If you made any changes in Pure these will be visible here soon.
Filter
Conference contribution

Search results

  • 2021

    Astrolabous: A Universally Composable Time Lock Encryption Scheme

    Lamprou, N., Arapinis, M. & Zacharias, T., 1 Dec 2021, Advances in Cryptology – ASIACRYPT 2021: 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6–10, 2021, Proceedings, Part II. Tibouchi, M. & Wang, H. (eds.). Cham: Springer, Cham, Vol. 2. p. 398-426 30 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • 2019

    A Formal Treatment of Hardware Wallets

    Arapinis, M., Gkaniatsou, A., Karakostas, D. & Kiayias, A., 30 Sep 2019, Financial Cryptography and Data Security : 23rd International Conference, FC 2019. Springer, Cham, p. 426-445 20 p. (Lecture Notes in Computer Science (LNCS); vol. 11598).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • 2018

    On Choosing Between Privacy Preservation Mechanisms for Mobile Trajectory Data Sharing

    Singh, R., Theodorakopoulos, G., Marina, M. K. & Arapinis, M., 13 Aug 2018, 2018 IEEE Conference on Communications and Network Security (CNS). Beijing, China: Institute of Electrical and Electronics Engineers (IEEE), 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • 2017

    Low-Level Attacks in Bitcoin Wallets

    Gkaniatsou, A., Arapinis, M. & Kiayias, A., 20 Oct 2017, Information Security : 20th International Conference, ISC 2017, Ho Chi Minh City, Vietnam, November 22-24, 2017, Proceedings. Springer, Cham, p. 233-253 21 p. (Lecture Notes in Computer Science (LNCS); vol. 10599).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • 2016

    When Are Three Voters Enough for Privacy Properties?

    Arapinis, M., Cortier, V. & Kremer, S., 15 Sep 2016, Computer Security – ESORICS 2016: 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part II. Springer International Publishing, p. 241-260 20 p. (Lecture Notes in Computer Science; vol. 9879).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Sensitivity of Counting Queries

    Arapinis, M., Figueira, D. & Gaboardi, M., 23 Aug 2016, 43rd International Colloquium on Automata, Languages, and Programming (ICALP 2016). Rome, Italy: Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, Germany, Vol. 55. p. 120:1-120:13 13 p. 120. (Leibniz International Proceedings in Informatics (LIPIcs); vol. 55).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • 2015

    Composing Security Protocols: From Confidentiality to Privacy

    Arapinis, M., Cheval, V. & Delaune, S., 18 Apr 2015, Principles of Security and Trust: 4th International Conference, POST 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015, Proceedings. Springer Berlin Heidelberg, p. 324-343 20 p. (Lecture Notes in Computer Science; vol. 9036).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • 2014

    Privacy through Pseudonymity in Mobile Telephony Systems

    Arapinis, M., Mancini, L. I., Ritter, E. & Ryan, M., 22 Feb 2014, 21st Annual Network and Distributed System Security Symposium (NDSS'14). The Internet Society, p. 1-14 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Stateful Applied Pi Calculus

    Arapinis, M., Liu, J., Ritter, E. & Ryan, M., 2014, Principles of Security and Trust. Abadi, M. & Kremer, S. (eds.). Springer Berlin Heidelberg, p. 22-41 20 p. (Lecture Notes in Computer Science; vol. 8414).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • 2013

    Practical Everlasting Privacy

    Arapinis, M., Cortier, V., Kremer, S. & Ryan, M., 2013, Principles of Security and Trust: Second International Conference, POST 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013, Rome, Italy, March 16-24, 2013. Proceedings. Basin, D. & Mitchell, J. (eds.). Springer Berlin Heidelberg, p. 21-40 20 p. (Lecture Notes in Computer Science; vol. 7796).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Translating between equational theories for automated reasoning

    Smyth, B., Arapinis, M. & Ryan, M., 2013, FCS 2013 Workshop on Foundations of Computer Security. p. 50 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2012

    Verifying Privacy-Type Properties in a Modular Way

    Arapinis, M., Cheval, V. & Delaune, S., 1 Jun 2012, Computer Security Foundations Symposium (CSF), 2012 IEEE 25th. p. 95-109 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • New privacy issues in mobile telephony: Fix and Verification

    Arapinis, M., Mancini, L., Ritter, E., Ryan, M., Golde, N., Redon, K. & Borgaonkar, R., 2012, Proceedings of the 2012 ACM conference on Computer and communications security. New York, NY, USA: ACM, p. 205-216 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Privacy Supporting Cloud Computing: ConfiChair, a Case Study

    Arapinis, M., Bursuc, S. & Ryan, M., 2012, Principles of Security and Trust: First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2012, Tallinn, Estonia, March 24 - April 1, 2012, Proceedings. Degano, P. & Guttman, J. (eds.). Springer Berlin Heidelberg, p. 89-108 20 p. (Lecture Notes in Computer Science; vol. 7215).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Reduction of Equational Theories for Verification of Trace Equivalence: Re-encryption, Associativity and Commutativity

    Arapinis, M., Bursuc, S. & Ryan, M., 2012, Principles of Security and Trust: First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2012, Tallinn, Estonia, March 24 - April 1, 2012, Proceedings. Degano, P. & Guttman, J. (eds.). Springer Berlin Heidelberg, p. 169-188 20 p. (Lecture Notes in Computer Science; vol. 7215).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2011

    StatVerif: Verification of Stateful Processes

    Arapinis, M., Ritter, E. & Ryan, M. D., 2011, 2011 IEEE 24th Computer Security Foundations Symposium. Los Alamitos, CA, USA: Institute of Electrical and Electronics Engineers (IEEE), p. 33-47 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2010

    Analysing Unlinkability and Anonymity Using the Applied Pi Calculus

    Arapinis, M., Chothia, T., Ritter, E. & Ryan, M., 2010, Computer Security Foundations Symposium (CSF), 2010 23rd IEEE. Institute of Electrical and Electronics Engineers (IEEE), p. 107-121 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • 2009

    Untraceability in the applied pi-calculus

    Arapinis, M., Chothia, T., Ritter, E. & Ryan, M., 1 Nov 2009, Internet Technology and Secured Transactions, 2009. ICITST 2009. International Conference for. p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2008

    From One Session to Many: Dynamic Tags for Security Protocols

    Arapinis, M., Delaune, S. & Kremer, S., 2008, Logic for Programming, Artificial Intelligence, and Reasoning: 15th International Conference, LPAR 2008, Doha, Qatar, November 22-27, 2008. Proceedings. Berlin, Heidelberg: Springer-Verlag GmbH, Vol. 5330. p. 128-142 15 p. (Lecture Notes in Computer Science; vol. 5330).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2007

    Bounding Messages for Free in Security Protocols

    Arapinis, M. & Duflot, M., 2007, FSTTCS 2007: Foundations of Software Technology and Theoretical Computer Science: 27th International Conference, New Delhi, India, December 12-14, 2007. Proceedings. Arvind, V. & Prasad, S. (eds.). Springer Berlin Heidelberg, p. 376-387 12 p. (Lecture Notes in Computer Science; vol. 4855).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2003

    Semantics of Minimally Synchronous Parallel ML

    Arapinis, M., Loulergue, F., Gava, F. & Dabrowski, F., 2003, 4th International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD’03). ACIS, p. 260-267 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution