Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Ben Smyth
@article{DBLP:journals/corr/abs-2311-12977, author = {Aida Manzano Kharman and Ben Smyth and Freddie Page}, title = {Is your vote truly secret? Ballot Secrecy iff Ballot Independence: Proving necessary conditions and analysing case studies}, journal = {CoRR}, volume = {abs/2311.12977}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2311.12977}, doi = {10.48550/ARXIV.2311.12977}, eprinttype = {arXiv}, eprint = {2311.12977}, timestamp = {Thu, 30 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2311-12977.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/SmythC22, author = {Ben Smyth and Michael R. Clarkson}, title = {Surveying definitions of election verifiability}, journal = {Inf. Process. Lett.}, volume = {177}, pages = {106267}, year = {2022}, url = {https://doi.org/10.1016/j.ipl.2022.106267}, doi = {10.1016/J.IPL.2022.106267}, timestamp = {Wed, 01 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/SmythC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SmythC22, author = {Ben Smyth and Michael R. Clarkson}, title = {Surveying definitions of election verifiability}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {305}, year = {2022}, url = {https://eprint.iacr.org/2022/305}, timestamp = {Tue, 22 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/SmythC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/Smyth21, author = {Ben Smyth}, title = {Ballot secrecy: Security definition, sufficient conditions, and analysis of Helios}, journal = {J. Comput. Secur.}, volume = {29}, number = {6}, pages = {551--611}, year = {2021}, url = {https://doi.org/10.3233/JCS-191415}, doi = {10.3233/JCS-191415}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/Smyth21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/RonneRS21, author = {Peter B. R{\o}nne and Peter Y. A. Ryan and Ben Smyth}, editor = {Matthew Bernhard and Andrea Bracciali and Lewis Gudgeon and Thomas Haines and Ariah Klages{-}Mundt and Shin'ichiro Matsuo and Daniel Perez and Massimiliano Sala and Sam Werner}, title = {Cast-as-Intended: {A} Formal Definition and Case Studies}, booktitle = {Financial Cryptography and Data Security. {FC} 2021 International Workshops - CoDecFin, DeFi, VOTING, and WTSC, Virtual Event, March 5, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12676}, pages = {251--262}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-662-63958-0\_22}, doi = {10.1007/978-3-662-63958-0\_22}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/RonneRS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/Smyth20, author = {Ben Smyth}, title = {Surveying global verifiability}, journal = {Inf. Process. Lett.}, volume = {163}, pages = {106000}, year = {2020}, url = {https://doi.org/10.1016/j.ipl.2020.106000}, doi = {10.1016/J.IPL.2020.106000}, timestamp = {Tue, 05 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ipl/Smyth20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Smyth20, author = {Ben Smyth}, title = {Surveying global verifiability}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {849}, year = {2020}, url = {https://eprint.iacr.org/2020/849}, timestamp = {Mon, 27 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Smyth20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Smyth20a, author = {Ben Smyth}, title = {Mind the Gap: Individual- and universal-verifiability plus cast-as-intended don't yield verifiable voting systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1054}, year = {2020}, url = {https://eprint.iacr.org/2020/1054}, timestamp = {Wed, 30 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Smyth20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/SmythH19, author = {Ben Smyth and Yoshikazu Hanatani}, title = {Non-malleable encryption with proofs of plaintext knowledge and applications to voting}, journal = {Int. J. Secur. Networks}, volume = {14}, number = {4}, pages = {191--204}, year = {2019}, url = {https://doi.org/10.1504/IJSN.2019.103150}, doi = {10.1504/IJSN.2019.103150}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/SmythH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/MeyerS19, author = {Maxime Meyer and Ben Smyth}, title = {Exploiting re-voting in the Helios election system}, journal = {Inf. Process. Lett.