drops.dagstuhl.de/portals/07311/},
  timestamp    = {Thu, 10 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/2007P7311.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AraujoR08,
  author       = {Roberto Ara{\'{u}}jo and
                  Peter Y. A. Ryan},
  title        = {Improving the Farnel, Threeballot, and Randell-Ryan Voting Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {82},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/082},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AraujoR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/DimitrakosMRS07,
  author       = {Theodosis Dimitrakos and
                  Fabio Martinelli and
                  Peter Y. A. Ryan and
                  Steve A. Schneider},
  title        = {Guest Editors' Preface},
  journal      = {Int. J. Inf. Sec.},
  volume       = {6},
  number       = {2-3},
  pages        = {65--66},
  year         = {2007},
  url          = {https://doi.org/10.1007/s10207-007-0012-3},
  doi          = {10.1007/S10207-007-0012-3},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/DimitrakosMRS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/TjostheimPR07,
  author       = {Thomas Tj{\o}stheim and
                  Thea Peacock and
                  Peter Y. A. Ryan},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {A Model for System-Based Analysis of Voting Systems},
  booktitle    = {Security Protocols - 15th International Workshop, Brno, Czech Republic,
                  April 18-20, 2007. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5964},
  pages        = {114--130},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-642-17773-6\_13},
  doi          = {10.1007/978-3-642-17773-6\_13},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/TjostheimPR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ifip1-7/2006,
  editor       = {Theodosis Dimitrakos and
                  Fabio Martinelli and
                  Peter Y. A. Ryan and
                  Steve A. Schneider},
  title        = {Formal Aspects in Security and Trust, Fourth International Workshop,
                  {FAST} 2006, Hamilton, Ontario, Canada, August 26-27, 2006, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4691},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75227-1},
  doi          = {10.1007/978-3-540-75227-1},
  isbn         = {978-3-540-75226-4},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/2006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/ChaumKRR07,
  author       = {David Chaum and
                  Miroslaw Kutylowski and
                  Ronald L. Rivest and
                  Peter Y. A. Ryan},
  editor       = {David Chaum and
                  Miroslaw Kutylowski and
                  Ronald L. Rivest and
                  Peter Y. A. Ryan},
  title        = {07311 Executive Summary -- Frontiers of Electronic Voting},
  booktitle    = {Frontiers of Electronic Voting, 29.07. - 03.08.2007},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {07311},
  publisher    = {Internationales Begegnungs- und Forschungszentrum fuer Informatik
                  (IBFI), Schloss Dagstuhl, Germany},
  year         = {2007},
  url          = {http://drops.dagstuhl.de/opus/volltexte/2008/1294},
  timestamp    = {Thu, 10 Jun 2021 13:02:04 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/ChaumKRR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/ChaumKRR07a,
  author       = {David Chaum and
                  Miroslaw Kutylowski and
                  Ronald L. Rivest and
                  Peter Y. A. Ryan},
  editor       = {David Chaum and
                  Miroslaw Kutylowski and
                  Ronald L. Rivest and
                  Peter Y. A. Ryan},
  title        = {07311 Abstracts Collection -- Frontiers of Electronic Voting},
  booktitle    = {Frontiers of Electronic Voting, 29.07. - 03.08.2007},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {07311},
  publisher    = {Internationales Begegnungs- und Forschungszentrum fuer Informatik
                  (IBFI), Schloss Dagstuhl, Germany},
  year         = {2007},
  url          = {http://drops.dagstuhl.de/opus/volltexte/2008/1303},
  timestamp    = {Thu, 23 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/ChaumKRR07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChaumGRV07,
  author       = {David Chaum and
                  Jeroen van de Graaf and
                  Peter Y. A. Ryan and
                  Poorvi L. Vora},
  title        = {Secret Ballot Elections with Unconditional Integrity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {270},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/270},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChaumGRV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/RandellR06,
