Peter Ryan

Peter Ryan

Professor in Applied Security

Sujets de recherche Information assurance/security, Cryptography, Secure voting systems
Faculté ou Centre Faculté des Sciences, de la Technologie et de la Communication
Unité de recherche CSC
Adresse postale Campus Kirchberg, Université du Luxembourg
6, rue Richard Coudenhove-Kalergi
L-1359 Luxembourg
Bureau sur le campus F 212
Email
Téléphone (+352) 46 66 44 5667
Fax (+352) 46 66 44 5500
Video Prof. Peter Ryan (SnT)
Prof. Peter Ryan (SnT)
À l'Université depuis 2009
 
Peter Ryan - Professor in Applied Security

In February of 2009, Peter Ryan took up a position as full Professor of Applied Security at the University of Luxembourg. He has over 20 years of experience in cryptography, information assurance and formal verification. He pioneered the application of process algebras to modelling and analysis of secure systems, presenting the first process algebra (CSP) formulation of non-intereference at the Computer Security Foundations Workshop in 1989. In 1993, while at DRA, he initiated and led the "Modelling and Analysis of Security Protocols" research project that developed the CSP and model-checking approach to the analysis of security protocols. This project broke away from the trend of employing bespoke frameworks such as the epistemic BAN-logic and used mainstream formal methods notations and tools. Notable achievements of this project were the discovery by Gavin Lowe of the now famous flaw in the Needham-Schroeder Public Key protocol that had lain undiscovered for around 17 years.

He has published extensively on cryptography, cryptographic protocols, mathematical models of computer security and, most recently, high assurance voting systems. He is the creator of Prêt à Voter, Pretty Good Democracy (with Vanessa Teague) and OpenVote (with Feng Hoa) verifiable voting schemes. Also with Feng Hao he has been developing and analysing a novel Password Authenticated Key Establishment Protocol J-PAKE.

Prior to joining the University of Luxembourg he was a Professor of Computing Science at Newcastle University. He has worked at GCHQ, the Defence Research Agency, the Stanford Research Institute in Cambridge and the Software Engineering Institute, CMU Pittsburgh.

He holds a PhD in mathematical physics from the University of London.

Peter Ryan has been on program committees of numerous prestigious security conferences, notably: IEEE Security and Privacy, IEEE Computer Security Foundations Workshop, the European Symposium On Research In Computer Security (ESORICS), WITS (Workshop on Issues in Security). He was Chair of WITS’04 (Workshop on Issues in the Theory of Security) and Co-chair of ESORICS’04, co-chair of Frontiers of Electronic Elections FEE 2005, Chair WOTE 2007 (Workshop On Trustworthy Elections). From 1999 to 2007 he was the Chair of the ESORICS Steering Committee. He is a Fellow of the BCS and IMA.

He is also a Visiting Professor at the University of Surrey (UK).

Research topics:Information assurance, cryptography, cryptographic protocols, modelling and analysis of secure systems and security policies, analysis of information flow, cryptographic voting schemes, quantum cryptography and soico-technical aspects of security.

The book "Modelling and Analysis of Security Protocols" is now available online:

http://www.computing.surrey.ac.uk/personal/st/S.Schneider/books/MASP.pdf
 
 

Last updated on: jeudi, 07 juin 2012

powered by
orbilu.uni.lu

2014

Full Text
See detailTrapdoor Privacy in Asymmetric Searchable Encryption Schemes
Delerue Arriaga, Afonso; Tang, Qiang; Ryan, Peter

in Progress in Cryptology -- AFRICACRYPT 2014, Marrakesh 28-30 May 2014 (2014)

Full Text
See detailFormal Analysis of Electronic Exams
Dreier, Jannik; Giustolisi, Rosario; Kassem, Ali; Lafourcade, Pascal; Lenzini, Gabriele; Ryan, Peter

in SECRYPT 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014 (2014)

Full Text
See detailRemark!: A Secure Protocol for Remote Exams
Giustolisi, Rosario; Lenzini, Gabriele; Ryan, Peter

in Security Protocols XXII - Lecture Notes in Computer Science (2014)

Top of Page

2013

Full Text
See detailFaster Print on Demand for Prêt à Voter
Culnane, Chris; Heather, James; Joaquim, Rui; Ryan, Peter; Schneider, Steve; Teague, Vanessa

in Journal of Election Technology and Systems (2013), 2(1),

Full Text
See detailProving Prêt à Voter Receipt Free Using Computational Security Models
Khader, Dalia; Ryan, Peter; Tang, Qiang

in USENIX Journal of Election Technology and Systems (2013), 1(1), 62-81

See detailPassword-based Authenticated Key Establishment Protocols
Lancrenon, Jean; Khader, Dalia; Ryan, Peter; Hao, Feng

in Computer And Information Security Handbook (2013)

See detailPreventing Coercion in E-Voting: Be Open and Commit
Tabatabaei, Masoud; Jamroga, Wojciech; Ryan, Peter

Scientific Conference (2013, March 17)

Top of Page

2011

See detailSTAST 2011 Proc. of the 1st Workshop on Socio-Technical Aspects in Security and Trust
Coles-Kemp, Lizzie; Lenzini, Gabriele; Ryan, Peter; Bella, Giampaolo

Book published by IEEE (2011)

Top of Page

2010

Full Text
See detailVersatile Prêt à Voter: Handling Multiple Election Methods with a Unified Interface
Xia, Zhe; Culnane, Chris; Heather, James; Jonker, Hugo; Ryan, Peter; Schneider, Steve; Srinivasan, Sriramkrishnan

in Proc. 11th International Conference on Cryptology in India (IndoCrypt'10) (2010)

Top of Page