}, volume = {143}, pages = {14--19}, year = {2019}, url = {https://doi.org/10.1016/j.ipl.2018.11.001}, doi = {10.1016/J.IPL.2018.11.001}, timestamp = {Fri, 18 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ipl/MeyerS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/FraserQS19, author = {Ashley Fraser and Elizabeth A. Quaglia and Ben Smyth}, editor = {Ron Steinfeld and Tsz Hon Yuen}, title = {A Critique of Game-Based Definitions of Receipt-Freeness for Voting}, booktitle = {Provable Security - 13th International Conference, ProvSec 2019, Cairns, QLD, Australia, October 1-4, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11821}, pages = {189--205}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-31919-9\_11}, doi = {10.1007/978-3-030-31919-9\_11}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/FraserQS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1904-02148, author = {Ben Smyth}, title = {{TLS} 1.3 for engineers: An exploration of the {TLS} 1.3 specification and Oracle's Java implementation}, journal = {CoRR}, volume = {abs/1904.02148}, year = {2019}, url = {http://arxiv.org/abs/1904.02148}, eprinttype = {arXiv}, eprint = {1904.02148}, timestamp = {Wed, 24 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1904-02148.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1906-02254, author = {Maxime Meyer and Elizabeth A. Quaglia and Ben Smyth}, title = {An Overview of GSMA's {M2M} Remote Provisioning Specification}, journal = {CoRR}, volume = {abs/1906.02254}, year = {2019}, url = {http://arxiv.org/abs/1906.02254}, eprinttype = {arXiv}, eprint = {1906.02254}, timestamp = {Thu, 13 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1906-02254.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SmythH19, author = {Ben Smyth and Yoshikazu Hanatani}, title = {Non-malleable encryption with proofs of plaintext knowledge and applications to voting}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {26}, year = {2019}, url = {https://eprint.iacr.org/2019/026}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SmythH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Smyth19, author = {Ben Smyth}, title = {Athena: {A} verifiable, coercion-resistant voting system with linear complexity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {761}, year = {2019}, url = {https://eprint.iacr.org/2019/761}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Smyth19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Smyth19a, author = {Ben Smyth}, title = {Surveying definitions of coercion resistance}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {822}, year = {2019}, url = {https://eprint.iacr.org/2019/822}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Smyth19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FraserQS19, author = {Ashley Fraser and Elizabeth A. Quaglia and Ben Smyth}, title = {A critique of game-based definitions of receipt-freeness for voting}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {853}, year = {2019}, url = {https://eprint.iacr.org/2019/853}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FraserQS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/BlanchetS18, author = {Bruno Blanchet and Ben Smyth}, title = {Automated reasoning for equivalences in the applied pi calculus with barriers}, journal = {J. Comput. Secur.}, volume = {26}, number = {3}, pages = {367--422}, year = {2018}, url = {https://doi.org/10.3233/JCS-171013}, doi = {10.3233/JCS-171013}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/BlanchetS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/QuagliaS18, author = {Elizabeth A. Quaglia and Ben Smyth}, title = {Secret, verifiable auctions from elections}, journal = {Theor. Comput. Sci.}, volume = {730}, pages = {44--92}, year = {2018}, url = {https://doi.org/10.1016/j.tcs.2018.03.022}, doi = {10.1016/J.TCS.2018.03.022}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/QuagliaS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/QuagliaS18, author = {Elizabeth A. Quaglia and Ben Smyth}, editor = {Antoine Joux and Abderrahmane Nitaj and Tajjeeddine Rachidi}, title = {Authentication with Weaker Trust Assumptions for Voting Systems}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2018 - 10th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 7-9, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10831}, pages = {322--343}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-89339-6\_18}, doi = {10.1007/978-3-319-89339-6\_18}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/QuagliaS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/MeyerQS18, author = {Maxime Meyer and Elizabeth A. Quaglia and Ben Smyth}, editor = {Sarah Meiklejohn and Kazue Sako}, title = {Attacks Against GSMA's {M2M} Remote Provisioning (Short Paper)}, booktitle = {Financial Cryptography and Data Security - 22nd International Conference, {FC} 