CHENG, H., FOTIADIS, G., GROSZSCHÄDL, J., & RYAN, P. Y. A. (2023). IoTDisco: Strong yet Lightweight End-to-End Security for the Internet of Constrained Things. In S. Bouzefrane, S. Banerjee, F. Mourlin, S. Boumerdassi, ... E. Renault (Eds.), Mobile, Secure, and Programmable Networking: 9th International Conference, MSPN 2023, Paris, France, October 26–27, 2023, Revised Selected Papers (pp. 1-16). Cham, Switzerland: Springer Verlag. doi:10.1007/978-3-031-52426-4_1 Peer reviewed |
Damodaran, A. S. S., Fotiadis, G., & Ryan, P. Y. A. (30 June 2023). Preparing for a Quantum-Resistant Era [Poster presentation]. ICT Spring 2023, Luxembourg City, Luxembourg. |
Zollinger, M.-L., Ryan, P. Y. A., Roenne, P., Iovino, V., Rial, A., & Damodaran, A. S. S. (11 May 2023). Selene: A Usable Voting System with Transparent Verifiability and Coercion Mitigation [Poster presentation]. SnT Partnership Day 2023, Luxembourg City, Luxembourg. |
Cheng, H., Fotiadis, G., Groszschädl, J., & Ryan, P. Y. A. (February 2022). Highly Vectorized SIKE for AVX-512. IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES), 2022 (2), 41-68. doi:10.46586/tches.v2022.i2.41-68 Peer reviewed |
Zollinger, M.-L., Estaji, E., Ryan, P. Y. A., & Marky, K. (2021). "Just for the sake of transparency": Exploring Voter Mental Models Of Verifiability. In Electronic Voting, Sixth International Joint Conference, E-Vote-ID 2021, Bregenz, Austria, October 5-8. Peer reviewed |
Vazquez Sandoval, I., Atashpendar, A., Lenzini, G., & Ryan, P. Y. A. (2021). PakeMail: Authentication and Key Management in Decentralized Secure Email and Messaging via PAKE. In M. S. Obaidat & J. Ben-Othman (Eds.), E-Business and Telecommunications - 17th International Conference on E-Business and Telecommunications, ICETE 2020, Online Event, July 8-10, 2020, Revised Selected Papers (pp. 102-128). Springer. doi:10.1007/978-3-030-90428-9_5 Peer reviewed |
Marky, K., Zollinger, M.-L., Roenne, P., Ryan, P. Y. A., Grube, T., & Kunze, K. (October 2021). Investigating Usability and User Experience of Individually Verifiable Internet Voting Schemes. ACM Transactions on Computer-Human Interaction, 28 (5), 1-36. doi:10.1145/3459604 Peer Reviewed verified by ORBi |
Cheng, H., Fotiadis, G., Groszschädl, J., Ryan, P. Y. A., & Roenne, P. (August 2021). Batching CSIDH Group Actions using AVX-512. IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES), 2021 (4), 618-649. doi:10.46586/tches.v2021.i4.618-649 Peer reviewed |
Cheng, H., Groszschädl, J., Roenne, P., & Ryan, P. Y. A. (2021). AVRNTRU: Lightweight NTRU-based Post-Quantum Cryptography for 8-bit AVR Microcontrollers. In 2021 Design, Automation and Test in Europe Conference and Exhibition, DATE 2021, Grenoble, France, February 1-5, 2021, Proceedings (pp. 1272-1277). IEEE. doi:10.23919/DATE51398.2021.9474033 Peer reviewed |
Jamroga, W., Ryan, P. Y. A., Schneider, S., Schürmann, C., & Stark, P. B. (2021). A Declaration of Software Independence. In Protocols, Strands, and Logic - Essays Dedicated to Joshua Guttman on the Occasion of his 66.66th Birthday (pp. 198--217). Springer. doi:10.1007/978-3-030-91631-2\_11 Peer reviewed |
Jamroga, W., Mestel, D., Roenne, P., Ryan, P. Y. A., & Skrobot, M. (2021). A Survey of Requirements for COVID-19 Mitigation Strategies. Bulletin of The Polish Academy of Sciences: Technical Science, 69 (4), 137724. doi:10.24425/bpasts.2021.137724 Peer reviewed |
ROENNE, P., RYAN, P. Y. A., & SMYTH, B. (2021). Cast-as-Intended: A Formal Definition and Case Studies. In M. Bernhard (Ed.), Financial Cryptography and Data Security. FC 2021 International Workshops - CoDecFin, DeFi, VOTING, and WTSC, Revised Selected Papers. Springer Science and Business Media Deutschland GmbH. doi:10.1007/978-3-662-63958-0_22 Peer reviewed |
RYAN, P. Y. A., ROENNE, P., OSTREV, D., El Orche, F.-E., SOROUSH, N., & Stark, P. B. (2021). Who Was that Masked Voter? The Tally Won’t Tell! In R. Krimmer & D. Duenas-Cid (Eds.), Electronic Voting - 6th International Joint Conference, E-Vote-ID 2021, Proceedings. Springer Science and Business Media Deutschland GmbH. doi:10.1007/978-3-030-86942-7_8 Peer reviewed |
Cheng, H., Groszschädl, J., Roenne, P., & Ryan, P. Y. A. (2020). Lightweight Post-quantum Key Encapsulation for 8-bit AVR Microcontrollers. In P.-Y. Liardet & N. Mentens (Eds.), Smart Card Research and Advanced Applications, 19th International Conference, CARDIS 2020, Virtual Event, November 18–19, 2020, Revised Selected Papers (pp. 18-33). Springer Verlag. doi:10.1007/978-3-030-68487-7_2 Peer reviewed |
Cheng, H., Groszschädl, J., Tian, J., Roenne, P., & Ryan, P. Y. A. (2020). High-Throughput Elliptic Curve Cryptography Using AVX2 Vector Instructions. In O. Dunkelman, M. J. Jacobson Jr., ... C. O'Flynn (Eds.), Selected Areas in Cryptography, 27th International Conference, Halifax, NS, Canada (Virtual Event), October 21-23, 2020, Revised Selected Papers (pp. 698-719). Springer Verlag. doi:10.1007/978-3-030-81652-0_27 Peer reviewed |
Zollinger, M.-L., Roenne, P., & Ryan, P. (2020). Short paper: Mechanized Proofs of Verifiability and Privacy in a paper-based e-voting Scheme. In International Conference on Financial Crypto Workshop on Advances in Secure Electronic Voting. Peer reviewed |
Iovino, V., Rial, A., Roenne, P., & Ryan, P. Y. A. (2020). (Universal) Unconditional Verifiability in E-Voting without Trusted Parties. In 2020 IEEE 33rd Computer Security Foundations Symposium. Peer reviewed |
Soroush, N., Iovino, V., Rial, A., Roenne, P., & Ryan, P. Y. A. (2020). Verifiable Inner Product Encryption Scheme. In Public-Key Cryptography – PKC 2020. Peer reviewed |
Ding, J., Emery, D., Mueller, J., Ryan, P. Y. A., & Kee Wong, V. (2020). Post-Quantum Anonymous Veto Networks. In E-Vote-ID 2020. Peer reviewed |
Hollenstein, M., Naccache, D., Roenne, P., Ryan, P. Y. A., Weil, R., & Yifrach-Stav, O. (2020). Preservation of DNA Privacy During the Large Scale Detection of COVID-19. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/45354. |
Jamroga, W., Mestel, D., Roenne, P., Ryan, P. Y. A., & Skrobot, M. (2020). A Survey of Requirements for COVID-19 Mitigation Strategies. Part I: Newspaper Clips. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/46104. |
Estaji, E., Haines, T., Gjoesteen, K., Roenne, P., Ryan, P. Y. A., & Soroush, N. (2020). Revisiting Practical and Usable Coercion-Resistant Remote E-Voting. In Electronic Voting - 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6-9, 2020, Proceedings (pp. 50--66). Springer. doi:10.1007/978-3-030-60347-2\_4 Peer reviewed |
