BibTeX records: Ben Smyth

download as .bib file

@article{DBLP:journals/corr/abs-2311-12977,
  author       = {Aida Manzano Kharman and
                  Ben Smyth and
                  Freddie Page},
  title        = {Is your vote truly secret? Ballot Secrecy iff Ballot Independence:
                  Proving necessary conditions and analysing case studies},
  journal      = {CoRR},
  volume       = {abs/2311.12977},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2311.12977},
  doi          = {10.48550/ARXIV.2311.12977},
  eprinttype    = {arXiv},
  eprint       = {2311.12977},
  timestamp    = {Thu, 30 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2311-12977.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/SmythC22,
  author       = {Ben Smyth and
                  Michael R. Clarkson},
  title        = {Surveying definitions of election verifiability},
  journal      = {Inf. Process. Lett.},
  volume       = {177},
  pages        = {106267},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.ipl.2022.106267},
  doi          = {10.1016/J.IPL.2022.106267},
  timestamp    = {Wed, 01 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/SmythC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SmythC22,
  author       = {Ben Smyth and
                  Michael R. Clarkson},
  title        = {Surveying definitions of election verifiability},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {305},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/305},
  timestamp    = {Tue, 22 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/SmythC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/Smyth21,
  author       = {Ben Smyth},
  title        = {Ballot secrecy: Security definition, sufficient conditions, and analysis
                  of Helios},
  journal      = {J. Comput. Secur.},
  volume       = {29},
  number       = {6},
  pages        = {551--611},
  year         = {2021},
  url          = {https://doi.org/10.3233/JCS-191415},
  doi          = {10.3233/JCS-191415},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/Smyth21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/RonneRS21,
  author       = {Peter B. R{\o}nne and
                  Peter Y. A. Ryan and
                  Ben Smyth},
  editor       = {Matthew Bernhard and
                  Andrea Bracciali and
                  Lewis Gudgeon and
                  Thomas Haines and
                  Ariah Klages{-}Mundt and
                  Shin'ichiro Matsuo and
                  Daniel Perez and
                  Massimiliano Sala and
                  Sam Werner},
  title        = {Cast-as-Intended: {A} Formal Definition and Case Studies},
  booktitle    = {Financial Cryptography and Data Security. {FC} 2021 International
                  Workshops - CoDecFin, DeFi, VOTING, and WTSC, Virtual Event, March
                  5, 2021, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12676},
  pages        = {251--262},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-662-63958-0\_22},
  doi          = {10.1007/978-3-662-63958-0\_22},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/RonneRS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/Smyth20,
  author       = {Ben Smyth},
  title        = {Surveying global verifiability},
  journal      = {Inf. Process. Lett.},
  volume       = {163},
  pages        = {106000},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.ipl.2020.106000},
  doi          = {10.1016/J.IPL.2020.106000},
  timestamp    = {Tue, 05 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ipl/Smyth20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Smyth20,
  author       = {Ben Smyth},
  title        = {Surveying global verifiability},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {849},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/849},
  timestamp    = {Mon, 27 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Smyth20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Smyth20a,
  author       = {Ben Smyth},
  title        = {Mind the Gap: Individual- and universal-verifiability plus cast-as-intended
                  don't yield verifiable voting systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1054},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1054},
  timestamp    = {Wed, 30 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Smyth20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/SmythH19,
  author       = {Ben Smyth and
                  Yoshikazu Hanatani},
  title        = {Non-malleable encryption with proofs of plaintext knowledge and applications
                  to voting},
  journal      = {Int. J. Secur. Networks},
  volume       = {14},
  number       = {4},
  pages        = {191--204},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJSN.2019.103150},
  doi          = {10.1504/IJSN.2019.103150},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/SmythH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/MeyerS19,
  author       = {Maxime Meyer and
                  Ben Smyth},
  title        = {Exploiting re-voting in the Helios election system},
  journal      = {Inf. Process. Lett.},
  volume       = {143},
  pages        = {14--19},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.ipl.2018.11.001},
  doi          = {10.1016/J.IPL.2018.11.001},
  timestamp    = {Fri, 18 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ipl/MeyerS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/FraserQS19,
  author       = {Ashley Fraser and
                  Elizabeth A. Quaglia and