2018, Nieuwpoort, Cura{\c{c}}ao, February 26 - March 2, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10957}, pages = {243--252}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-662-58387-6\_13}, doi = {10.1007/978-3-662-58387-6\_13}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/MeyerQS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Smyth18, author = {Ben Smyth}, editor = {Aviv Zohar and Ittay Eyal and Vanessa Teague and Jeremy Clark and Andrea Bracciali and Federico Pintore and Massimiliano Sala}, title = {Verifiability of Helios Mixnet}, booktitle = {Financial Cryptography and Data Security - {FC} 2018 International Workshops, BITCOIN, VOTING, and WTSC, Nieuwpoort, Cura{\c{c}}ao, March 2, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10958}, pages = {247--261}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-662-58820-8\_17}, doi = {10.1007/978-3-662-58820-8\_17}, timestamp = {Wed, 16 Mar 2022 23:55:54 +0100}, biburl = {https://dblp.org/rec/conf/fc/Smyth18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ChothiaRS18, author = {Tom Chothia and Joeri de Ruiter and Ben Smyth}, editor = {William Enck and Adrienne Porter Felt}, title = {Modelling and Analysis of a Hierarchy of Distance Bounding Attacks}, booktitle = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore, MD, USA, August 15-17, 2018}, pages = {1563--1580}, publisher = {{USENIX} Association}, year = {2018}, url = {https://www.usenix.org/conference/usenixsecurity18/presentation/chothia}, timestamp = {Mon, 01 Feb 2021 08:43:20 +0100}, biburl = {https://dblp.org/rec/conf/uss/ChothiaRS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Smyth18, author = {Ben Smyth}, title = {Verifiability of Helios Mixnet}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {17}, year = {2018}, url = {http://eprint.iacr.org/2018/017}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Smyth18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/QuagliaS18, author = {Elizabeth A. Quaglia and Ben Smyth}, title = {Authentication with weaker trust assumptions for voting systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {222}, year = {2018}, url = {http://eprint.iacr.org/2018/222}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/QuagliaS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Smyth18a, author = {Ben Smyth}, title = {A foundation for secret, verifiable elections}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {225}, year = {2018}, url = {http://eprint.iacr.org/2018/225}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Smyth18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/LeguayPQS17, author = {Jeremie Leguay and Georgios S. Paschos and Elizabeth A. Quaglia and Ben Smyth}, title = {CryptoCache: Network caching with confidentiality}, booktitle = {{IEEE} International Conference on Communications, {ICC} 2017, Paris, France, May 21-25, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ICC.2017.7996866}, doi = {10.1109/ICC.2017.7996866}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/LeguayPQS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/QuagliaS17, author = {Elizabeth A. Quaglia and Ben Smyth}, title = {A short introduction to secrecy and verifiability for elections}, journal = {CoRR}, volume = {abs/1702.03168}, year = {2017}, url = {http://arxiv.org/abs/1702.03168}, eprinttype = {arXiv}, eprint = {1702.03168}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/QuagliaS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/BlanchetS16, author = {Bruno Blanchet and Ben Smyth}, title = {Automated Reasoning for Equivalences in the Applied Pi Calculus with Barriers}, booktitle = {{IEEE} 29th Computer Security Foundations Symposium, {CSF} 2016, Lisbon, Portugal, June 27 - July 1, 2016}, pages = {310--324}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/CSF.2016.29}, doi = {10.1109/CSF.2016.29}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/BlanchetS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/MeyerS16, author = {Maxime Meyer and Ben Smyth}, title = {An attack against the Helios election system that violates eligibility}, journal = {CoRR}, volume = {abs/1612.04099}, year = {2016}, url = {http://arxiv.org/abs/1612.04099}, eprinttype = {arXiv}, eprint = {1612.04099}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/MeyerS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernhardCPSW16, author = {David Bernhard and V{\'{e}}ronique Cortier and Olivier Pereira and Ben Smyth and Bogdan Warinschi}, title = {Adapting Helios for provable ballot privacy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {756}, year = {2016}, url = {http://eprint.iacr.org/2016/756}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernhardCPSW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scp/SmythRC15, author = {Ben Smyth and Mark Dermot Ryan and Liqun Chen}, title = {Formal analysis of privacy in Direct Anonymous Attestation schemes}, journal = {Sci. Comput. Program.