Newcastle University
Toggle Main Menu
Toggle Search
Home
Browse
Latest
Policies
About
Home
Browse
Latest
Policies
About
ePrints
Browse by author
Browsing publications by
Professor Peter Ryan.
Newcastle Authors
Title
Year
Full text
Professor Feng Hao
Professor Peter Ryan
Preface
2016
Professor Feng Hao
Professor Peter Ryan
Real-World Electronic Voting: Design, Analysis and Deployment
2016
Professor Feng Hao
Professor Peter Ryan
How to Sync with Alice
2011
Professor Feng Hao
Professor Peter Ryan
How to Sync with Alice
2011
Thomas Tjostheim
Thea Peacock
Professor Peter Ryan
A model for system-based analysis of voting systems
2010
Professor Peter Ryan
Thea Peacock
A threat analysis of Prêt à voter
2010
Professor Feng Hao
Professor Peter Ryan
Anonymous voting by two-round public discussion
2010
Professor Feng Hao
Professor Peter Ryan
J-PAKE: Authenticated Key Exchange Without PKI
2010
Professor Peter Ryan
Gaining assurance in a voter-verifiable voting system
2009
Professor Peter Ryan
Journal of computer security: Special number devoted to the best papers of the security track at the 2006 ACM symposium on applied computing
2009
Professor Peter Ryan
Thea Peacock
Putting the human back in voting protocols
2009
Professor Peter Ryan
Thea Peacock
Putting the Human Back in Voting Protocols
2009
Professor Peter Ryan
Human readable paper verification of Pret a Voter
2008
Professor Peter Ryan
Human readable paper verification of prêt à voter
2008
Professor Peter Ryan
Improving Farnel, Threeballot, and Randell-Ryan Voting Schemes
2008
Dr Jeremy Bryans
Professor Maciej Koutny
Professor Peter Ryan
Opacity generalised to transition systems
2008
Professor Feng Hao
Professor Peter Ryan
Password Authenticated Key Exchange by Juggling
2008
Professor Peter Ryan
Prêt à Voter with Paillier encryption
2008
Professor Peter Ryan
Prêt à Voter with Paillier Encryption - extended journal version
2008
Professor Peter Ryan
Scantegrity II: End-to-End Verifiability for Optical Scan Election Systems using Invisible Ink Confirmation Codes
2008
Professor Peter Ryan
The Code d'Azur and Phoenix Ciphers-A Note on a New Class of Block Ciphers Based on Matrix Transposition
2008
Thomas Tjostheim
Thea Peacock
Professor Peter Ryan
A Case Study in System-Based Analysis: The ThreeBallot Voting System and Prêt à Voter
2007
Thomas Tjostheim
Thea Peacock
Professor Peter Ryan
A Model for Systematic Analysis of Voting Systems
2007
Professor Peter Ryan
Guest editors' preface
2007
Professor Peter Ryan
Pret a Voter with a Human-Readable, Paper Audit Trail
2007
Professor Peter Ryan
Pret a Voter with Paillier Encryption
2007
Professor Peter Ryan
Secret Ballot Elections with Unconditional Integrity
2007
Thea Peacock
Professor Peter Ryan
Coercion-resistance as Opacity in Voting Systems
2006
Professor Peter Ryan
Editorial Message special track on computer security
2006
Dr Jeremy Bryans
Professor Peter Ryan
E-voting: Dependability requirements and design for dependability
2006
Professor Peter Ryan
Thea Peacock
Opacity - Further Insights on an Information Flow Property
2006
Dr Jeremy Bryans
Professor Peter Ryan
Opacity generalised to transition systems
2006
Dr Jeremy Bryans
Professor Maciej Koutny
Professor Peter Ryan
Opacity generalised to transition systems
2006
Professor Peter Ryan
Pret a Voter with Paillier Encryption
2006
Professor Peter Ryan
Pret a Voter with Re-encryption Mixes
2006
Professor Peter Ryan
