Toggle Main Menu Toggle Search

Open Access padlockePrints

Browsing publications by Professor Peter Ryan.

Newcastle AuthorsTitleYearFull text
Professor Feng Hao
Professor Peter Ryan
Preface2016
Professor Feng Hao
Professor Peter Ryan
Real-World Electronic Voting: Design, Analysis and Deployment2016
Professor Feng Hao
Professor Peter Ryan
How to Sync with Alice2011
Professor Feng Hao
Professor Peter Ryan
How to Sync with Alice2011
Thomas Tjostheim
Thea Peacock
Professor Peter Ryan
A model for system-based analysis of voting systems2010
Professor Peter Ryan
Thea Peacock
A threat analysis of Prêt à voter2010
Professor Feng Hao
Professor Peter Ryan
Anonymous voting by two-round public discussion2010
Professor Feng Hao
Professor Peter Ryan
J-PAKE: Authenticated Key Exchange Without PKI2010
Professor Peter Ryan
Gaining assurance in a voter-verifiable voting system2009
Professor Peter Ryan
Journal of computer security: Special number devoted to the best papers of the security track at the 2006 ACM symposium on applied computing2009
Professor Peter Ryan
Thea Peacock
Putting the human back in voting protocols2009
Professor Peter Ryan
Thea Peacock
Putting the Human Back in Voting Protocols2009
Professor Peter Ryan
Human readable paper verification of Pret a Voter2008
Professor Peter Ryan
Human readable paper verification of prêt à voter2008
Professor Peter Ryan
Improving Farnel, Threeballot, and Randell-Ryan Voting Schemes2008
Dr Jeremy Bryans
Professor Maciej Koutny
Professor Peter Ryan
Opacity generalised to transition systems2008
Professor Feng Hao
Professor Peter Ryan
Password Authenticated Key Exchange by Juggling2008
Professor Peter Ryan
Prêt à Voter with Paillier encryption2008
Professor Peter Ryan
Prêt à Voter with Paillier Encryption - extended journal version2008
Professor Peter Ryan
Scantegrity II: End-to-End Verifiability for Optical Scan Election Systems using Invisible Ink Confirmation Codes2008
Professor Peter Ryan
The Code d'Azur and Phoenix Ciphers-A Note on a New Class of Block Ciphers Based on Matrix Transposition2008
Thomas Tjostheim
Thea Peacock
Professor Peter Ryan
A Case Study in System-Based Analysis: The ThreeBallot Voting System and Prêt à Voter2007
Thomas Tjostheim
Thea Peacock
Professor Peter Ryan
A Model for Systematic Analysis of Voting Systems2007
Professor Peter Ryan
Guest editors' preface2007
Professor Peter Ryan
Pret a Voter with a Human-Readable, Paper Audit Trail2007
Professor Peter Ryan
Pret a Voter with Paillier Encryption2007
Professor Peter Ryan
Secret Ballot Elections with Unconditional Integrity2007
Thea Peacock
Professor Peter Ryan
Coercion-resistance as Opacity in Voting Systems2006
Professor Peter Ryan
Editorial Message special track on computer security2006
Dr Jeremy Bryans
Professor Peter Ryan
E-voting: Dependability requirements and design for dependability2006
Professor Peter Ryan
Thea Peacock
Opacity - Further Insights on an Information Flow Property2006
Dr Jeremy Bryans
Professor Peter Ryan
Opacity generalised to transition systems2006
Dr Jeremy Bryans
Professor Maciej Koutny
Professor Peter Ryan
Opacity generalised to transition systems2006
Professor Peter Ryan
Pret a Voter with Paillier Encryption2006
Professor Peter Ryan
Pret a Voter with Re-encryption Mixes2006
Professor Peter Ryan
Pret à Voter with Re-encryption Mixes2006
Professor Peter Ryan
Prêt à Voter with Re-encryption Mixes2006
Professor Peter Ryan
Thea Peacock
Putting the Human back in Voting Protocols2006
Professor Peter Ryan
The Computer Ate my Vote2006
Professor Peter Ryan
Thea Peacock
Threat Analysis of Cryptographic Election Schemes2006
Professor Peter Ryan
Verified Encrypted Paper Audit Trails2006
Professor Brian Randell
Professor Peter Ryan
Voting technologies and trust2006
Professor Brian Randell
Professor Peter Ryan
Voting technologies and trust2006
Professor Peter Ryan
A practical voter-verifiable election scheme2005
Professor Peter Ryan
A Practical, Voter-verifiable Election Scheme2005
Professor Peter Ryan
Kian Tan
Editorial message: Special track on computer security2005
Professor Peter Ryan
Enforcing the unenforceable2005
Professor Peter Ryan
Enforcing the unenforceable2005
Professor Peter Ryan
Journal of Computer Security: Guest Editors' preface2005
Dr Jeremy Bryans
Professor Peter Ryan
Modelling Dynamic Opacity using Petri Nets with Silent Actions2005
Dr Jeremy Bryans
Professor Maciej Koutny
Professor Peter Ryan
Modelling dynamic opacity using petri nets with silent actions2005
Dr Jeremy Bryans
Professor Maciej Koutny
Professor Peter Ryan
Modelling opacity using petri nets2005
Professor Peter Ryan
Thea Peacock
Prêt á Voter: a System Perspective2005
Professor Peter Ryan
Prospects for e-voting2005
Professor Peter Ryan
Shedding light on haunted corners of information security2005
Professor Peter Ryan
Shedding light on haunted corners of information security2005
Professor Brian Randell
Professor Peter Ryan
Voting Technologies and Trust2005
Professor Peter Ryan
A Practical, Voter-verifiable Election Scheme2004
Dr Robert Stroud
Ian Welch
Professor Peter Ryan
A Qualitative Analysis of the Intrusion-Tolerance Capabilities of the MAFTIA Architecture2004
Professor Peter Ryan
Dr Jeremy Bryans
A Simplified Version of the Chaum Voting Scheme2004
Professor Peter Ryan
Dr Jeremy Bryans
A Simplified Version of the Chaum Voting Scheme2004
Professor Peter Ryan
A Variant of the Chaum Voter-verifiable Scheme2004
Professor Peter Ryan
A Variant of the Chaum Voter-verifiable Scheme2004
Professor Peter Ryan
Editorial message: Special track on computer security2004
Dr Jeremy Bryans
Professor Maciej Koutny
Professor Peter Ryan
Modelling Dynamic Opacity using Petri Nets with Silent Actions2004
Dr Jeremy Bryans
Professor Maciej Koutny
Professor Peter Ryan
Modelling Opacity using Petri Nets2004
Dr Jeremy Bryans
Professor Maciej Koutny
Professor Peter Ryan
Opacity Generalised to Transition Systems2004
Dr Jeremy Bryans
Professor Peter Ryan
A Dependability Analysis of the Chaum Digital Voting Scheme2003
Ian Welch
John Warne
Professor Peter Ryan
Dr Robert Stroud
Architectural Analysis of MAFTIA's Intrusion Tolerance Capablities2003
Professor Peter Ryan
Formal methods for security - Overview2003
Professor Peter Ryan
Guest editorial overview2003
Professor Peter Ryan
Mathematical Models of Computer Security2001
Professor Peter Ryan
Process Algebra and Non-Interference2001
Professor Peter Ryan
The Modelling and Analysis of Security Protocols: the CSP Approach2001
Professor Peter Ryan
Mathematical Models of Computer Security2000
Professor Peter Ryan
Process Algebra and Non-Interference1999
Professor Peter Ryan
A CSP formulation of non-interference and unwinding1991