                  Ben Smyth},
  editor       = {Ron Steinfeld and
                  Tsz Hon Yuen},
  title        = {A Critique of Game-Based Definitions of Receipt-Freeness for Voting},
  booktitle    = {Provable Security - 13th International Conference, ProvSec 2019, Cairns,
                  QLD, Australia, October 1-4, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11821},
  pages        = {189--205},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-31919-9\_11},
  doi          = {10.1007/978-3-030-31919-9\_11},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/FraserQS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1904-02148,
  author       = {Ben Smyth},
  title        = {{TLS} 1.3 for engineers: An exploration of the {TLS} 1.3 specification
                  and Oracle's Java implementation},
  journal      = {CoRR},
  volume       = {abs/1904.02148},
  year         = {2019},
  url          = {http://arxiv.org/abs/1904.02148},
  eprinttype    = {arXiv},
  eprint       = {1904.02148},
  timestamp    = {Wed, 24 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1904-02148.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1906-02254,
  author       = {Maxime Meyer and
                  Elizabeth A. Quaglia and
                  Ben Smyth},
  title        = {An Overview of GSMA's {M2M} Remote Provisioning Specification},
  journal      = {CoRR},
  volume       = {abs/1906.02254},
  year         = {2019},
  url          = {http://arxiv.org/abs/1906.02254},
  eprinttype    = {arXiv},
  eprint       = {1906.02254},
  timestamp    = {Thu, 13 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1906-02254.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SmythH19,
  author       = {Ben Smyth and
                  Yoshikazu Hanatani},
  title        = {Non-malleable encryption with proofs of plaintext knowledge and applications
                  to voting},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {26},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/026},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SmythH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Smyth19,
  author       = {Ben Smyth},
  title        = {Athena: {A} verifiable, coercion-resistant voting system with linear
                  complexity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {761},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/761},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Smyth19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Smyth19a,
  author       = {Ben Smyth},
  title        = {Surveying definitions of coercion resistance},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {822},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/822},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Smyth19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FraserQS19,
  author       = {Ashley Fraser and
                  Elizabeth A. Quaglia and
                  Ben Smyth},
  title        = {A critique of game-based definitions of receipt-freeness for voting},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {853},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/853},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FraserQS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/BlanchetS18,
  author       = {Bruno Blanchet and
                  Ben Smyth},
  title        = {Automated reasoning for equivalences in the applied pi calculus with
                  barriers},
  journal      = {J. Comput. Secur.},
  volume       = {26},
  number       = {3},
  pages        = {367--422},
  year         = {2018},
  url          = {https://doi.org/10.3233/JCS-171013},
  doi          = {10.3233/JCS-171013},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/BlanchetS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/QuagliaS18,
  author       = {Elizabeth A. Quaglia and
                  Ben Smyth},
  title        = {Secret, verifiable auctions from elections},
  journal      = {Theor. Comput. Sci.},
  volume       = {730},
  pages        = {44--92},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.tcs.2018.03.022},
  doi          = {10.1016/J.TCS.2018.03.022},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/QuagliaS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/QuagliaS18,
  author       = {Elizabeth A. Quaglia and
                  Ben Smyth},
  editor       = {Antoine Joux and
                  Abderrahmane Nitaj and
                  Tajjeeddine Rachidi},
  title        = {Authentication with Weaker Trust Assumptions for Voting Systems},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2018 - 10th International Conference
                  on Cryptology in Africa, Marrakesh, Morocco, May 7-9, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10831},
  pages        = {322--343},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-89339-6\_18},
  doi          = {10.1007/978-3-319-89339-6\_18},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/QuagliaS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/MeyerQS18,
  author       = {Maxime Meyer and
                  Elizabeth A. Quaglia and
                  Ben Smyth},
  editor       = {Sarah Meiklejohn and
                  Kazue Sako},
  title        = {Attacks Against GSMA's {M2M} Remote Provisioning (Short Paper)},
  booktitle    = {Financial Cryptography and Data Security - 22nd International Conference,
                  {FC} 2018, Nieuwpoort, Cura{\c{c}}ao, February 26 - March 2, 2018,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10957},
