Edinburgh Research Explorer
  1. 2019
  2. A Formal Treatment of Hardware Wallets

    Arapinis, M., Gkaniatsou, A., Karakostas, D. & Kiayias, A., 30 Sep 2019, Financial Cryptography and Data Security : 23rd International Conference, FC 2019. Springer, Cham, p. 426-445 20 p. (Lecture Notes in Computer Science (LNCS); vol. 11598).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. 2018
  4. On Choosing Between Privacy Preservation Mechanisms for Mobile Trajectory Data Sharing

    Singh, R., Theodorakopoulos, G., Marina, M. K. & Arapinis, M., 13 Aug 2018, 2018 IEEE Conference on Communications and Network Security (CNS). Beijing, China: Institute of Electrical and Electronics Engineers (IEEE), 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. 2017
  6. Low-Level Attacks in Bitcoin Wallets

    Gkaniatsou, A., Arapinis, M. & Kiayias, A., 20 Oct 2017, Information Security : 20th International Conference, ISC 2017, Ho Chi Minh City, Vietnam, November 22-24, 2017, Proceedings. Springer, Cham, p. 233-253 21 p. (Lecture Notes in Computer Science (LNCS); vol. 10599).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Analysis of privacy in mobile telephony systems

    Arapinis, M., Mancini, L. I., Ritter, E. & Ryan, M. D., 1 Oct 2017, In: International Journal of Information Security. 16, 5, p. 491-523 33 p.

    Research output: Contribution to journalArticlepeer-review

  8. Stateful applied Pi calculus: Observational equivalence and labelled bisimilarity

    Arapinis, M., Liu, J., Ritter, E. & Ryan, M., 1 Jun 2017, In: Journal of Logical and Algebraic Methods in Programming. 89, p. 95-149 55 p.

    Research output: Contribution to journalArticlepeer-review

  9. 2016
  10. When Are Three Voters Enough for Privacy Properties?

    Arapinis, M., Cortier, V. & Kremer, S., 15 Sep 2016, Computer Security – ESORICS 2016: 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part II. Springer International Publishing, p. 241-260 20 p. (Lecture Notes in Computer Science; vol. 9879).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Sensitivity of Counting Queries

    Arapinis, M., Figueira, D. & Gaboardi, M., 23 Aug 2016, 43rd International Colloquium on Automata, Languages, and Programming (ICALP 2016). Rome, Italy: Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, Germany, Vol. 55. p. 120:1-120:13 13 p. 120. (Leibniz International Proceedings in Informatics (LIPIcs); vol. 55).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. 2015
  13. Composing Security Protocols: From Confidentiality to Privacy

    Arapinis, M., Cheval, V. & Delaune, S., 18 Apr 2015, Principles of Security and Trust: 4th International Conference, POST 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015, Proceedings. Springer Berlin Heidelberg, p. 324-343 20 p. (Lecture Notes in Computer Science; vol. 9036).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. 2014
  15. StatVerif: Verification of stateful processes

    Arapinis, M., Phillips, J., Ritter, E. & Ryan, M., 19 Oct 2014, In: Journal of Computer Security. 22, 5, p. 743-821 78 p.

    Research output: Contribution to journalArticlepeer-review

  16. Dynamic tags for security protocol

    Arapinis, M., Delaune, S. & Kremer, S., Jun 2014, In: Logical Methods in Computer Science. 10, 2:11, p. 1-50 50 p.

    Research output: Contribution to journalArticlepeer-review

Previous 1 2 3 Next