Jamroga, W., Kim, Y., Kurpiewski, D., & Ryan, P. Y. A. (2020). Towards Model Checking of Voting Protocols in Uppaal. In Proceedings of the Fifth International Joint Conference on Electronic Voting E-VOTE-ID 2020. Springer. doi:10.1007/978-3-030-60347-2_9 Peer reviewed |
Roenne, P., Atashpendar, A., Kristian, G., & Ryan, P. (2020). Coercion-Resistant Voting in Linear Time via Fully Homomorphic Encryption: Towards a Quantum-Safe Scheme. In Financial Cryptography and Data Security 2019. FC 2019: International Workshops, CIW, VOTING, and WTSC. Springer. Peer reviewed |
Cheng, H., Dinu, D.-D., Groszschädl, J., Roenne, P., & Ryan, P. (2019). A Lightweight Implementation of NTRU Prime for the Post-Quantum Internet of Things. In M. Laurent & T. Giannetsos (Eds.), Information Security Theory and Practice, 13th IFIP WG 11.2 International Conference, WISTP 2019, Paris, France, December 11–12, 2019, Proceedings (pp. 103-119). Springer Verlag. doi:10.1007/978-3-030-41702-4_7 Peer reviewed |
Beunardeau, M., El Orche, F. E., Maimut, D., Naccache, D., Roenne, P., & Ryan, P. (2019). Authenticated Key Distribution: When the Coupon Collector is Your Enemy. In Innovative Security Solutions for Information Technology and Communications. Springer. |
Zollinger, M.-L., Distler, V., Roenne, P., Ryan, P., Lallemand, C., & Koenig, V. (2019). User Experience Design for E-Voting: How mental models align with security mechanisms. In Electronic Voting. Peer reviewed |
Cheng, H., Groszschädl, J., Roenne, P., & Ryan, P. (2019). A Lightweight Implementation of NTRUEncrypt for 8-bit AVR Microcontrollers. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/42597. |
Genç, Z. A., Lenzini, G., Ryan, P., & Vazquez Sandoval, I. (2019). A Critical Security Analysis of the Password-Based Authentication Honeywords System Under Code-Corruption Attack. In Information Systems Security and Privacy (pp. 125-151). Cham, Unknown/unspecified: Springer International Publishing. doi:10.1007/978-3-030-25109-3_7 Peer reviewed |
Damodaran, A. S. S., Rial, A., & Ryan, P. Y. A. (04 June 2019). Stateful Zero-Knowledge [Poster presentation]. SnT Partnership Day 2019. |
Distler, V., Zollinger, M.-L., Lallemand, C., Roenne, P., Ryan, P., & Koenig, V. (2019). Security – Visible, Yet Unseen? How Displaying Security Mechanisms Impacts User Experience and Perceived Security. Proceedings of ACM CHI Conference on Human Factors in Computing Systems (CHI2019). doi:10.1145/3290605.3300835 Peer reviewed |
Marky, K., Zollinger, M.-L., Funk, M., Ryan, P., & Mühlhäuser, M. (2019). How to Assess the Usability Metrics of E-Voting Schemes. Lecture Notes in Computer Science. Peer reviewed |
Lopez Becerra, J. M., Ryan, P., Sala, P., & Skrobot, M. (2019). An offline dictionary attack against zkPAKE protocol. In An offline dictionary attack against zkPAKE protocol. Springer. Peer reviewed |
Genç, Z. A., Lenzini, G., & Ryan, P. (2019). NoCry: No More Secure Encryption Keys for Cryptographic Ransomware. In Proceedings of the Second International Workshop on Emerging Technologies for Authorization and Authentication (pp. 69-85). Cham, Switzerland: Springer. doi:10.1007/978-3-030-39749-4_5 Peer reviewed |