  author       = {Brian Randell and
                  Peter Y. A. Ryan},
  title        = {Voting Technologies and Trust},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {4},
  number       = {5},
  pages        = {50--56},
  year         = {2006},
  url          = {https://doi.org/10.1109/MSP.2006.140},
  doi          = {10.1109/MSP.2006.140},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/RandellR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/BryansLRS06,
  author       = {Jeremy W. Bryans and
                  Bev Littlewood and
                  Peter Y. A. Ryan and
                  Lorenzo Strigini},
  title        = {E-voting: Dependability Requirements and Design for Dependability},
  booktitle    = {Proceedings of the The First International Conference on Availability,
                  Reliability and Security, {ARES} 2006, The International Dependability
                  Conference - Bridging Theory and Practice, April 20-22 2006, Vienna
                  University of Technology, Austria},
  pages        = {988--995},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ARES.2006.56},
  doi          = {10.1109/ARES.2006.56},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/BryansLRS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/RyanS06,
  author       = {Peter Y. A. Ryan and
                  Steve A. Schneider},
  editor       = {Dieter Gollmann and
                  Jan Meier and
                  Andrei Sabelfeld},
  title        = {Pr{\^{e}}t {\`{a}} Voter with Re-encryption Mixes},
  booktitle    = {Computer Security - {ESORICS} 2006, 11th European Symposium on Research
                  in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4189},
  pages        = {313--326},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11863908\_20},
  doi          = {10.1007/11863908\_20},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/RyanS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/BellaR06,
  author       = {Giampaolo Bella and
                  Peter Y. A. Ryan},
  editor       = {Hisham Haddad},
  title        = {Editorial message: special track on computer security},
  booktitle    = {Proceedings of the 2006 {ACM} Symposium on Applied Computing (SAC),
                  Dijon, France, April 23-27, 2006},
  pages        = {321--322},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1141277.1141355},
  doi          = {10.1145/1141277.1141355},
  timestamp    = {Tue, 06 Nov 2018 11:06:49 +0100},
  biburl       = {https://dblp.org/rec/conf/sac/BellaR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/RyanP06,
  author       = {Peter Y. A. Ryan and
                  Thea Peacock},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Putting the Human Back in Voting Protocols},
  booktitle    = {Security Protocols, 14th International Workshop, Cambridge, UK, March
                  27-29, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5087},
  pages        = {13--19},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-642-04904-0\_3},
  doi          = {10.1007/978-3-642-04904-0\_3},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/RyanP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Ryan06,
  author       = {Peter Y. A. Ryan},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Putting the Human Back in Voting Protocols},
  booktitle    = {Security Protocols, 14th International Workshop, Cambridge, UK, March
                  27-29, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5087},
  pages        = {20--25},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-642-04904-0\_4},
  doi          = {10.1007/978-3-642-04904-0\_4},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Ryan06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ifip1-7/2005,
  editor       = {Theodosis Dimitrakos and
                  Fabio Martinelli and
                  Peter Y. A. Ryan and
                  Steve A. Schneider},
  title        = {Formal Aspects in Security and Trust, Third International Workshop,
                  {FAST} 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3866},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11679219},
  doi          = {10.1007/11679219},
  isbn         = {3-540-32628-6},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/BellaR05,
  author       = {Giampaolo Bella and
                  Peter Y. A. Ryan},
  title        = {Guest Editors' preface},
  journal      = {J. Comput. Secur.},
  volume       = {13},
  number       = {5},
  pages        = {697},
  year         = {2005},
  url          = {https://doi.org/10.3233/jcs-2005-13501},
  doi          = {10.3233/JCS-2005-13501},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/BellaR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/Ryan05,