}, volume = {111}, pages = {300--317}, year = {2015}, url = {https://doi.org/10.1016/j.scico.2015.04.004}, doi = {10.1016/J.SCICO.2015.04.004}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scp/SmythRC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/SmythHM15, author = {Ben Smyth and Yoshikazu Hanatani and Hirofumi Muratani}, editor = {Keisuke Tanaka and Yuji Suga}, title = {{NM-CPA} Secure Encryption with Proofs of Plaintext Knowledge}, booktitle = {Advances in Information and Computer Security - 10th International Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9241}, pages = {115--134}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22425-1\_8}, doi = {10.1007/978-3-319-22425-1\_8}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/SmythHM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/ChothiaSS15, author = {Tom Chothia and Ben Smyth and Christopher Staite}, editor = {Riccardo Focardi and Andrew C. Myers}, title = {Automatically Checking Commitment Protocols in ProVerif without False Attacks}, booktitle = {Principles of Security and Trust - 4th International Conference, {POST} 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2015, London, UK, April 11-18, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9036}, pages = {137--155}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46666-7\_8}, doi = {10.1007/978-3-662-46666-7\_8}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/post/ChothiaSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SmythFC15, author = {Ben Smyth and Steven Frink and Michael R. Clarkson}, title = {Computational Election Verifiability: Definitions and an Analysis of Helios and {JCJ}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {233}, year = {2015}, url = {http://eprint.iacr.org/2015/233}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SmythFC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Smyth15, author = {Ben Smyth}, title = {Secrecy and independence for election schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {942}, year = {2015}, url = {http://eprint.iacr.org/2015/942}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Smyth15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/QuagliaS15, author = {Elizabeth A. Quaglia and Ben Smyth}, title = {Constructing secret, verifiable auction schemes from election schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1204}, year = {2015}, url = {http://eprint.iacr.org/2015/1204}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/QuagliaS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/McCarthySQ14, author = {Adam McCarthy and Ben Smyth and Elizabeth A. Quaglia}, editor = {Nicolas Christin and Reihaneh Safavi{-}Naini}, title = {Hawk and Aucitas: e-Auction Schemes from the Helios and Civitas e-Voting Schemes}, booktitle = {Financial Cryptography and Data Security - 18th International Conference, {FC} 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8437}, pages = {51--63}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45472-5\_4}, doi = {10.1007/978-3-662-45472-5\_4}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/McCarthySQ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Smyth14, author = {Ben Smyth}, title = {Ballot secrecy with malicious bulletin boards}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {822}, year = {2014}, url = {http://eprint.iacr.org/2014/822}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Smyth14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/CortierS13, author = {V{\'{e}}ronique Cortier and Ben Smyth}, title = {Attacking and fixing Helios: An analysis of ballot secrecy}, journal = {J. Comput. Secur.