  pages        = {243--252},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-662-58387-6\_13},
  doi          = {10.1007/978-3-662-58387-6\_13},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/MeyerQS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/Smyth18,
  author       = {Ben Smyth},
  editor       = {Aviv Zohar and
                  Ittay Eyal and
                  Vanessa Teague and
                  Jeremy Clark and
                  Andrea Bracciali and
                  Federico Pintore and
                  Massimiliano Sala},
  title        = {Verifiability of Helios Mixnet},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2018 International
                  Workshops, BITCOIN, VOTING, and WTSC, Nieuwpoort, Cura{\c{c}}ao, March
                  2, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10958},
  pages        = {247--261},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-662-58820-8\_17},
  doi          = {10.1007/978-3-662-58820-8\_17},
  timestamp    = {Wed, 16 Mar 2022 23:55:54 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/Smyth18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ChothiaRS18,
  author       = {Tom Chothia and
                  Joeri de Ruiter and
                  Ben Smyth},
  editor       = {William Enck and
                  Adrienne Porter Felt},
  title        = {Modelling and Analysis of a Hierarchy of Distance Bounding Attacks},
  booktitle    = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore,
                  MD, USA, August 15-17, 2018},
  pages        = {1563--1580},
  publisher    = {{USENIX} Association},
  year         = {2018},
  url          = {https://www.usenix.org/conference/usenixsecurity18/presentation/chothia},
  timestamp    = {Mon, 01 Feb 2021 08:43:20 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/ChothiaRS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Smyth18,
  author       = {Ben Smyth},
  title        = {Verifiability of Helios Mixnet},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {17},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/017},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Smyth18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/QuagliaS18,
  author       = {Elizabeth A. Quaglia and
                  Ben Smyth},
  title        = {Authentication with weaker trust assumptions for voting systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {222},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/222},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/QuagliaS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Smyth18a,
  author       = {Ben Smyth},
  title        = {A foundation for secret, verifiable elections},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {225},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/225},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Smyth18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/LeguayPQS17,
  author       = {Jeremie Leguay and
                  Georgios S. Paschos and
                  Elizabeth A. Quaglia and
                  Ben Smyth},
  title        = {CryptoCache: Network caching with confidentiality},
  booktitle    = {{IEEE} International Conference on Communications, {ICC} 2017, Paris,
                  France, May 21-25, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ICC.2017.7996866},
  doi          = {10.1109/ICC.2017.7996866},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/LeguayPQS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/QuagliaS17,
  author       = {Elizabeth A. Quaglia and
                  Ben Smyth},
  title        = {A short introduction to secrecy and verifiability for elections},
  journal      = {CoRR},
  volume       = {abs/1702.03168},
  year         = {2017},
  url          = {http://arxiv.org/abs/1702.03168},
  eprinttype    = {arXiv},
  eprint       = {1702.03168},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/QuagliaS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BlanchetS16,
  author       = {Bruno Blanchet and
                  Ben Smyth},
  title        = {Automated Reasoning for Equivalences in the Applied Pi Calculus with
                  Barriers},
  booktitle    = {{IEEE} 29th Computer Security Foundations Symposium, {CSF} 2016, Lisbon,
                  Portugal, June 27 - July 1, 2016},
  pages        = {310--324},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/CSF.2016.29},
  doi          = {10.1109/CSF.2016.29},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/BlanchetS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/MeyerS16,
  author       = {Maxime Meyer and
                  Ben Smyth},
  title        = {An attack against the Helios election system that violates eligibility},
  journal      = {CoRR},
  volume       = {abs/1612.04099},
  year         = {2016},
  url          = {http://arxiv.org/abs/1612.04099},
  eprinttype    = {arXiv},
  eprint       = {1612.04099},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/MeyerS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernhardCPSW16,
  author       = {David Bernhard and
                  V{\'{e}}ronique Cortier and
                  Olivier Pereira and
                  Ben Smyth and
                  Bogdan Warinschi},
  title        = {Adapting Helios for provable ballot privacy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {756},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/756},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernhardCPSW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scp/SmythRC15,