Pret à Voter with Re-encryption Mixes
2006
Professor Peter Ryan
Prêt à Voter with Re-encryption Mixes
2006
Professor Peter Ryan
Thea Peacock
Putting the Human back in Voting Protocols
2006
Professor Peter Ryan
The Computer Ate my Vote
2006
Professor Peter Ryan
Thea Peacock
Threat Analysis of Cryptographic Election Schemes
2006
Professor Peter Ryan
Verified Encrypted Paper Audit Trails
2006
Professor Brian Randell
Professor Peter Ryan
Voting technologies and trust
2006
Professor Brian Randell
Professor Peter Ryan
Voting technologies and trust
2006
Professor Peter Ryan
A practical voter-verifiable election scheme
2005
Professor Peter Ryan
A Practical, Voter-verifiable Election Scheme
2005
Professor Peter Ryan
Kian Tan
Editorial message: Special track on computer security
2005
Professor Peter Ryan
Enforcing the unenforceable
2005
Professor Peter Ryan
Enforcing the unenforceable
2005
Professor Peter Ryan
Journal of Computer Security: Guest Editors' preface
2005
Dr Jeremy Bryans
Professor Peter Ryan
Modelling Dynamic Opacity using Petri Nets with Silent Actions
2005
Dr Jeremy Bryans
Professor Maciej Koutny
Professor Peter Ryan
Modelling dynamic opacity using petri nets with silent actions
2005
Dr Jeremy Bryans
Professor Maciej Koutny
Professor Peter Ryan
Modelling opacity using petri nets
2005
Professor Peter Ryan
Thea Peacock
Prêt á Voter: a System Perspective
2005
Professor Peter Ryan
Prospects for e-voting
2005
Professor Peter Ryan
Shedding light on haunted corners of information security
2005
Professor Peter Ryan
Shedding light on haunted corners of information security
2005
Professor Brian Randell
Professor Peter Ryan
Voting Technologies and Trust
2005
Professor Peter Ryan
A Practical, Voter-verifiable Election Scheme
2004
Dr Robert Stroud
Ian Welch
Professor Peter Ryan
A Qualitative Analysis of the Intrusion-Tolerance Capabilities of the MAFTIA Architecture
2004
Professor Peter Ryan
Dr Jeremy Bryans
A Simplified Version of the Chaum Voting Scheme
2004
Professor Peter Ryan
Dr Jeremy Bryans
A Simplified Version of the Chaum Voting Scheme
2004
Professor Peter Ryan
A Variant of the Chaum Voter-verifiable Scheme
2004
Professor Peter Ryan
A Variant of the Chaum Voter-verifiable Scheme
2004
Professor Peter Ryan
Editorial message: Special track on computer security
2004
Dr Jeremy Bryans
Professor Maciej Koutny
Professor Peter Ryan
Modelling Dynamic Opacity using Petri Nets with Silent Actions
2004
Dr Jeremy Bryans
Professor Maciej Koutny
Professor Peter Ryan
Modelling Opacity using Petri Nets
2004
Dr Jeremy Bryans
Professor Maciej Koutny
Professor Peter Ryan
Opacity Generalised to Transition Systems
2004
Dr Jeremy Bryans
Professor Peter Ryan
A Dependability Analysis of the Chaum Digital Voting Scheme
2003
Ian Welch
John Warne
Professor Peter Ryan
Dr Robert Stroud
Architectural Analysis of MAFTIA's Intrusion Tolerance Capablities
2003
Professor Peter Ryan
Formal methods for security - Overview
2003
Professor Peter Ryan
Guest editorial overview
2003
Professor Peter Ryan
Mathematical Models of Computer Security
2001
Professor Peter Ryan
Process Algebra and Non-Interference
2001
Professor Peter Ryan
The Modelling and Analysis of Security Protocols: the CSP Approach
2001
Professor Peter Ryan
Mathematical Models of Computer Security
2000
Professor Peter Ryan
Process Algebra and Non-Interference
1999
Professor Peter Ryan
A CSP formulation of non-interference and unwinding
1991