  author       = {Peter Ryan},
  title        = {Prospects for E-Voting},
  booktitle    = {29th Annual International Computer Software and Applications Conference,
                  {COMPSAC} 2005, Edinburgh, Scotland, UK, July 25-28, 2005. Volume
                  1},
  pages        = {501},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/COMPSAC.2005.125},
  doi          = {10.1109/COMPSAC.2005.125},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/Ryan05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/ChaumRS05,
  author       = {David Chaum and
                  Peter Y. A. Ryan and
                  Steve A. Schneider},
  editor       = {Sabrina De Capitani di Vimercati and
                  Paul F. Syverson and
                  Dieter Gollmann},
  title        = {A Practical Voter-Verifiable Election Scheme},
  booktitle    = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research
                  in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3679},
  pages        = {118--139},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11555827\_8},
  doi          = {10.1007/11555827\_8},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/ChaumRS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/RandellR05,
  author       = {Brian Randell and
                  Peter Y. A. Ryan},
  editor       = {Theodosis Dimitrakos and
                  Fabio Martinelli and
                  Peter Y. A. Ryan and
                  Steve A. Schneider},
  title        = {Voting Technologies and Trust},
  booktitle    = {Formal Aspects in Security and Trust, Third International Workshop,
                  {FAST} 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3866},
  pages        = {1--4},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11679219\_1},
  doi          = {10.1007/11679219\_1},
  timestamp    = {Sun, 02 Oct 2022 16:07:30 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/RandellR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/BryansKMR05,
  author       = {Jeremy W. Bryans and
                  Maciej Koutny and
                  Laurent Mazar{\'{e}} and
                  Peter Y. A. Ryan},
  editor       = {Theodosis Dimitrakos and
                  Fabio Martinelli and
                  Peter Y. A. Ryan and
                  Steve A. Schneider},
  title        = {Opacity Generalised to Transition Systems},
  booktitle    = {Formal Aspects in Security and Trust, Third International Workshop,
                  {FAST} 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3866},
  pages        = {81--95},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11679219\_7},
  doi          = {10.1007/11679219\_7},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/BryansKMR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/popl/Ryan05,
  author       = {Peter Y. A. Ryan},
  editor       = {Catherine Meadows},
  title        = {A variant of the Chaum voter-verifiable scheme},
  booktitle    = {Proceedings of the {POPL} 2005 Workshop on Issues in the Theory of
                  Security, {WITS} 2005, Long Beach, California, USA, January 10-11,
                  2005},
  pages        = {81--88},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1045405.1045414},
  doi          = {10.1145/1045405.1045414},
  timestamp    = {Tue, 19 Sep 2023 14:44:32 +0200},
  biburl       = {https://dblp.org/rec/conf/popl/Ryan05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/BellaR05,
  author       = {Giampaolo Bella and
                  Peter Y. A. Ryan},
  editor       = {Hisham Haddad and
                  Lorie M. Liebrock and
                  Andrea Omicini and
                  Roger L. Wainwright},
  title        = {Special track on computer security},
  booktitle    = {Proceedings of the 2005 {ACM} Symposium on Applied Computing (SAC),
                  Santa Fe, New Mexico, USA, March 13-17, 2005},
  pages        = {304--305},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1066677.1066751},
  doi          = {10.1145/1066677.1066751},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/BellaR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/Ryan04,
  author       = {Peter Y. A. Ryan},
  editor       = {Ali E. Abdallah and
                  Cliff B. Jones and
                  Jeff W. Sanders},
  title        = {Shedding Light on Haunted Corners of Information Security},
  booktitle    = {Communicating Sequential Processes: The First 25 Years, Symposium
                  on the Occasion of 25 Years of CSP, London, UK, July 7-8, 2004, Revised
                  Invited Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3525},
  pages        = {264--264},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11423348\_15},
