Smyth

Results: 489



#Item
61

Replay attacks that violate ballot secrecy in Helios Ben Smyth Toshiba Corporation, Kawasaki, Japan May 10, 2012

Add to Reading List

Source URL: www.bensmyth.com

Language: English - Date: 2012-06-25 05:06:29
    62

    The Gist of Swedenborg 1 The Gist of Swedenborg The Project Gutenberg eBook, The Gist of Swedenborg, by Emanuel Swedenborg, Edited by Julian K. Smyth

    Add to Reading List

    Source URL: www.sfswedenborgian.org

    Language: English - Date: 2009-09-21 21:27:30
      63

      Truncating TLS Connections to Violate Beliefs in Web Applications Ben Smyth, Alfredo Pironti To cite this version: Ben Smyth, Alfredo Pironti. Truncating TLS Connections to Violate Beliefs in Web Applications. [Research

      Add to Reading List

      Source URL: www.bensmyth.com

      Language: English - Date: 2015-01-13 10:36:01
        64

        Applied pi calculus∗ Mark D. Ryan and Ben Smyth School of Computer Science, University of Birmingham, United Kingdom July 2010

        Add to Reading List

        Source URL: www.bensmyth.com

        Language: English - Date: 2013-03-13 07:17:19
          65

          Attacking and fixing Helios: An analysis of ballot secrecy∗ V´eronique Cortier and Ben Smyth Loria, CNRS & INRIA Nancy Grand Est, France June 1, 2011

          Add to Reading List

          Source URL: www.lsv.ens-cachan.fr

          Language: English - Date: 2011-08-02 11:02:31
            66

            Secrecy and independence for election schemes Ben Smyth Mathematical and Algorithmic Sciences Lab, Huawei Technologies Co. Ltd., France October 4, 2015 Abstract

            Add to Reading List

            Source URL: eprint.iacr.org

            Language: English - Date: 2015-10-04 12:53:35
              67

              D4-1. Formal description of our case study: Helios 2.0 Ben Smyth and V´eronique Cortier Loria, CNRS, France Abstract

              Add to Reading List

              Source URL: www.lsv.ens-cachan.fr

              Language: English - Date: 2011-02-18 04:23:56
                68

                Election verifiability in electronic voting protocols Ben Smyth, Mark Ryan and Steve Kremer

                Add to Reading List

                Source URL: www.bensmyth.com

                - Date: 2012-05-24 07:24:41
                  69

                  Paving the way for electoral reform Ben Smyth and Mark Ryan Formal Verification and Security Group, School of Computer Science, University of Birmingham May 19, 2010

                  Add to Reading List

                  Source URL: bensmyth.com

                  Language: English - Date: 2012-09-26 05:08:01
                    70

                    Automatic verification of privacy properties in the applied pi calculus⋆ St´ephanie Delaune, Mark Ryan, and Ben Smyth Abstract We develop a formal method verification technique for cryptographic protocols. We focus on

                    Add to Reading List

                    Source URL: www.lsv.ens-cachan.fr

                    Language: English - Date: 2008-06-15 08:59:00
                      UPDATE