  author       = {Ben Smyth and
                  Mark Dermot Ryan and
                  Liqun Chen},
  title        = {Formal analysis of privacy in Direct Anonymous Attestation schemes},
  journal      = {Sci. Comput. Program.},
  volume       = {111},
  pages        = {300--317},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.scico.2015.04.004},
  doi          = {10.1016/J.SCICO.2015.04.004},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scp/SmythRC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/SmythHM15,
  author       = {Ben Smyth and
                  Yoshikazu Hanatani and
                  Hirofumi Muratani},
  editor       = {Keisuke Tanaka and
                  Yuji Suga},
  title        = {{NM-CPA} Secure Encryption with Proofs of Plaintext Knowledge},
  booktitle    = {Advances in Information and Computer Security - 10th International
                  Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9241},
  pages        = {115--134},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22425-1\_8},
  doi          = {10.1007/978-3-319-22425-1\_8},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/SmythHM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/ChothiaSS15,
  author       = {Tom Chothia and
                  Ben Smyth and
                  Christopher Staite},
  editor       = {Riccardo Focardi and
                  Andrew C. Myers},
  title        = {Automatically Checking Commitment Protocols in ProVerif without False
                  Attacks},
  booktitle    = {Principles of Security and Trust - 4th International Conference, {POST}
                  2015, Held as Part of the European Joint Conferences on Theory and
                  Practice of Software, {ETAPS} 2015, London, UK, April 11-18, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9036},
  pages        = {137--155},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46666-7\_8},
  doi          = {10.1007/978-3-662-46666-7\_8},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/post/ChothiaSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SmythFC15,
  author       = {Ben Smyth and
                  Steven Frink and
                  Michael R. Clarkson},
  title        = {Computational Election Verifiability: Definitions and an Analysis
                  of Helios and {JCJ}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {233},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/233},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SmythFC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Smyth15,
  author       = {Ben Smyth},
  title        = {Secrecy and independence for election schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {942},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/942},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Smyth15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/QuagliaS15,
  author       = {Elizabeth A. Quaglia and
                  Ben Smyth},
  title        = {Constructing secret, verifiable auction schemes from election schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1204},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1204},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/QuagliaS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/McCarthySQ14,
  author       = {Adam McCarthy and
                  Ben Smyth and
                  Elizabeth A. Quaglia},
  editor       = {Nicolas Christin and
                  Reihaneh Safavi{-}Naini},
  title        = {Hawk and Aucitas: e-Auction Schemes from the Helios and Civitas e-Voting
                  Schemes},
  booktitle    = {Financial Cryptography and Data Security - 18th International Conference,
                  {FC} 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8437},
  pages        = {51--63},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-45472-5\_4},
  doi          = {10.1007/978-3-662-45472-5\_4},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/McCarthySQ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Smyth14,
  author       = {Ben Smyth},
  title        = {Ballot secrecy with malicious bulletin boards},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {822},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/822},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Smyth14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/CortierS13,
  author       = {V{\'{e}}ronique Cortier and
                  Ben Smyth},
  title        = {Attacking and fixing Helios: An analysis of ballot secrecy},
  journal      = {J. Comput. Secur.},
  volume       = {21},
  number       = {1},
  pages        = {89--148},
  year         = {2013},
  url          = {https://doi.org/10.3233/JCS-2012-0458},
  doi          = {10.3233/JCS-2012-0458},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/CortierS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/SmythB13,
  author       = {Ben Smyth and
                  David Bernhard},
  editor       = {Jason Crampton and
                  Sushil Jajodia and
                  Keith Mayes},
  title        = {Ballot Secrecy and Ballot Independence Coincide},
  booktitle    = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research
                  in Computer Security, Egham, UK, September 9-13, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8134},
  pages        = {463--480},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40203-6\_26},
  doi          = {10.1007/978-3-642-40203-6\_26},
  timestamp    = {Wed, 25 Sep 2019 18:03:15 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/SmythB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/woot/SmythP13,
  author       = {Ben Smyth and
                  Alfredo Pironti},
  editor       = {Jon Oberheide and
                  William K. Robertson},
  title        = {Truncating {TLS} Connections to Violate Beliefs in Web Applications},
  booktitle    = {7th {USENIX} Workshop on Offensive Technologies, {WOOT} '13, Washington,
                  D.C., USA, August 13, 2013},
  publisher    = {{USENIX} Association},
  year         = {2013},
  url          = {https://www.usenix.org/conference/woot13/workshop-program/presentation/smyth},
  timestamp    = {Mon, 01 Feb 2021 08:41:51 +0100},
  biburl       = {https://dblp.org/rec/conf/woot/SmythP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SmythB13,
  author       = {Ben Smyth and
                  David Bernhard},
  title        = {Ballot secrecy and ballot independence coincide},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {235},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/235},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SmythB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ev/KhaderSRH12,
  author       = {Dalia Khader and
                  Ben Smyth and
                  Peter Y. A. Ryan and
                  Feng Hao},
  editor       = {Manuel J. Kripp and
                  Melanie Volkamer and
                  R{\"{u}}diger Grimm},
  title        = {A Fair and Robust Voting System by Broadcast},
  booktitle    = {5th International Conference on Electronic Voting 2012, {(EVOTE} 2012),
                  Co-organized by the Council of Europe, Gesellschaft f{\"{u}}r
                  Informatik and E-Voting.CC, July 11-14, 2012, Castle Hofen, Bregenz,
                  Austria},
  series       = {{LNI}},
  volume       = {{P-205}},
  pages        = {285--299},
  publisher    = {{GI}},
  year         = {2012},
  url          = {https://dl.gi.de/handle/20.500.12116/18220},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ev/KhaderSRH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isgt/ZhaoHKSIK12,
  author       = {Fangming Zhao and
                  Yoshikazu Hanatani and
                  Yuichi Komano and
                  Ben Smyth and
                  Satoshi Ito and
                  Toru Kambayashi},
  title        = {Secure authenticated key exchange with revocation for smart grid},
  booktitle    = {{IEEE} {PES} Innovative Smart Grid Technologies Conference, {ISGT}
                  2012, Washington, DC, USA, January 16-20, 2012},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ISGT.2012.6175530},
  doi          = {10.1109/ISGT.2012.6175530},
  timestamp    = {Wed, 16 Oct 2019 14:14:57 +0200},
  biburl       = {https://dblp.org/rec/conf/isgt/ZhaoHKSIK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ispec/2012,
  editor       = {Mark Dermot Ryan and
                  Ben Smyth and
                  Guilin Wang},
  title        = {Information Security Practice and Experience - 8th International Conference,
                  {ISPEC} 2012, Hangzhou, China, April 9-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7232},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29101-2},
  doi          = {10.1007/978-3-642-29101-2},
  isbn         = {978-3-642-29100-5},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Smyth12,
  author       = {Ben Smyth},
  title        = {Replay attacks that violate ballot secrecy in Helios},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {185},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/185},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Smyth12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SmythRC12,
  author       = {Ben Smyth and
                  Mark Dermot Ryan and
                  Liqun Chen},
  title        = {Formal analysis of privacy in Direct Anonymous Attestation schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {650},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/650},
  timestamp    = {Sun, 22 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/SmythRC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/ethos/Smyth11,
  author       = {Ben Smyth},
  title        = {Formal verification of cryptographic protocols with automated reasoning},
  school       = {University of Birmingham, {UK}},
  year         = {2011},
  url          = {http://etheses.bham.ac.uk/1604/},
  timestamp    = {Tue, 05 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/ethos/Smyth11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/CortierS11,
  author       = {V{\'{e}}ronique Cortier and
                  Ben Smyth},
  title        = {Attacking and Fixing Helios: An Analysis of Ballot Secrecy},
  booktitle    = {Proceedings of the 24th {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2011, Cernay-la-Ville, France, 27-29 June, 2011},
  pages        = {297--311},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/CSF.2011.27},
  doi          = {10.1109/CSF.2011.27},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/CortierS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BernhardCPSW11,
  author       = {David Bernhard and
                  V{\'{e}}ronique Cortier and
                  Olivier Pereira and
                  Ben Smyth and
                  Bogdan Warinschi},
  editor       = {Vijay Atluri and
                  Claudia D{\'{\i}}az},
  title        = {Adapting Helios for Provable Ballot Privacy},
  booktitle    = {Computer Security - {ESORICS} 2011 - 16th European Symposium on Research
