New Privacy Issues in Mobile Telephony: Fix and Verification M Arapinis, L Mancini, E Ritter, M Ryan, N Golde, K Redon, R Borgaonkar ACM Conference on Computer and Communications Security (CCS), 2012, 2012 | 167 | 2012 |
Analysing unlinkability and anonymity using the applied pi calculus M Arapinis, T Chothia, E Ritter, M Ryan Computer Security Foundations Symposium (CSF), 2010, 107-121, 2010 | 157 | 2010 |
Statverif: Verification of stateful processes M Arapinis, J Phillips, E Ritter, MD Ryan Journal of Computer Security 22 (5), 743-821, 2014 | 86 | 2014 |
StatVerif: Verification of Stateful Processes M Arapinis, E Ritter, MD Ryan Computer Security Foundations Symposium (CSF), 2011, 33-47, 2011 | 86 | 2011 |
Privacy through Pseudonymity in Mobile Telephony Systems. M Arapinis, LI Mancini, E Ritter, M Ryan NDSS, 2014 | 70 | 2014 |
Bounding messages for free in security protocols M Arapinis, M Duflot Foundations of Software Technology and Theoretical Computer Science (FSTTCS …, 2007 | 48 | 2007 |
Privacy supporting cloud computing: ConfiChair, a case study M Arapinis, S Bursuc, M Ryan First Conference on Principles of Security and Trust (POST), 2012, 89-108, 2012 | 42 | 2012 |
From one session to many: Dynamic tags for security protocols M Arapinis, S Delaune, S Kremer Logic for Programming, Artificial Intelligence, and Reasoning (LPAR), 2008 …, 2008 | 33 | 2008 |
Practical everlasting privacy M Arapinis, V Cortier, S Kremer, M Ryan First Conference on Principles of Security and Trust (POST), 2013, 21-40, 2013 | 32 | 2013 |
Verifying privacy-type properties in a modular way M Arapinis, V Cheval, S Delaune Computer Security Foundations Symposium (CSF), 2012, 95-109, 2012 | 25 | 2012 |
Composing security protocols: from confidentiality to privacy M Arapinis, V Cheval, S Delaune International Conference on Principles of Security and Trust, 324-343, 2015 | 23 | 2015 |
When are three voters enough for privacy properties? M Arapinis, V Cortier, S Kremer European Symposium on Research in Computer Security, 241-260, 2016 | 22 | 2016 |
Privacy-supporting cloud computing by in-browser key translation M Arapinis, S Bursuc, M Ryan Journal of Computer Security 21 (6), 847-880, 2013 | 19 | 2013 |
Untraceability in the applied pi-calculus M Arapinis, T Chothia, E Ritter, M Ryan Internet Technology and Secured Transactions (ICITST), 2009, 1-6, 2009 | 19 | 2009 |
Towards the verification of pervasive systems M Arapinis, M Calder, L Dennis, M Fisher, P Gray, S Konur, A Miller, ... Electronic Communications of the EASST 22 (0), 2010 | 18 | 2010 |
Stateful applied pi calculus M Arapinis, J Liu, E Ritter, M Ryan International Conference on Principles of Security and Trust, 22-41, 2014 | 16 | 2014 |
Reduction of equational theories for veri cation of trace equivalence: re-encryption, associativity and commutativity M Arapinis, S Bursuc, M Ryan First Conference on Principles of Security and Trust (POST), 2012, 169-188, 2012 | 14 | 2012 |
Analysis of privacy in mobile telephony systems M Arapinis, LI Mancini, E Ritter, MD Ryan International Journal of Information Security 16 (5), 491-523, 2017 | 13 | 2017 |
Sensitivity of counting queries M Arapinis, D Figueira, M Gaboardi International Colloquium on Automata, Languages, and Programming (ICALP), 2016 | 11 | 2016 |
Bounding messages for free in security protocols–extension to various security properties M Arapinis, M Duflot Information and Computation 239, 182-215, 2014 | 11 | 2014 |