Ben Smyth
Orcid: 0000-0001-5889-7541
According to our database1,
Ben Smyth
authored at least 47 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Proceedings of the 6th Conference on Blockchain Research & Applications for Innovative Networks and Services , 2024
2023
Is your vote truly secret? Ballot Secrecy iff Ballot Independence: Proving necessary conditions and analysing case studies.
CoRR, 2023
2022
2021
J. Comput. Secur., 2021
Proceedings of the Financial Cryptography and Data Security. FC 2021 International Workshops, 2021
2020
Mind the Gap: Individual- and universal-verifiability plus cast-as-intended don't yield verifiable voting systems.
IACR Cryptol. ePrint Arch., 2020
2019
Non-malleable encryption with proofs of plaintext knowledge and applications to voting.
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
TLS 1.3 for engineers: An exploration of the TLS 1.3 specification and Oracle's Java implementation.
CoRR, 2019
2018
J. Comput. Secur., 2018
IACR Cryptol. ePrint Arch., 2018
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the Financial Cryptography and Data Security, 2018
2017
Proceedings of the IEEE International Conference on Communications, 2017
2016
2015
Sci. Comput. Program., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the Principles of Security and Trust - 4th International Conference, 2015
Proceedings of the Advances in Information and Computer Security, 2015
2014
Proceedings of the Financial Cryptography and Data Security, 2014
2013
Proceedings of the 7th USENIX Workshop on Offensive Technologies, 2013
2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the IEEE PES Innovative Smart Grid Technologies Conference, 2012
Proceedings of the 5th International Conference on Electronic Voting 2012, 2012
2011
PhD thesis, 2011
Proceedings of the Formal Aspects of Security and Trust - 8th International Workshop, 2011
Proceedings of the Formal Models and Techniques for Analyzing Security Protocols, 2011
2010
Proceedings of the Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, 2010
Proceedings of the Computer Security, 2010
2008
Proceedings of the Trust Management II, 2008
2007
Proceedings of the Security and Privacy in Ad-hoc and Sensor Networks, 2007