References of "Smyth, Benjamin 20001003"
     in
Bookmark and Share    
See detailModelling and Analysis of a Hierarchy of Distance Bounding Attacks
Chothia, Tom; Ruiter, Joeri de; Smyth, Benjamin UL

in Modelling and Analysis of a Hierarchy of Distance Bounding Attacks (2018)

Detailed reference viewed: 13 (3 UL)
Full Text
Peer Reviewed
See detailAttacks against GSMA's M2M Remote Provisioning
Meyer, Maxime; Quaglia, Elizabeth A.; Smyth, Benjamin UL

in FC'18: 22nd International Conference on Financial Cryptography and Data Security (2018)

Detailed reference viewed: 32 (0 UL)
Full Text
Peer Reviewed
See detailVerifiability of Helios Mixnet
Smyth, Benjamin UL

in Voting'18: 3rd Workshop on Advances in Secure Electronic Voting (2018)

Detailed reference viewed: 35 (0 UL)
Full Text
Peer Reviewed
See detailAutomated reasoning for equivalences in the applied pi calculus with barriers
Blanchet, Bruno; Smyth, Benjamin UL

in Journal of Computer Security (2018), 26(3), 367--422

Detailed reference viewed: 44 (1 UL)
Full Text
Peer Reviewed
See detailAuthentication with weaker trust assumptions for voting systems
Quaglia, Elizabeth A.; Smyth, Benjamin UL

in AFRICACRYPT'18: 10th International Conference on Cryptology in Africa (2018)

Detailed reference viewed: 41 (1 UL)
Full Text
Peer Reviewed
See detailSecret, verifiable auctions from elections
Quaglia, Elizabeth A.; Smyth, Benjamin UL

in Theoretical Computer Science (2018), 730

Detailed reference viewed: 37 (0 UL)