![]() ![]() | ROENNE, P., RYAN, P. Y. A., & SMYTH, B. (2021). Cast-as-Intended: A Formal Definition and Case Studies. In M. Bernhard (Ed.), Financial Cryptography and Data Security. FC 2021 International Workshops - CoDecFin, DeFi, VOTING, and WTSC, Revised Selected Papers. Springer Science and Business Media Deutschland GmbH. doi:10.1007/978-3-662-63958-0_22 ![]() |
![]() ![]() | Quaglia, E. A., & SMYTH, B. (2018). Secret, verifiable auctions from elections. Theoretical Computer Science, 730, 44--92. doi:10.1016/j.tcs.2018.03.022 ![]() |
![]() ![]() | Quaglia, E. A., & SMYTH, B. (2018). Authentication with weaker trust assumptions for voting systems. In AFRICACRYPT'18: 10th International Conference on Cryptology in Africa. Springer. ![]() |
Chothia, T., Ruiter, J. D., & SMYTH, B. (2018). Modelling and Analysis of a Hierarchy of Distance Bounding Attacks. In Modelling and Analysis of a Hierarchy of Distance Bounding Attacks. |
![]() ![]() | SMYTH, B. (2018). Verifiability of Helios Mixnet. In Voting'18: 3rd Workshop on Advances in Secure Electronic Voting. Springer. ![]() |
![]() ![]() | Blanchet, B., & SMYTH, B. (2018). Automated reasoning for equivalences in the applied pi calculus with barriers. Journal of Computer Security, 26 (3), 367--422. doi:10.3233/JCS-171013 ![]() |
![]() ![]() | Meyer, M., Quaglia, E. A., & SMYTH, B. (2018). Attacks against GSMA's M2M Remote Provisioning. In FC'18: 22nd International Conference on Financial Cryptography and Data Security. Springer. ![]() |