University of Surrey

Test tubes in the lab Research in the ATI Dance Research

Items where Author is "Ryan, P"

Up a level
Export as [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | No Grouping
Number of items: 31.

Article

Culnane, C, Ryan, PYA, Schneider, SA and Teague, V (2015) vVote: a Verifiable Voting System ACM Transactions on Information and System Security, 18 (1).

Ryan, PYA, Schneider, S and Teague, V (2015) End-to-End Verifiability in Voting Systems, from Theory to Practice IEEE SECURITY & PRIVACY, 13 (3). pp. 59-62.

Llewellyn, M, Schneider, SA, Xia, Z, Culnane, C, Heather, J, Ryan, PYA and Srinivasan, S (2013) Testing Voters’ Understanding of a Security Mechanism Used in Verifiable Voting The USENIX Journal of Election Technology and Systems, 1, 1. pp. 53-61.

Peacock, T, Ryan, PYA, Schneider, S and Xia, Z (2013) Verifiable Voting Systems Computer and Information Security Handbook. pp. 1103-1125.

Ryan, PYA, Bismark, D, Heather, JA, Schneider, SA and Xia, Z (2009) The Prêt à Voter Verifiable Election System IEEE Transactions on Information Forensics and Security, 4 (4). pp. 662-673.

Ryan, P.Y.A., Bismark, D., Heather, J., Schneider, S. and Xia, Z. (2009) Prêt à Voter: a voter-verifiable voting system Information Forensics and Security, IEEE Transactions on, 4 (4). pp. 662-673.

Dimitrakos, T, Martinelli, F, Ryan, PYA and Schneider, S (2007) Guest editors' preface INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 6 (2-3). pp. 65-66.

Lundin, D, Treharne, H, Ryan, P, Schneider, S, Heather, J and Xia, Z (2007) Tear and Destroy: Chain voting and destruction problems shared by Pret a Voter and Punchscan and a solution using Visual Encryption Fundamenta Informaticae (2001). pp. 1001-1019.

Gong, Li, Guttman, Joshua, Ryan, Peter and Schneider, Steve A. (2003) Guest Editorial - Overview the <i>IEEE Journal on Selected Areas in Communications</i>, Issue on Design and Analysis Techniques for Security Assurance, 21. pp. 1-4.

Gong, L, Guttman, JD, Ryan, PYA and Schneider, SA (2003) Guest editorial overview IEEE Journal of Selected Papers in Communications, 21 (1). pp. 1-4.

Ryan, P. Y. and Schneider, Steve A. (2001) Process algebra and non-interference Journal of Computer Security, 9. pp. 75-103.

Ryan, PYA and Schneider, SA (2001) Process Algebra and Non-Interference. Journal of Computer Security, 9 (1/2). pp. 75-103.

Ryan, PYA and Schneider, SA (1998) An attack on a recursive authentication protocol. A cautionary tale INFORMATION PROCESSING LETTERS, 65 (1). pp. 7-10.

Monograph

Lundin, David and Ryan, Peter Y A Human Readable Paper Verification of Pret a Voter Technical Report. Department of Computing, University of Surrey. (Unpublished)

Conference or Workshop Item

Culnane, C, Heather, J, Joaquim, R, Ryan, PYA, Schneider, S and Teague, V (2014) Faster Print on Demand for Prêt à Voter.

Burton, C, Culnane, C, Heather, JA, Peacock, T, Ryan, PYA, Schneider, SA, Srinivasan, S, Teague, V, Wen, R and Xia, Z (2012) Using Pret a Voter in Victorian State elections In: 2012 Electronic Voting Technology/Workshop on Electronic Voting, 2012-08-06 - 2012-08-07.

Burton, C, Culnane, C, Heather, J, Peacock, T, Ryan, P, Schneider, S, Srinivasan, S, Teague, V, Wen, R and Xia, Z (2012) A Supervised Verifiable Voting Protocol for the Victorian Electoral Commission In: EVOTE 2012, 2012-07-11 - 2012-07-14, Lochau/Bregenz, Austria.