Jamroga, W., Roenne, P., Ryan, P., & Stark, P. B. (2019). Risk-Limiting Tallies. In Electronic Voting: Proceedings of E-Vote-ID (pp. 183--199). doi:10.1007/978-3-030-30625-0\_12 Peer reviewed |
Wang, J., Tang, Q., Delerue Arriaga, A., & Ryan, P. Y. A. (2019). Novel Collaborative Filtering Recommender Friendly to Privacy Protection. In International Joint Conference on Artificial Intelligence (IJCAI 2019), Macao 10-16 August 2019. Macao, Unknown/unspecified: International Joint Conferences on Artificial Intelligence Organization. doi:10.24963/ijcai.2019/668 Peer reviewed |
Lopez Becerra, J. M., Roenne, P., Ryan, P., & Sala, P. (2018). HoneyPAKEs. In Security Protocols XXVI: Lecture Notes in Computer Science (pp. 63-77). Springer International Publishing. Peer reviewed |
Atashpendar, A., Policharla, G. V., Roenne, P., & Ryan, P. (2018). Revisiting Deniability in Quantum Key Exchange via Covert Communication and Entanglement Distillation. In Secure IT Systems, 23rd Nordic Conference, NordSec 2018. Lecture Notes in Computer Science, vol 11252. Springer, Cham (pp. 104-120). Springer. doi:10.1007/978-3-030-03638-6_7 Peer reviewed |
Roenne, P., Ryan, P., & Zollinger, M.-L. (2018). Electryo, In-person Voting with Transparent Voter Verifiability and Eligibility Verifiability. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/37857. |
Wang, J., Delerue Arriaga, A., Tang, Q., & Ryan, P. (October 2018). Facilitating Privacy-preserving Recommendation-as-a-Service with Machine Learning [Poster presentation]. the 2018 ACM SIGSAC Conference. doi:10.1145/3243734.3278504 |
Atashpendar, A., Mestel, D., Roscoe, A. W. B., & Ryan, P. (2018). A Proof of Entropy Minimization for Outputs in Deletion Channels via Hidden Word Statistics. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/36637. |
Lopez Becerra, J. M., Ryan, P., Sala, P., & Skrobot, M. (June 2018). An Offline Dictionary Attack Against zkPAKE Protocol [Poster presentation]. WiSec2018, Stockholm, Sweden. doi:10.1145/1235 |
Schwartz, M., Lenzini, G., Geng, Y., Roenne, P., Ryan, P., & Lagerwall, J. (2018). Cholesteric Liquid Crystal Shells as Enabling Material for Information-Rich Design and Architecture. Advanced Materials, 1707382. doi:10.1002/adma.201707382 Peer reviewed |
Atashpendar, A., Beunardeau, M., Connolly, A., Géraud, R., Mestel, D., Roscoe, A. W. B., & Ryan, P. (2018). From Clustering Supersequences to Entropy Minimizing Subsequences for Single and Double Deletions. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/36636. |
Genç, Z. A., Lenzini, G., & Ryan, P. (2018). No Random, No Ransom: A Key to Stop Cryptographic Ransomware. In Proceedings of the 15th Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (pp. 234-255). Cham, Switzerland: Springer. doi:10.1007/978-3-319-93411-2_11 Peer reviewed |
Genç, Z. A., Lenzini, G., & Ryan, P. (2018). Next Generation Cryptographic Ransomware. In Proceedings of the Secure IT Systems (pp. 385-401). Cham, Switzerland: Springer International Publishing. doi:10.1007/978-3-030-03638-6_24 Peer reviewed |
