ROENNE, P., RYAN, P. Y. A., & SMYTH, B. (2021). Cast-as-Intended: A Formal Definition and Case Studies. In M. Bernhard (Ed.), Financial Cryptography and Data Security. FC 2021 International Workshops - CoDecFin, DeFi, VOTING, and WTSC, Revised Selected Papers. Springer Science and Business Media Deutschland GmbH. doi:10.1007/978-3-662-63958-0_22 Peer reviewed |
Blanchet, B., & Smyth, B. (2018). Automated reasoning for equivalences in the applied pi calculus with barriers. Journal of Computer Security, 26 (3), 367--422. doi:10.3233/JCS-171013 Peer reviewed |
Quaglia, E. A., & Smyth, B. (2018). Secret, verifiable auctions from elections. Theoretical Computer Science, 730, 44--92. doi:10.1016/j.tcs.2018.03.022 Peer reviewed |
Quaglia, E. A., & Smyth, B. (2018). Authentication with weaker trust assumptions for voting systems. In AFRICACRYPT'18: 10th International Conference on Cryptology in Africa. Springer. Peer reviewed |
Smyth, B. (2018). Verifiability of Helios Mixnet. In Voting'18: 3rd Workshop on Advances in Secure Electronic Voting. Springer. Peer reviewed |
Meyer, M., Quaglia, E. A., & Smyth, B. (2018). Attacks against GSMA's M2M Remote Provisioning. In FC'18: 22nd International Conference on Financial Cryptography and Data Security. Springer. Peer reviewed |
Chothia, T., Ruiter, J. D., & Smyth, B. (2018). Modelling and Analysis of a Hierarchy of Distance Bounding Attacks. In Modelling and Analysis of a Hierarchy of Distance Bounding Attacks. |