}, volume = {21}, number = {1}, pages = {89--148}, year = {2013}, url = {https://doi.org/10.3233/JCS-2012-0458}, doi = {10.3233/JCS-2012-0458}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/CortierS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/SmythB13, author = {Ben Smyth and David Bernhard}, editor = {Jason Crampton and Sushil Jajodia and Keith Mayes}, title = {Ballot Secrecy and Ballot Independence Coincide}, booktitle = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8134}, pages = {463--480}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40203-6\_26}, doi = {10.1007/978-3-642-40203-6\_26}, timestamp = {Wed, 25 Sep 2019 18:03:15 +0200}, biburl = {https://dblp.org/rec/conf/esorics/SmythB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/woot/SmythP13, author = {Ben Smyth and Alfredo Pironti}, editor = {Jon Oberheide and William K. Robertson}, title = {Truncating {TLS} Connections to Violate Beliefs in Web Applications}, booktitle = {7th {USENIX} Workshop on Offensive Technologies, {WOOT} '13, Washington, D.C., USA, August 13, 2013}, publisher = {{USENIX} Association}, year = {2013}, url = {https://www.usenix.org/conference/woot13/workshop-program/presentation/smyth}, timestamp = {Mon, 01 Feb 2021 08:41:51 +0100}, biburl = {https://dblp.org/rec/conf/woot/SmythP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SmythB13, author = {Ben Smyth and David Bernhard}, title = {Ballot secrecy and ballot independence coincide}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {235}, year = {2013}, url = {http://eprint.iacr.org/2013/235}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SmythB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ev/KhaderSRH12, author = {Dalia Khader and Ben Smyth and Peter Y. A. Ryan and Feng Hao}, editor = {Manuel J. Kripp and Melanie Volkamer and R{\"{u}}diger Grimm}, title = {A Fair and Robust Voting System by Broadcast}, booktitle = {5th International Conference on Electronic Voting 2012, {(EVOTE} 2012), Co-organized by the Council of Europe, Gesellschaft f{\"{u}}r Informatik and E-Voting.CC, July 11-14, 2012, Castle Hofen, Bregenz, Austria}, series = {{LNI}}, volume = {{P-205}}, pages = {285--299}, publisher = {{GI}}, year = {2012}, url = {https://dl.gi.de/handle/20.500.12116/18220}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ev/KhaderSRH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isgt/ZhaoHKSIK12, author = {Fangming Zhao and Yoshikazu Hanatani and Yuichi Komano and Ben Smyth and Satoshi Ito and Toru Kambayashi}, title = {Secure authenticated key exchange with revocation for smart grid}, booktitle = {{IEEE} {PES} Innovative Smart Grid Technologies Conference, {ISGT} 2012, Washington, DC, USA, January 16-20, 2012}, pages = {1--8}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ISGT.2012.6175530}, doi = {10.1109/ISGT.2012.6175530}, timestamp = {Wed, 16 Oct 2019 14:14:57 +0200}, biburl = {https://dblp.org/rec/conf/isgt/ZhaoHKSIK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ispec/2012, editor = {Mark Dermot Ryan and Ben Smyth and Guilin Wang}, title = {Information Security Practice and Experience - 8th International Conference, {ISPEC} 2012, Hangzhou, China, April 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7232}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29101-2}, doi = {10.1007/978-3-642-29101-2}, isbn = {978-3-642-29100-5}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Smyth12, author = {Ben Smyth}, title = {Replay attacks that violate ballot secrecy in Helios}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {185}, year = {2012}, url = {http://eprint.iacr.org/2012/185}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Smyth12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SmythRC12, author = {Ben Smyth and Mark Dermot Ryan and Liqun Chen}, title = {Formal analysis of privacy in Direct Anonymous Attestation schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {650}, year = {2012}, url = {http://eprint.iacr.org/2012/650}, timestamp = {Sun, 22 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/SmythRC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/ethos/Smyth11, author = {Ben Smyth}, title = {Formal verification of cryptographic protocols with automated reasoning}, school = {University of Birmingham, {UK}}, year = {2011}, url = {http://etheses.bham.ac.uk/1604/}, timestamp = {Tue, 05 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/ethos/Smyth11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/CortierS11, author = {V{\'{e}}ronique Cortier and Ben Smyth}, title = {Attacking and Fixing Helios: An Analysis of Ballot Secrecy}, booktitle = {Proceedings of the 24th {IEEE} Computer Security Foundations Symposium, {CSF} 2011, Cernay-la-Ville, France, 27-29 June, 2011}, pages = {297--311}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/CSF.2011.27}, doi = {10.1109/CSF.2011.27}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/CortierS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BernhardCPSW11, author = {David Bernhard and V{\'{e}}ronique Cortier and Olivier Pereira and Ben Smyth and Bogdan Warinschi}, editor = {Vijay Atluri and