Sotabase
Home
Researchers
Career
·
Reader in Computer Security
,
University of Edinburgh, School of Informatics, Security, Privacy and Trust Institute
2026–2004
Publications
(56)
New privacy issues in mobile telephony: fix and verification
Conference on Computer and Communications Security · 2012
195
cited
Analysing Unlinkability and Anonymity Using the Applied Pi Calculus
IEEE Computer Security Foundations Symposium · 2010
163
cited
StatVerif: Verification of stateful processes
IEEE Computer Security Foundations Symposium · 2011
84
cited
Privacy through Pseudonymity in Mobile Telephony Systems
Network and Distributed System Security Symposium · 2014
73
cited
Quantum Physical Unclonable Functions: Possibilities and Impossibilities
IACR Cryptology ePrint Archive · 2019
65
cited
Reduction of Equational Theories for Verification of Trace Equivalence: Re-encryption, Associativity and Commutativity
The post · 2012
48
cited
Bounding Messages for Free in Security Protocols
Foundations of Software Technology and Theoretical Computer Science · 2007
42
cited
Privacy Supporting Cloud Computing: ConfiChair, a Case Study
The post · 2012
42
cited
A Formal Treatment of Hardware Wallets
IACR Cryptology ePrint Archive · 2019
39
cited
Practical Everlasting Privacy
The post · 2013
35
cited
When Are Three Voters Enough for Privacy Properties?
European Symposium on Research in Computer Security · 2016
29
cited
From One Session to Many: Dynamic Tags for Security Protocols
Logic Programming and Automated Reasoning · 2008
27
cited
Verifying Privacy-Type Properties in a Modular Way
IEEE Computer Security Foundations Symposium · 2012
24
cited
Low-Level Attacks in Bitcoin Wallets
Information Security Conference · 2017
23
cited
Privacy-supporting cloud computing by in-browser key translation
Journal of computing and security · 2013
23
cited
Composing Security Protocols: From Confidentiality to Privacy
The post · 2014
20
cited
Electronic Communications of the EASST Volume X ( 2009 ) Proceedings of the Third International Workshop on Formal Methods for Interactive Systems ( FMIS 2009 ) Towards the Verification of Pervasive Systems
2009
19
cited
QEnclave - A practical solution for secure quantum cloud computing
npj Quantum Information · 2021
19
cited
Sensitivity of Counting Queries
International Colloquium on Automata, Languages and Programming · 2016
19
cited
Stateful Applied Pi Calculus
The post · 2014
18
cited
Show all 56 papers →
Sotabase
Myrto Arapinis | Researcher Profile | Sotabase | Sotabase