Peter Y. A. Ryan
Orcid: 0000-0002-1677-9034Affiliations:
- University of Luxembourg
According to our database1,
Peter Y. A. Ryan
authored at least 172 papers
between 1996 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on id.loc.gov
-
on d-nb.info
-
on wwwen.uni.lu
On csauthors.net:
Bibliography
2024
IACR Cryptol. ePrint Arch., 2024
Intelligo ut Confido: Understanding, Trust and User Experience in Verifiable Receipt-Free E-Voting (long version).
CoRR, 2024
Proceedings of the 21st International Conference on Security and Cryptography, 2024
Intelligo Ut Confido: Understanding, Trust and User Experience in Verifiable Receipt-Free E-Voting.
Proceedings of the Electronic Voting - 9th International Joint Conference, 2024
Proceedings of the Electronic Voting - 9th International Joint Conference, 2024
RISC-V Instruction Set Extensions for Multi-Precision Integer Arithmetic: A Case Study on Post-Quantum Key Exchange Using CSIDH-512.
Proceedings of the 61st ACM/IEEE Design Automation Conference, 2024
Proceedings of the 10th ACM Cyber-Physical System Security Workshop, 2024
2023
J. Comput. Secur., 2023
IoTDisco: Strong yet Lightweight End-to-End Security for the Internet of Constrained Things.
Proceedings of the Mobile, Secure, and Programmable Networking, 2023
2022
Turkish J. Electr. Eng. Comput. Sci., February, 2022
Verification of the Socio-Technical Aspects of Voting: The Case of the Polish Postal Vote 2020.
CoRR, 2022
2021
Investigating Usability and User Experience of Individually Verifiable Internet Voting Schemes.
ACM Trans. Comput. Hum. Interact., 2021
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021
Three Years Later: A Study of MAC Address Randomization In Mobile Devices And When It Succeeds.
Proc. Priv. Enhancing Technol., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
User Experience Design for E-Voting: How mental models align with security mechanisms.
CoRR, 2021
Electryo, In-person Voting with Transparent Voter Verifiability and Eligibility Verifiability.
CoRR, 2021
Root-of-Trust Abstractions for Symbolic Analysis: Application to Attestation Protocols.
Proceedings of the Security and Trust Management - 17th International Workshop, 2021
Proceedings of the Financial Cryptography and Data Security. FC 2021 International Workshops, 2021
Proceedings of the Electronic Voting - 6th International Joint Conference, 2021
Proceedings of the Electronic Voting - 6th International Joint Conference, 2021
AVRNTRU: Lightweight NTRU-based Post-Quantum Cryptography for 8-bit AVR Microcontrollers.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2021
Proceedings of the Protocols, Strands, and Logic, 2021
2020
A Survey of Requirements for COVID-19 Mitigation Strategies. Part I: Newspaper Clips.
CoRR, 2020
Proceedings of the Selected Areas in Cryptography - SAC 2020, 2020
PakeMail: Authentication and Key Management in Decentralized Secure Email and Messaging via PAKE.
Proceedings of the E-Business and Telecommunications, 2020
Short Paper: Mechanized Proofs of Verifiability and Privacy in a Paper-Based E-Voting Scheme.
Proceedings of the Financial Cryptography and Data Security, 2020
Proceedings of the Electronic Voting - 5th International Joint Conference, 2020
Proceedings of the Electronic Voting - 5th International Joint Conference, 2020
Proceedings of the 33rd IEEE Computer Security Foundations Symposium, 2020
Proceedings of the Smart Card Research and Advanced Applications, 2020
2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Fusion of Mobile Device Signal Data Attributes Enables Multi-Protocol Entity Resolution and Enhanced Large-Scale Tracking.
CoRR, 2019
Coercion-Resistant Voting in Linear Time via Fully Homomorphic Encryption: Towards a Quantum-Safe Scheme.
CoRR, 2019
Proceedings of the Information Security Theory and Practice, 2019
Proceedings of the Electronic Voting - 4th International Joint Conference, 2019
Proceedings of the ICT Systems Security and Privacy Protection, 2019
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019
Proceedings of the Financial Cryptography and Data Security, 2019
Proceedings of the Emerging Technologies for Authorization and Authentication, 2019
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019
2018
A Proof of Entropy Minimization for Outputs in Deletion Channels via Hidden Word Statistics.
CoRR, 2018
From Clustering Supersequences to Entropy Minimizing Subsequences for Single and Double Deletions.
CoRR, 2018
Proceedings of the Security Protocols XXVI, 2018
Proceedings of the Secure IT Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, 2018
Revisiting Deniability in Quantum Key Exchange - via Covert Communication and Entanglement Distillation.
Proceedings of the Secure IT Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, 2018
A Critical Security Analysis of the Password-Based Authentication Honeywords System Under Code-Corruption Attack.
Proceedings of the Information Systems Security and Privacy - 4th International Conference, 2018
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2018
Proceedings of the Central European Cybersecurity Conference 2018, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
Security in the shell: An optical physical unclonable function made of shells of cholesteric liquid crystals.
Proceedings of the 2017 IEEE Workshop on Information Forensics and Security, 2017
Proceedings of the Electronic Voting - Second International Joint Conference, 2017
Proceedings of the Security Protocols XXV, 2017
Proceedings of the Security Protocols XXV, 2017
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2017
Proceedings of the Financial Cryptography and Data Security, 2017
Proceedings of the Advances in Cybersecurity, 2017
Proceedings of the Concurrency, Security, and Puzzles, 2017
2016
IACR Cryptol. ePrint Arch., 2016
Expressing Receipt-Freeness and Coercion-Resistance in Logics of Strategic Ability: Preliminary Attempt.