Claudia D{\'{\i}}az}, title = {Adapting Helios for Provable Ballot Privacy}, booktitle = {Computer Security - {ESORICS} 2011 - 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6879}, pages = {335--354}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23822-2\_19}, doi = {10.1007/978-3-642-23822-2\_19}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/BernhardCPSW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/SmythRC11, author = {Ben Smyth and Mark Ryan and Liqun Chen}, editor = {Gilles Barthe and Anupam Datta and Sandro Etalle}, title = {Formal Analysis of Anonymity in ECC-Based Direct Anonymous Attestation Schemes}, booktitle = {Formal Aspects of Security and Trust - 8th International Workshop, {FAST} 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7140}, pages = {245--262}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29420-4\_16}, doi = {10.1007/978-3-642-29420-4\_16}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ifip1-7/SmythRC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/ios/11/RyanS11, author = {Mark Dermot Ryan and Ben Smyth}, editor = {V{\'{e}}ronique Cortier and Steve Kremer}, title = {Applied pi calculus}, booktitle = {Formal Models and Techniques for Analyzing Security Protocols}, series = {Cryptology and Information Security Series}, volume = {5}, pages = {112--142}, publisher = {{IOS} Press}, year = {2011}, url = {https://doi.org/10.3233/978-1-60750-714-7-112}, doi = {10.3233/978-1-60750-714-7-112}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/ios/11/RyanS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/KremerRS10, author = {Steve Kremer and Mark Ryan and Ben Smyth}, editor = {Dimitris Gritzalis and Bart Preneel and Marianthi Theoharidou}, title = {Election Verifiability in Electronic Voting Protocols}, booktitle = {Computer Security - {ESORICS} 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6345}, pages = {389--404}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15497-3\_24}, doi = {10.1007/978-3-642-15497-3\_24}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/KremerRS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/SmythRKK10, author = {Ben Smyth and Mark Ryan and Steve Kremer and Mounira Kourjieh}, editor = {Alessandro Armando and Gavin Lowe}, title = {Towards Automatic Analysis of Election Verifiability Properties}, booktitle = {Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security - Joint Workshop, {ARSPA-WITS} 2010, Paphos, Cyprus, March 27-28, 2010. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6186}, pages = {146--163}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16074-5\_11}, doi = {10.1007/978-3-642-16074-5\_11}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ifip1-7/SmythRKK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CortierS10, author = {V{\'{e}}ronique Cortier and Ben Smyth}, title = {Attacking and fixing Helios: An analysis of ballot secrecy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {625}, year = {2010}, url = {http://eprint.iacr.org/2010/625}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CortierS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifiptm/DelauneRS08, author = {St{\'{e}}phanie Delaune and Mark Ryan and Ben Smyth}, editor = {Y{\"{u}}cel Karabulut and John Mitchell and Peter Herrmann and Christian Damsgaard Jensen}, title = {Automatic Verification of Privacy Properties in the Applied pi Calculus}, booktitle = {Trust Management {II} - Proceedings of {IFIPTM} 2008: Joint iTrust and {PST} Conferences on Privacy, Trust Management and Security, June 18-20, 2008, Trondheim, Norway}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {263}, pages = {263--278}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-09428-1\_17}, doi = {10.1007/978-0-387-09428-1\_17}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ifiptm/DelauneRS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/SmythRC07, author = {Ben Smyth and Mark Ryan and Liqun Chen}, editor = {Frank Stajano and Catherine Meadows and Srdjan Capkun and Tyler Moore}, title = {Direct Anonymous Attestation {(DAA):} Ensuring Privacy with Corrupt Administrators}, booktitle = {Security and Privacy in Ad-hoc and Sensor Networks, 4th European Workshop, {ESAS} 2007, Cambridge, UK, July 2-3, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4572}, pages = {218--231}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73275-4\_16}, doi = {10.1007/978-3-540-73275-4\_16}, timestamp = {Tue, 19 Sep 2023 14:44:32 +0200}, biburl = {https://dblp.org/rec/conf/esas/SmythRC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.