Demirel, D, Henning, M, Ryan, PYA, Schneider, S and Volkamer, M (2011) Feasibility Analysis of Prêt à Voter for German Federal Elections.

Heather, J, Ryan, PYA and Teague, V (2010) Pretty good democracy for more expressive voting schemes In: 15th European Symposium on Research in Computer Security, 2010-09-20 - 2010-09-22, Athens, Greece.

Xia, Z, Culnane, C, Heather, JA, Jonker, H, Ryan, PYA, Schneider, SA and Srinivasan, S (2010) Versatile Pret a Voter: Handling Multiple Election Methods with a Unified Interface In: Indocrypt, 2010-12-12 - 2010-12-15, Hyderabad, India.

Bismark, D, Heather, JA, Peel, RMA, Schneider, SA, Xia, Z and Ryan, PYA (2009) Experiences Gained from the first Prêt à Voter Implementation In: First International Workshop on Requirements Engineering for e-Voting Systems (RE-VOTE), 2009, 2010-08-31 - 2010-08-31, Atlanta, GA.

Xia, Z, Schneider, SA, Heather, J, Ryan, PYA, Lundin, D and Howard, P (2007) Pret a Voter: All-in-one In: WOTE: Workshop on Trustworthy Elections, 2007-06-20 - 2007-06-22, Ottawa, Canada.

Xia, Z, Schneider, SA, Heather, JA, Ryan, PYA, Lundin, D, Peel, RMA and Howard, PJ (2007) Prêt à Voter: All-in-one In: IAVoSS Workshop On Trustworthy Elections (WOTE 2007), 2007-06-20 - 2007-06-21, Ottawa, Canada.

Lundin, D, Treharne, HE, Ryan, PYA, Schneider, SA and Heather, JA (2006) Distributed Creation of the Ballot Form in Prêt à Voter using an element of Visual Encryption In: IAVoSS Workshop On Trustworthy Elections (WOTE 2006), 2006-06-28 - ?.

Ryan, PYA, Schneider, SA, Gollmann, D, Meier, J and Sabelfeld, A (2006) Pret a Voter with Re-encryption Mixes In: 11th European Symposium on Research in Computer Security, 2006-09-18 - 2006-09-20, Hamburg, GERMANY.

Chaum, D, Ryan, PYA and Schneider, SA (2005) A Practical Voter-Verifiable Election Scheme. In: European Symposium on Research in Computer Security, 2005-09-12 - 2005-09-14, Milan, Italy.

Ryan, PYA and Schneider, SA (1999) Process Algebra and Non-Interference. In: IEEE Computer Security Foundations Workshop, 1999-06-28 - 1999-06-30, Mordano, Italy.

Lundin, D, Treharne, HE, Ryan, PYA, Schneider, SA, Heather, JA and Xia, Z Tear and Destroy: Chain voting and destruction problems shared by Prêt à Voter and Punchscan and a solution using Visual Encryption In: IAVoSS Workshop on Frontiers in Electronic Elections (FEE 2006), 2006-09-19 - 2006-09-19, Hamburg, Germany.

Xia, Z, Culnane, C, Heather, J, Jonker, H, Ryan, P, Schneider, S and Srinivasan, S Versatile Pret a Voter: Handling multiple election methods with a unified interface In: IndoCrypt 2010, 2010-12-12 - 2010-12-15, Hyderabad, India.

Lundin, D, Treharne, H, Ryan, PYA, Schneider, S and Heather, J Distributed creation of the ballot form in Pret a Voter using an element of Visual Encryption In: WOTE: Workshop on Trustworthy Elections, 2006 - ?, Cambridge, UK.

Book

Ryan, P, Schneider, S, Goldsmith, M, Lowe, G and Roscoe, B (2001) Modelling and Analysis of Security Protocols Addison-Wesley. ISBN 0201674718

This list was generated on Sun Nov 19 12:37:42 2017 UTC.

Information about this web site

© The University of Surrey, Guildford, Surrey, GU2 7XH, United Kingdom.
+44 (0)1483 300800