Genç, Z. A., Lenzini, G., & Ryan, P. (2018). Security Analysis of Key Acquiring Strategies Used by Cryptographic Ransomware. In Advances in Cybersecurity 2018. Peer reviewed |
Genç, Z. A., Lenzini, G., Ryan, P., & Vazquez Sandoval, I. (2018). A Security Analysis, and a Fix, of a Code-Corrupted Honeywords System. In Proceedings of the 4th International Conference on Information Systems Security and Privacy. doi:10.5220/0006609100830095 Peer reviewed |
Lenzini, G., Samir, O., Roenne, P., Ryan, P., Geng, Y., Noh, J., & Lagerwall, J. (2017). Security in the Shell : An Optical Physical Unclonable Function made of Shells of Cholesteric Liquid Crystals. In Proc. of the 9th IEEE Workshop on Information Forensics and Security. Peer reviewed |
Atashpendar, A., Roenne, P., Ostrev, D., & Ryan, P. (14 June 2017). Deniability in Quantum Cryptography [Poster presentation]. The 12th Conference on the Theory of Quantum Computation, Communication and Cryptography (TQC 2017), Paris, France. |
Bella, G., Giustolisi, R., Lenzini, G., & Ryan, P. (01 June 2017). Trustworthy exams without trusted parties. Computer and Security, 67, 291-307. doi:10.1016/j.cose.2016.12.005 Peer reviewed |
Iovino, V., Rial, A., Roenne, P., & Ryan, P. (2017). Using Selene to Verify your Vote in JCJ. In Workshop on Advances in Secure Electronic Voting (VOTING'17) (pp. 17). Peer reviewed |
Genç, Z. A., Lenzini, G., & Ryan, P. (2017). The Cipher, the Random and the Ransom: A Survey on Current and Future Ransomware. In Advances in Cybersecurity 2017 (1st ed). Maribor, Slovenia: University of Maribor Press. Peer reviewed |
Clark, J., Sarah, Ryan, P., Wallach, D., Brenner, M., & Rohloff, K. (Eds.). (2016). Financial Cryptography and Data Security - FC 2016 International Workshops, BITCOIN, VOTING, and WAHC. Barbados: Springer. |
Ryan, P., Naccache, D., & Quisquater, J.-J. (Eds.). (2016). The New Codebreakers - Essays Dedicated to David Kahn on the Occasion of His 85th Birthday. Springer. |
Hao, F., & Ryan, P. (Eds.). (2016). Real-World Electronic Voting: Design, Analysis and Deployment. Auerbach Publications. doi:10.1201/9781315371290 |
Ryan, P. (2016). Crypto Santa. In The New Codebreakers - Essays Dedicated to David Kahn on the Occasion of His 85th Birthday. Springer. Peer reviewed |
Gallegos-Garcia, G., Iovino, V., Roenne, P., & Ryan, P. (2016). (Universal) Unconditional Verifiability in E-Voting without Trusted Parties. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/31726. |
Tabatabaei, M., Jamroga, W., & Ryan, P. (2016). Expressing Receipt-Freeness and Coercion-Resistance in Logics of Strategic Ability: Preliminary Attempt. In The International Workshop on AI for Privacy and Security (PrAISe), 2016. Peer reviewed |
Dreier, J., Giustosi, R., Kassem, A., Lafourcade, P., Lenzini, G., & Ryan, P. (30 December 2015). Formal Security Analysis of Traditional and Electronic Exams. Communications in Computer and Information Science, 554, 294-318. doi:10.1007/978-3-319-25915-4_16 Peer reviewed |
Atashpendar, A., Roscoe, B., & Ryan, P. (2015). Information Leakage due to Revealing Randomly Selected Bits. In Security Protocols XXIII: Lecture Notes in Computer Science, Volume 9379, 2015 (pp. 325-341). Springer. doi:10.1007/978-3-319-26096-9_33 Peer reviewed |
