Profil

SMYTH Benjamin

Main Referenced Co-authors
Quaglia, Elizabeth A. (3)
Blanchet, Bruno (1)
Chothia, Tom (1)
Meyer, Maxime (1)
ROENNE, Peter  (1)
Main Referenced Keywords
Computer Science (all) (1); Electronic Voting (1); Formal definition (1); Individual verifiability (1); Universal verifiability (1);
Main Referenced Disciplines
Computer science (7)

Publications (total 7)

The most downloaded
276 downloads
Smyth, B. (2018). Verifiability of Helios Mixnet. In Voting'18: 3rd Workshop on Advances in Secure Electronic Voting. Springer. https://hdl.handle.net/10993/35919

The most cited

20 citations (Scopus®)

Chothia, T., Ruiter, J. D., & Smyth, B. (2018). Modelling and Analysis of a Hierarchy of Distance Bounding Attacks. In Modelling and Analysis of a Hierarchy of Distance Bounding Attacks. https://hdl.handle.net/10993/38055

ROENNE, P., RYAN, P. Y. A., & SMYTH, B. (2021). Cast-as-Intended: A Formal Definition and Case Studies. In M. Bernhard (Ed.), Financial Cryptography and Data Security. FC 2021 International Workshops - CoDecFin, DeFi, VOTING, and WTSC, Revised Selected Papers. Springer Science and Business Media Deutschland GmbH. doi:10.1007/978-3-662-63958-0_22
Peer reviewed

Blanchet, B., & Smyth, B. (2018). Automated reasoning for equivalences in the applied pi calculus with barriers. Journal of Computer Security, 26 (3), 367--422. doi:10.3233/JCS-171013
Peer reviewed

Quaglia, E. A., & Smyth, B. (2018). Secret, verifiable auctions from elections. Theoretical Computer Science, 730, 44--92. doi:10.1016/j.tcs.2018.03.022
Peer reviewed

Quaglia, E. A., & Smyth, B. (2018). Authentication with weaker trust assumptions for voting systems. In AFRICACRYPT'18: 10th International Conference on Cryptology in Africa. Springer.
Peer reviewed

Smyth, B. (2018). Verifiability of Helios Mixnet. In Voting'18: 3rd Workshop on Advances in Secure Electronic Voting. Springer.
Peer reviewed

Meyer, M., Quaglia, E. A., & Smyth, B. (2018). Attacks against GSMA's M2M Remote Provisioning. In FC'18: 22nd International Conference on Financial Cryptography and Data Security. Springer.
Peer reviewed

Chothia, T., Ruiter, J. D., & Smyth, B. (2018). Modelling and Analysis of a Hierarchy of Distance Bounding Attacks. In Modelling and Analysis of a Hierarchy of Distance Bounding Attacks.

Contact ORBilu