Myrto Arapinis
Myrto Arapinis
School of Informatics, University of Edinburgh
Dirección de correo verificada de inf.ed.ac.uk
Título
Citado por
Citado por
Año
Analysing unlinkability and anonymity using the applied pi calculus
M Arapinis, T Chothia, E Ritter, M Ryan
Computer Security Foundations Symposium (CSF), 2010, 107-121, 2010
1482010
New Privacy Issues in Mobile Telephony: Fix and Verification
M Arapinis, L Mancini, E Ritter, M Ryan, N Golde, K Redon, R Borgaonkar
ACM Conference on Computer and Communications Security (CCS), 2012, 2012
1412012
Statverif: Verification of stateful processes
M Arapinis, J Phillips, E Ritter, MD Ryan
Journal of Computer Security 22 (5), 743-821, 2014
812014
StatVerif: Verification of Stateful Processes
M Arapinis, E Ritter, MD Ryan
Computer Security Foundations Symposium (CSF), 2011, 33-47, 2011
812011
Privacy through Pseudonymity in Mobile Telephony Systems.
M Arapinis, LI Mancini, E Ritter, M Ryan
NDSS, 2014
642014
Bounding messages for free in security protocols
M Arapinis, M Duflot
Foundations of Software Technology and Theoretical Computer Science (FSTTCS …, 2007
482007
Privacy supporting cloud computing: ConfiChair, a case study
M Arapinis, S Bursuc, M Ryan
First Conference on Principles of Security and Trust (POST), 2012, 89-108, 2012
342012
From one session to many: Dynamic tags for security protocols
M Arapinis, S Delaune, S Kremer
Logic for Programming, Artificial Intelligence, and Reasoning (LPAR), 2008 …, 2008
332008
Practical everlasting privacy
M Arapinis, V Cortier, S Kremer, M Ryan
First Conference on Principles of Security and Trust (POST), 2013, 21-40, 2013
292013
Composing security protocols: from confidentiality to privacy
M Arapinis, V Cheval, S Delaune
International Conference on Principles of Security and Trust, 324-343, 2015
222015
Verifying privacy-type properties in a modular way
M Arapinis, V Cheval, S Delaune
Computer Security Foundations Symposium (CSF), 2012, 95-109, 2012
192012
Untraceability in the applied pi-calculus
M Arapinis, T Chothia, E Ritter, M Ryan
Internet Technology and Secured Transactions (ICITST), 2009, 1-6, 2009
192009
When are three voters enough for privacy properties?
M Arapinis, V Cortier, S Kremer
European Symposium on Research in Computer Security, 241-260, 2016
182016
Stateful applied pi calculus
M Arapinis, J Liu, E Ritter, M Ryan
International Conference on Principles of Security and Trust, 22-41, 2014
152014
Privacy-supporting cloud computing by in-browser key translation
M Arapinis, S Bursuc, M Ryan
Journal of Computer Security 21 (6), 847-880, 2013
152013
Towards the verification of pervasive systems
M Arapinis, M Calder, L Dennis, M Fisher, P Gray, S Konur, A Miller, ...
Electronic Communications of the EASST 22 (0), 2010
152010
Reduction of equational theories for veri cation of trace equivalence: re-encryption, associativity and commutativity
M Arapinis, S Bursuc, M Ryan
First Conference on Principles of Security and Trust (POST), 2012, 169-188, 2012
142012
Semantics and implementation of minimally synchronous parallel ML
F Loulergue, F Gava, M Arapinis, F Dabrowski
International Journal of Computer and Information Science 5 (3), 182-199, 2004
112004
Analysis of privacy in mobile telephony systems
M Arapinis, LI Mancini, E Ritter, MD Ryan
International Journal of Information Security 16 (5), 491-523, 2017
102017
Low-level attacks in bitcoin wallets
A Gkaniatsou, M Arapinis, A Kiayias
International Conference on Information Security, 233-253, 2017
82017
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20