Bella, G., Giustolisi, R., Lenzini, G., & Ryan, P. (2015). A Secure Exam Protocol Without Trusted Parties. In ICT Systems Security and Privacy Protection. 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015. Peer reviewed |
Ryan, P., Preneel, B., Rogaway, P., & Ryan, M. D. (2015). Privacy and Security in an Age of Surveillance. |
Ryan, P., Benaloh, J., Rivest, R., Stark, P., Teague, V., & Vora, P. (2015). End-to-end verifiability. arXiv preprint arXiv:1504.03778. Peer reviewed |
Ryan, P., Roenne, P., & Iovino, V. (2015). Selene: Voting with Transparent Verifiability and Coercion-Mitigation. Abstract book of 1st Workshop on Advances in Secure Electronic Voting, 2015, 1105. Peer reviewed |
Ryan, P., Schneider, S., & Teague, V. (2015). End-to-End Verifiability in Voting Systems, from Theory to Practice. IEEE Security and Privacy, 13 (3), 59-62. doi:10.1109/MSP.2015.54 Peer reviewed |
Ryan, P., Phatak, D. S., Tang, Q., Smith, W. D., Sherman, A. T., & Kalpakis, K. (2014). DoubleMod and SingleMod: Simple Randomized Secret-Key Encryption with Bounded Homomorphicity. IACR Cryptology ePrint Archive. Peer reviewed |
Delerue Arriaga, A., Tang, Q., & Ryan, P. (2014). Trapdoor Privacy in Asymmetric Searchable Encryption Schemes. In Progress in Cryptology -- AFRICACRYPT 2014, Marrakesh 28-30 May 2014. Peer reviewed |
Giustolisi, R., Lenzini, G., & Ryan, P. (2014). Remark!: A Secure Protocol for Remote Exams. Security Protocols XXII - Lecture Notes in Computer Science. doi:10.1007/978-3-319-12400-1_5 Peer reviewed |
Dreier, J., Giustolisi, R., Kassem, A., Lafourcade, P., Lenzini, G., & Ryan, P. (2014). Formal Analysis of Electronic Exams. In SECRYPT 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014. doi:10.5220/0005050901010112 Peer reviewed |
Culnane, C., Ryan, P., Schneider, S., & Teague, V. (2014). vVote: a Verifiable Voting System. Jets. doi:10.1145/2746338 Peer reviewed |
Preneel, B., Rogaway, P., Ryan, M. D., & Ryan, P. (2014). Privacy and Security in an Age of Surveillance. Dagstuhl Reports, 4 (9), 106-123. doi:10.4230/DagRep.4.9.106 Peer reviewed |
Culnane, C., Heather, J., Joaquim, R., Ryan, P., Schneider, S., & Teague, V. (December 2013). Faster Print on Demand for Prêt à Voter. Journal of Election Technology and Systems, 2 (1). Peer reviewed |
Khader, D., Ryan, P., & Tang, Q. (13 August 2013). Proving Prêt à Voter Receipt Free Using Computational Security Models. USENIX Journal of Election Technology and Systems, 1 (1), 62-81. Peer reviewed |
Tabatabaei, M., Jamroga, W., & Ryan, P. (17 March 2013). Preventing Coercion in E-Voting: Be Open and Commit [Paper presentation]. 1st Workshop on Hot Issues in Security Principles and Trust. |
Lancrenon, J., Khader, D., Ryan, P., & Hao, F. (2013). Password-based Authenticated Key Establishment Protocols. In Computer And Information Security Handbook (pp. 300-350). Elsevier. doi:10.1016/B978-0-12-394397-2.00040-4 |
Ryan, P., Grewal, G. S., Ryan, M. D., & Bursuc, S. (2013). Caveat Coercitor: coercion-evidence in electronic voting. In 2013 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) (pp. 367-381). doi:10.1109/SP.2013.32 Peer reviewed |
Ryan, P., Benaloh, J., & Teague, V. (2013). Verifiable postal voting. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). doi:10.1007/978-3-642-41717-7_8 Peer reviewed |
Ryan, P., Peacock, T., Schneider, S., & Xia, Z. (2013). Verifiable Voting Systems. In Computer and Information Security Handbook (pp. 1103-1125). Elsevier Inc. doi:10.1016/B978-0-12-394397-2.00069-6 Peer reviewed |
Ryan, P., & Christianson, B. (2013). Enhancements to prepare-and-measure based QKD protocols. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (pp. 123-133). Springer Verlag. doi:10.1007/978-3-642-41717-7_14 Peer reviewed |
Ryan, P., Pouly, M., & Kohlas, J. (2013). Generalized Information Theory for Hints. International Journal of Approximate Reasoning, 54 (1), 228-251. doi:10.1016/j.ijar.2012.08.004 Peer reviewed |
Ryan, P., Teague, V., Schneider, S., Joaquim, R., Heather, J., & Culnane, C. (2013). Faster print on demand for Prêt à Voter. USENIX Journal of Election Technology and Systems (JETS), 2 (1). Peer reviewed |
Ryan, P., Schneider, S., Xia, Z., Llewellyn, M., Heather, J., & Culnane, C. (2013). Testing Voters' Understanding of a Security Mechanism Used in Verifiable Voting. 53 USENIX Journal of Election Technology and Systems (JETS), 1 (1), 53-61. Peer reviewed |
Ryan, P., Demirel, D., Henning, M., van de Graaf, J., & Buchmann, J. (2013). Prêt à Voter providing everlasting privacy. Lecture Notes in Computer Science, 165-220. doi:10.1007/978-3-642-39185-9_10 Peer reviewed |
Ryan, P., & Coles-Kemp, L. (2012). Foreword from the Programme Chairs-STAST 2012. Socio-Technical Aspects in Security and Trust (STAST), 2012 Workshop on. doi:10.1109/STAST.2012.5 Peer reviewed |
Burton, C. B., Culnane, C., Heather, J., Peacock, T., Ryan, P., Schneider, S., Teague, V., Wen, R., Xia, Z., & Srinivasan, S. (2012). A Supervised Verifiable Voting Protocol for the Victorian Electoral Commission. EVOTE 2012, 1-10. Peer reviewed |
Ryan, P., Schneider, S., Peacock, T., Heather, J., Srinivasan, S., Teague, V., Xia, Z., Wen, R., Culnane, C., & Burton, C. (2012). Using Prêt à Voter in Victorian State Elections. Electronic Voting Technology Workshop/Workshop on Trustworthy Elections. Peer reviewed |
Khader, D., Smyth, B., Ryan, P., & Hao, F. (2012). A Fair and Robust Voting System by Broadcast. Lecture Notes in Informatics, 285-299. Peer reviewed |
Coles-Kemp, L., Lenzini, G., Ryan, P., & Bella, G. (2011). STAST 2011 Proc. of the 1st Workshop on Socio-Technical Aspects in Security and Trust. IEEE. |
Kramer, S., & Ryan, P. (2011). A Modular Multi-Modal Specification of Real-Timed, End-To-End Voter-Verifiable Voting Systems. In 2011 International Workshop on Requirements Engineering for Electronic Voting Systems (REVOTE) (pp. 9 - 21). IEEE. doi:10.1109/REVOTE.2011.6045911 Peer reviewed |
Xia, Z., Culnane, C., Heather, J., Jonker, H., Ryan, P., Schneider, S., & Srinivasan, S. (2010). Versatile Prêt à Voter: Handling Multiple Election Methods with a Unified Interface. In Proc. 11th International Conference on Cryptology in India (IndoCrypt'10) (pp. 98–114). Springer-Verlag. doi:10.1007/978-3-642-17401-8_8 Peer reviewed |
Mauw, S., Radomirovic, S., & Ryan, P. (2010). Security protocols for Secret Santa. In Proc. 18th Security Protocols Workshop. Springer-Verlag. Peer reviewed |