Author pages are created from data sourced from our academic publisher partnerships and public sources.
- Publications
- Influence
Share This Author
ProVerif 1.85: Automatic Cryptographic Protocol Verifier, User Manual and Tutorial
- B. Blanchet, B. Smyth
- Computer Science, Mathematics
- 2011
TLDR
Attacking and Fixing Helios: An Analysis of Ballot Secrecy
- V. Cortier, B. Smyth
- Computer Science, MathematicsIEEE 24th Computer Security Foundations Symposium
- 27 June 2011
TLDR
Election Verifiability in Electronic Voting Protocols
TLDR
Direct Anonymous Attestation (DAA): Ensuring Privacy with Corrupt Administrators
- B. Smyth, M. Ryan, Liqun Chen
- Computer ScienceESAS
- 2 July 2007
TLDR
Automated Reasoning for Equivalences in the Applied Pi Calculus with Barriers
- B. Blanchet, B. Smyth
- Computer ScienceIEEE 29th Computer Security Foundations Symposium…
- 1 June 2016
TLDR
Automatic Verification of Privacy Properties in the Applied pi Calculus
- S. Delaune, M. Ryan, B. Smyth
- Computer Science, MathematicsIFIPTM
- 18 June 2008
We develop a formal method verification technique for cryptographic protocols. We focus on proving observational equivalences of the kind P ∼ Q, where the processes P and Q have the same structure…
A Fair and Robust Voting System by Broadcast
- Dalia Khader, B. Smyth, P. Ryan, F. Hao
- Computer ScienceElectronic Voting
- 2012
TLDR
ProVerif 1.87beta6: Automatic Cryptographic Protocol Verifier, User Manual and Tutorial
- B. Blanchet, B. Smyth, Vincent Cheval
- Computer Science
- 2012
Ballot secrecy with malicious bulletin boards
- B. Smyth
- MathematicsIACR Cryptol. ePrint Arch.
- 10 October 2014
TLDR
Automatically Checking Commitment Protocols in ProVerif without False Attacks
- Tom Chothia, B. Smyth, Christopher Staite
- Computer Science, MathematicsPOST
- 11 April 2015
TLDR
...
...