Proceedings of the 1st International Workshop on AI for Privacy and Security, 2016
2015
IEEE Secur. Priv., 2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31, 2015
Proceedings of the ICT Systems Security and Privacy Protection, 2015
2014
DoubleMod and SingleMod: Simple Randomized Secret-Key Encryption with Bounded Homomorphicity.
IACR Cryptol. ePrint Arch., 2014
Privacy and Security in an Age of Surveillance (Dagstuhl Perspectives Workshop 14401).
Dagstuhl Reports, 2014
Proceedings of the 2014 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections, 2014
Proceedings of the Security Protocols XXII, 2014
Proceedings of the E-Business and Telecommunications - 11th International Joint Conference, 2014
Proceedings of the Progress in Cryptology - AFRICACRYPT 2014, 2014
2013
Proceedings of the E-Voting and Identify - 4th International Conference, 2013
Proceedings of the 2013 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2013
Proceedings of the 2013 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2013
Proceedings of the Security Protocols XXI, 2013
Proceedings of the Security Protocols XXI, 2013
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013
2012
Proceedings of the 2012 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2012
Proceedings of the 2nd Workshop on Socio-Technical Aspects in Security and Trust, 2012
Proceedings of the 5th International Conference on Electronic Voting 2012, 2012
Proceedings of the 5th International Conference on Electronic Voting 2012, 2012
2011
Proceedings of the E-Voting and Identity - Third International Conference, 2011
Proceedings of the 2011 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2011
A modular multi-modal specification of real-timed, end-to-end voter-verifiable voting systems.
Proceedings of the 2011 International Workshop on Requirements Engineering for Electronic Voting Systems, 2011
2010
Corrections to scantegrity II: end-to-end verifiability by voters of optical scan elections through confirmation codes.
IEEE Trans. Inf. Forensics Secur., 2010
Proceedings of the Towards Trustworthy Elections, New Directions in Electronic Voting, 2010
Proceedings of the Security Protocols XVIII, 2010
Proceedings of the Security Protocols XVIII, 2010
Proceedings of the Progress in Cryptology - INDOCRYPT 2010, 2010
Proceedings of the Computer Security, 2010
2009
IEEE Trans. Inf. Forensics Secur., 2009
Scantegrity II: end-to-end verifiability by voters of optical scan elections through confirmation codes.
IEEE Trans. Inf. Forensics Secur., 2009
Journal of Computer SecuritySpecial Number devoted to the best papers of the Security Track at the 2006 ACM Symposium on Applied Computing.
J. Comput. Secur., 2009
Proceedings of the Proceedings Second Workshop on Formal Aspects of Virtual Organisations, 2009
Proceedings of the 2009 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2009
Proceedings of the First International Workshop on Requirements Engineering for e-Voting Systems, 2009
Proceedings of the Foundations and Applications of Security Analysis, 2009
09311 Abstracts Collection - Classical and Quantum Information Assurance Foundations and Practice.
Proceedings of the Classical and Quantum Information Assurance Foundations and Practice, 26.07., 2009
2008
IACR Cryptol. ePrint Arch., 2008
Scantegrity II: End-to-End Verifiability for Optical Scan Election Systems using Invisible Ink Confirmation Codes.
Proceedings of the 2008 USENIX/ACCURATE Electronic Voting Workshop, 2008
Proceedings of the Security Protocols XVI, 2008
Proceedings of the Security Protocols XVI, 2008
Proceedings of the Security Protocols XVI, 2008
Proceedings of the 3rd International Conference, 2008
Proceedings of the Computer Security, 2008
2007
IACR Cryptol. ePrint Arch., 2007
Proceedings of the Security Protocols, 2007
Proceedings of the Frontiers of Electronic Voting, 29.07. - 03.08.2007, 2007
Proceedings of the Frontiers of Electronic Voting, 29.07. - 03.08.2007, 2007
2006
Proceedings of the Security Protocols, 2006
Proceedings of the Security Protocols, 2006
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006
Proceedings of the The First International Conference on Availability, 2006
2005
Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), 2005
Proceedings of the POPL 2005 Workshop on Issues in the Theory of Security, 2005
Proceedings of the Computer Security, 2005
Proceedings of the 29th Annual International Computer Software and Applications Conference, 2005
2004
Proceedings of the 2nd International Workshop on Security Issues with Petri Nets and other Computational Models, 2004
Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), 2004
Proceedings of the Formal Aspects in Security and Trust: Second IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), 2004
A Qualitative Analysis of the Intrusion-Tolerance Capabilities of the MAFTIA Architecture.
Proceedings of the 2004 International Conference on Dependable Systems and Networks (DSN 2004), 28 June, 2004
Proceedings of the Communicating Sequential Processes: The First 25 Years, 2004
2003
2001
Proceedings of the 14th IEEE Computer Security Foundations Workshop (CSFW-14 2001), 2001
Modelling and analysis of security protocols.
Addison-Wesley-Longman, ISBN: 978-0-201-67471-2, 2001
2000
Proceedings of the First Irish Conference on the Mathematical Foundations of Computer Science and Information Technology, 2000
Proceedings of the Security Protocols, 2000
Proceedings of the Foundations of Security Analysis and Design, 2000
1999
Proceedings of the Workshop on Secure Architectures and Information Flow 1999, 1999
1998
Inf. Process. Lett., 1998
Proceedings of the 11th IEEE Computer Security Foundations Workshop, 1998
1996
Proceedings of the Ninth IEEE Computer Security Foundations Workshop, March 10, 1996