                  in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6879},
  pages        = {335--354},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23822-2\_19},
  doi          = {10.1007/978-3-642-23822-2\_19},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/BernhardCPSW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/SmythRC11,
  author       = {Ben Smyth and
                  Mark Ryan and
                  Liqun Chen},
  editor       = {Gilles Barthe and
                  Anupam Datta and
                  Sandro Etalle},
  title        = {Formal Analysis of Anonymity in ECC-Based Direct Anonymous Attestation
                  Schemes},
  booktitle    = {Formal Aspects of Security and Trust - 8th International Workshop,
                  {FAST} 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7140},
  pages        = {245--262},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29420-4\_16},
  doi          = {10.1007/978-3-642-29420-4\_16},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/SmythRC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/ios/11/RyanS11,
  author       = {Mark Dermot Ryan and
                  Ben Smyth},
  editor       = {V{\'{e}}ronique Cortier and
                  Steve Kremer},
  title        = {Applied pi calculus},
  booktitle    = {Formal Models and Techniques for Analyzing Security Protocols},
  series       = {Cryptology and Information Security Series},
  volume       = {5},
  pages        = {112--142},
  publisher    = {{IOS} Press},
  year         = {2011},
  url          = {https://doi.org/10.3233/978-1-60750-714-7-112},
  doi          = {10.3233/978-1-60750-714-7-112},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/ios/11/RyanS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/KremerRS10,
  author       = {Steve Kremer and
                  Mark Ryan and
                  Ben Smyth},
  editor       = {Dimitris Gritzalis and
                  Bart Preneel and
                  Marianthi Theoharidou},
  title        = {Election Verifiability in Electronic Voting Protocols},
  booktitle    = {Computer Security - {ESORICS} 2010, 15th European Symposium on Research
                  in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6345},
  pages        = {389--404},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15497-3\_24},
  doi          = {10.1007/978-3-642-15497-3\_24},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/KremerRS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/SmythRKK10,
  author       = {Ben Smyth and
                  Mark Ryan and
                  Steve Kremer and
                  Mounira Kourjieh},
  editor       = {Alessandro Armando and
                  Gavin Lowe},
  title        = {Towards Automatic Analysis of Election Verifiability Properties},
  booktitle    = {Automated Reasoning for Security Protocol Analysis and Issues in the
                  Theory of Security - Joint Workshop, {ARSPA-WITS} 2010, Paphos, Cyprus,
                  March 27-28, 2010. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6186},
  pages        = {146--163},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16074-5\_11},
  doi          = {10.1007/978-3-642-16074-5\_11},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/SmythRKK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CortierS10,
  author       = {V{\'{e}}ronique Cortier and
                  Ben Smyth},
  title        = {Attacking and fixing Helios: An analysis of ballot secrecy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {625},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/625},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CortierS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifiptm/DelauneRS08,
  author       = {St{\'{e}}phanie Delaune and
                  Mark Ryan and
                  Ben Smyth},
  editor       = {Y{\"{u}}cel Karabulut and
                  John Mitchell and
                  Peter Herrmann and
                  Christian Damsgaard Jensen},
  title        = {Automatic Verification of Privacy Properties in the Applied pi Calculus},
  booktitle    = {Trust Management {II} - Proceedings of {IFIPTM} 2008: Joint iTrust
                  and {PST} Conferences on Privacy, Trust Management and Security, June
                  18-20, 2008, Trondheim, Norway},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {263},
  pages        = {263--278},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-09428-1\_17},
  doi          = {10.1007/978-0-387-09428-1\_17},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ifiptm/DelauneRS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esas/SmythRC07,
  author       = {Ben Smyth and
                  Mark Ryan and
                  Liqun Chen},
  editor       = {Frank Stajano and
                  Catherine Meadows and
                  Srdjan Capkun and
                  Tyler Moore},
  title        = {Direct Anonymous Attestation {(DAA):} Ensuring Privacy with Corrupt
                  Administrators},
  booktitle    = {Security and Privacy in Ad-hoc and Sensor Networks, 4th European Workshop,
                  {ESAS} 2007, Cambridge, UK, July 2-3, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4572},
  pages        = {218--231},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73275-4\_16},
  doi          = {10.1007/978-3-540-73275-4\_16},
  timestamp    = {Tue, 19 Sep 2023 14:44:32 +0200},
  biburl       = {https://dblp.org/rec/conf/esas/SmythRC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics