New privacy issues in mobile telephony: fix and verification M Arapinis, L Mancini, E Ritter, M Ryan, N Golde, K Redon, R Borgaonkar Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 246 | 2012 |
Analysing unlinkability and anonymity using the applied pi calculus M Arapinis, T Chothia, E Ritter, M Ryan 2010 23rd IEEE computer security foundations symposium, 107-121, 2010 | 183 | 2010 |
Categorical and Kripke semantics for constructive S4 modal logic N Alechina, M Mendler, V De Paiva, E Ritter Computer Science Logic: 15th International Workshop, CSL 2001 10th Annual …, 2001 | 161 | 2001 |
Extended Curry-Howard correspondence for a basic constructive modal logic G Bellin, V De Paiva, E Ritter Proceedings of methods for modalities 2, 2001 | 113 | 2001 |
Statverif: Verification of stateful processes M Arapinis, J Phillips, E Ritter, MD Ryan Journal of Computer security 22 (5), 743-821, 2014 | 97 | 2014 |
Privacy through pseudonymity in mobile telephony systems M Arapinis, LI Mancini, E Ritter, M Ryan 2014 Network and Distributed System Security Symposium, 1-14, 2014 | 93 | 2014 |
An authentication framework for wireless sensor networks using identity-based signatures R Yasmin, E Ritter, G Wang 2010 10th IEEE International Conference on Computer and Information …, 2010 | 92 | 2010 |
On the semantics of classical disjunction D Pym, E Ritter Journal of Pure and Applied Algebra 159 (2-3), 315-338, 2001 | 46 | 2001 |
Relating categorical semantics for intuitionistic linear logic ME Maietti, P Maneggia, V De Paiva, E Ritter Applied categorical structures 13, 1-36, 2005 | 45 | 2005 |
A fully abstract translation between a λ-calculus with reference types and Standard ML E Ritter, AM Pitts International Conference on Typed Lambda Calculi and Applications, 397-413, 1995 | 45 | 1995 |
Categorical abstract machines for higher-order typed λ-calculi E Ritter Theoretical Computer Science 136 (1), 125-162, 1994 | 43 | 1994 |
Reductive logic and proof-search: proof theory, semantics, and control DJ Pym, E Ritter Oxford University Press, 2004 | 36 | 2004 |
Analysis of a multi-party fair exchange protocol and formal proof of correctness in the strand space model A Mukhamedov, S Kremer, E Ritter International Conference on Financial Cryptography and Data Security, 255-269, 2005 | 35 | 2005 |
Linear explicit substitutions N Ghani, V De Paiva, E Ritter Logic Journal of IGPL 8 (1), 7-31, 2000 | 34 | 2000 |
On the intuitionistic force of classical search E Ritter, D Pym, L Wallen Theoretical Computer Science 232 (1-2), 299-333, 2000 | 32* | 2000 |
Towards the verification of pervasive systems M Arapinis, M Calder, L Dennis, M Fisher, P Gray, S Konur, A Miller, ... Electronic Communications of the EASST 22, 2009 | 28 | 2009 |
True trustworthy elections: remote electronic voting using trusted computing M Smart, E Ritter International Conference on Autonomic and Trusted Computing, 187-202, 2011 | 26 | 2011 |
Explicit substitutitions for constructive necessity N Ghani, V de Paiva, E Ritter Automata, Languages and Programming: 25th International Colloquium, ICALP'98 …, 1998 | 26 | 1998 |
Analysis of privacy in mobile telephony systems M Arapinis, LI Mancini, E Ritter, MD Ryan International Journal of Information Security 16, 491-523, 2017 | 24 | 2017 |
Basic constructive modality V de Paiva, E Ritter Logic Without Frontiers-Festschrift for Walter Alexandre Carnielli on the …, 2011 | 23 | 2011 |