  doi          = {10.1007/11423348\_15},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/Ryan04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/StroudWWR04,
  author       = {Robert J. Stroud and
                  Ian S. Welch and
                  John P. Warne and
                  Peter Y. A. Ryan},
  title        = {A Qualitative Analysis of the Intrusion-Tolerance Capabilities of
                  the {MAFTIA} Architecture},
  booktitle    = {2004 International Conference on Dependable Systems and Networks {(DSN}
                  2004), 28 June - 1 July 2004, Florence, Italy, Proceedings},
  pages        = {453},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/DSN.2004.1311915},
  doi          = {10.1109/DSN.2004.1311915},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/StroudWWR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/formats/Ryan04,
  author       = {Peter Y. A. Ryan},
  editor       = {Yassine Lakhnech and
                  Sergio Yovine},
  title        = {Of Elections and Electrons},
  booktitle    = {Formal Techniques, Modelling and Analysis of Timed and Fault-Tolerant
                  Systems, Joint International Conferences on Formal Modelling and Analysis
                  of Timed Systems, {FORMATS} 2004 and Formal Techniques in Real-Time
                  and Fault-Tolerant Systems, {FTRTFT} 2004, Grenoble, France, September
                  22-24, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3253},
  pages        = {3--4},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30206-3\_2},
  doi          = {10.1007/978-3-540-30206-3\_2},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/formats/Ryan04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/BryansKR04,
  author       = {Jeremy W. Bryans and
                  Maciej Koutny and
                  Peter Y. A. Ryan},
  editor       = {Theodosis Dimitrakos and
                  Fabio Martinelli},
  title        = {Modelling Dynamic Opacity Using Petri Nets with Silent Actions},
  booktitle    = {Formal Aspects in Security and Trust: Second {IFIP} {TC1} {WG1.7}
                  Workshop on Formal Aspects in Security and Trust (FAST), an event
                  of the 18th {IFIP} World Computer Congress, August 22-27, 2004, Toulouse,
                  France},
  series       = {{IFIP}},
  volume       = {173},
  pages        = {159--172},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/0-387-24098-5\_12},
  doi          = {10.1007/0-387-24098-5\_12},
  timestamp    = {Thu, 14 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/BryansKR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/BellaR04,
  author       = {Giampaolo Bella and
                  Peter Y. A. Ryan},
  editor       = {Hisham Haddad and
                  Andrea Omicini and
                  Roger L. Wainwright and
                  Lorie M. Liebrock},
  title        = {Editoral message: special track on computer security},
  booktitle    = {Proceedings of the 2004 {ACM} Symposium on Applied Computing (SAC),
                  Nicosia, Cyprus, March 14-17, 2004},
  pages        = {373--374},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/967900.967982},
  doi          = {10.1145/967900.967982},
  timestamp    = {Wed, 15 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/BellaR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/BryansKR05,
  author       = {Jeremy W. Bryans and
                  Maciej Koutny and
                  Peter Y. A. Ryan},
  editor       = {Nadia Busi and
                  Roberto Gorrieri and
                  Fabio Martinelli},
  title        = {Modelling Opacity Using Petri Nets},
  booktitle    = {Proceedings of the 2nd International Workshop on Security Issues with
                  Petri Nets and other Computational Models, WISP@ICATPN 2004, Bologna,
                  Italy, June 26, 2004},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {121},
  pages        = {101--115},
  publisher    = {Elsevier},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.entcs.2004.10.010},
  doi          = {10.1016/J.ENTCS.2004.10.010},
  timestamp    = {Tue, 13 Dec 2022 11:53:41 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/BryansKR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2004,
  editor       = {Pierangela Samarati and
                  Peter Y. A. Ryan and
                  Dieter Gollmann and
                  Refik Molva},
  title        = {Computer Security - {ESORICS} 2004, 9th European Symposium on Research
                  Computer Security, Sophia Antipolis, France, September 13-15, 2004,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3193},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/b100085},
  doi          = {10.1007/B100085},
  isbn         = {3-540-22987-6},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/2004.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/GongGRS03,
  author       = {Li Gong and
                  Joshua D. Guttman and
                  Peter Y. A. Ryan and
                  Steve A. Schneider},
  title        = {Guest editorial overview},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {21},
  number       = {1},
  pages        = {1--4},
  year         = {2003},
  url          = {https://doi.org/10.1109/JSAC.2002.806120},
  doi          = {10.1109/JSAC.2002.806120},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsac/GongGRS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Ryan03,
  author       = {Peter Y. A. Ryan},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Enforcing the Unenforceable},
  booktitle    = {Security Protocols, 11th International Workshop, Cambridge, UK, April
                  2-4, 2003, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3364},
  pages        = {178--182},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/11542322\_22},
  doi          = {10.1007/11542322\_22},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Ryan03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fasec/2002,
  editor       = {Ali E. Abdallah and
                  Peter Y. A. Ryan and
                  Steve A. Schneider},
  title        = {Formal Aspects of Security, First International Conference, FASec
                  2002, London, UK, December 16-18, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2629},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/b94774},
  doi          = {10.1007/B94774},
  isbn         = {3-540-20693-0},
  timestamp    = {Wed, 15 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fasec/2002.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/daglib/0009544,
  author       = {Peter Y. A. Ryan and
                  Steve A. Schneider},
  title        = {Modelling and analysis of security protocols},
  publisher    = {Addison-Wesley-Longman},
  year         = {2001},
  isbn         = {978-0-201-67471-2},
  timestamp    = {Fri, 25 Mar 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/daglib/0009544.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/RyanS01,
  author       = {Peter Y. A. Ryan and
                  Steve A. Schneider},
  title        = {Process Algebra and Non-Interference},
  journal      = {J. Comput. Secur.},
  volume       = {9},
  number       = {1/2},
  pages        = {75--103},
  year         = {2001},
  url          = {https://doi.org/10.3233/jcs-2001-91-204},
  doi          = {10.3233/JCS-2001-91-204},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/RyanS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/RyanMMG01,
  author       = {Peter Y. A. Ryan and
                  John D. McLean and
                  Jonathan K. Millen and
                  Virgil D. Gligor},
  title        = {Non-Interference: Who Needs It?},
  booktitle    = {14th {IEEE} Computer Security Foundations Workshop {(CSFW-14} 2001),
                  11-13 June 2001, Cape Breton, Nova Scotia, Canada},
  pages        = {237--238},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/CSFW.2001.930149},
  doi          = {10.1109/CSFW.2001.930149},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/RyanMMG01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fosad/Ryan00,
  author       = {Peter Y. A. Ryan},
  editor       = {Riccardo Focardi and
                  Roberto Gorrieri},
  title        = {Mathematical Models of Computer Security},
  booktitle    = {Foundations of Security Analysis and Design, Tutorial Lectures [revised
                  versions of lectures given during the {IFIP} {WG} 1.7 International
                  School on Foundations of Security Analysis and Design, {FOSAD} 2000,
                  Bertinoro, Italy, September 2000]},
  series       = {Lecture Notes in Computer Science},
  volume       = {2171},
  pages        = {1--62},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-45608-2\_1},
  doi          = {10.1007/3-540-45608-2\_1},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fosad/Ryan00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Ryan00,
  author       = {Peter Ryan},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  Michael Roe},
  title        = {Open Questions (Transcript of Discussion)},
  booktitle    = {Security Protocols, 8th International Workshop, Cambridge, UK, April
                  3-5, 2000, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2133},
  pages        = {49--53},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44810-1\_8},
  doi          = {10.1007/3-540-44810-1\_8},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Ryan00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/Ryan00,
  author       = {Peter Y. A. Ryan},
  editor       = {Ted Hurley and
                  M{\'{\i}}che{\'{a}}l Mac an Airchinnigh and
                  Michel P. Schellekens and
                  Anthony Karel Seda},
  title        = {Process Algebra and Information Flow},
  booktitle    = {First Irish Conference on the Mathematical Foundations of Computer
                  Science and Information Technology, {MFCSIT} 2000, Cork, Ireland,
                  July 20-21, 2000},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {40},
  pages        = {360},
  publisher    = {Elsevier},
  year         = {2000},
  url          = {https://doi.org/10.1016/S1571-0661(05)80063-5},
  doi          = {10.1016/S1571-0661(05)80063-5},
  timestamp    = {Wed, 30 Nov 2022 10:58:03 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/Ryan00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wsaif/1999,
  editor       = {Steve A. Schneider and
                  Peter Ryan},
  title        = {Workshop on Secure Architectures and Information Flow 1999, Royal
                  Holloway, London, UK, December 1-3, 1999},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {32},
  publisher    = {Elsevier},
  year         = {2000},
  url          = {https://www.sciencedirect.com/journal/electronic-notes-in-theoretical-computer-science/vol/32/suppl/C},
  timestamp    = {Wed, 30 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wsaif/1999.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/RyanS99,
  author       = {Peter Y. A. Ryan and
                  Steve A. Schneider},
  title        = {Process Algebra and Non-Interference},
  booktitle    = {Proceedings of the 12th {IEEE} Computer Security Foundations Workshop,
                  {CSFW} 1999, Mordano, Italy, June 28-30, 1999},
  pages        = {214--227},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/CSFW.1999.779775},
  doi          = {10.1109/CSFW.1999.779775},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/RyanS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/SchneiderR00,
  author       = {Steve A. Schneider and
                  Peter Ryan},
  editor       = {Steve A. Schneider and
                  Peter Ryan},
  title        = {Preface},
  booktitle    = {Workshop on Secure Architectures and Information Flow 1999, Royal
                  Holloway, London, UK, December 1-3, 1999},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {32},
  pages        = {113--114},
  publisher    = {Elsevier},
  year         = {1999},
  url          = {https://doi.org/10.1016/S1571-0661(05)80565-1},
  doi          = {10.1016/S1571-0661(05)80565-1},
  timestamp    = {Wed, 30 Nov 2022 10:28:30 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/SchneiderR00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/RyanS98,
  author       = {Peter Y. A. Ryan and
                  Steve A. Schneider},
  title        = {An Attack on a Recursive Authentication Protocol. {A} Cautionary Tale},
  journal      = {Inf. Process. Lett.},
  volume       = {65},
  number       = {1},
  pages        = {7--10},
  year         = {1998},
  url          = {https://doi.org/10.1016/S0020-0190(97)00180-4},
  doi          = {10.1016/S0020-0190(97)00180-4},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ipl/RyanS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/RyanGGKM98,
  author       = {Peter Y. A. Ryan and
                  Dieter Gollmann and
                  Li Gong and
                  G{\"{u}}nter Karjoth and
                  Chris J. Mitchell},
  title        = {Panel Introduction: The Security Impact of Distributed Computing Technologies},
  booktitle    = {Proceedings of the 11th {IEEE} Computer Security Foundations Workshop,
                  Rockport, Massachusetts, USA, June 9-11, 1998},
  pages        = {164--166},
  publisher    = {{IEEE} Computer Society},
  year         = {1998},
  url          = {https://doi.org/10.1109/CSFW.1998.683166},
  doi          = {10.1109/CSFW.1998.683166},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/RyanGGKM98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Ryan96,
  author       = {Peter Ryan},
  title        = {A Genealogy of Non-Interference},
  booktitle    = {Ninth {IEEE} Computer Security Foundations Workshop, March 10 - 12,
                  1996, Dromquinna Manor, Kenmare, County Kerry, Ireland},
  pages        = {158},
  publisher    = {{IEEE} Computer Society},
  year         = {1996},
  url          = {https://doi.org/10.1109/CSFW.1996.503700},
  doi          = {10.1109/CSFW.1996.503700},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/Ryan96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics