关注
Eike Ritter
Eike Ritter
Senior Lecturer in Computer Science, University of Birmingham, UK
在 cs.bham.ac.uk 的电子邮件经过验证 - 首页
标题
引用次数
年份
A Calculus for Resource Allocation
E Ritter
SCHOOL OF COMPUTER SCIENCE RESEARCH REPORTS-UNIVERSITY OF BIRMINGHAM CSR, 2000
2000
A fully abstract translation between a λ-calculus with reference types and Standard ML
E Ritter, AM Pitts
International Conference on Typed Lambda Calculi and Applications, 397-413, 1995
451995
A Games semantics for proofs in the classical sequent calculus
D Pym, E Ritter, C Führmann
A games semantics for reductive logic and proof-search.
DJ Pym, E Ritter
GALOP@ ETAPS, 107-123, 2005
122005
A generic Strong Normalization argument: application to the Calculus of Constructions
CHL Ong, E Ritter
International Workshop on Computer Science Logic, 261-279, 1993
91993
A malware-tolerant, self-healing industrial control system framework
M Denzel, M Ryan, E Ritter
ICT Systems Security and Privacy Protection: 32nd IFIP TC 11 International …, 2017
92017
A pairing-free ID-based one-pass authenticated key establishment protocol for wireless sensor networks
R Yasmin, E Ritter, G Wang
The 5th International Conference on Sensor Technologies and Applications, 21-27, 2011
92011
A Parigot-style linear-calculus for full intuitionistic linear logic.
V de Paiva, E Ritter
Theory and Applications of Categories [electronic only] 17, 30-48, 2006
92006
A proof-theoretic analysis of the classical propositional matrix method
D Pym, E Ritter, E Robinson
Journal of Logic and Computation 24 (1), 283-301, 2014
2014
A protocol for preventing insider attacks in untrusted infrastructure-as-a-service clouds
I Khan, Z Anwar, B Bordbar, E Ritter, H Rehman
IEEE Transactions on Cloud Computing 6 (4), 942-954, 2016
122016
A Semantics for Proof-search
D Pym, E Ritter
manuscript, September, 2000
32000
A semantics for reductive logic and proof-search
DJ Pym, E Ritter
Department of Computer Science, University of Bath, 2004
22004
A special volume: Chu spaces: theory and applications
M Barr, JRB Cockett, M Hasegawa, RAG Seely, V de Paiva, E Ritter, ...
THEORY AND APPLICATIONS OF CATEGORIES 17, 07, 2006
2006
An authentication framework for wireless sensor networks using identity-based signatures
R Yasmin, E Ritter, G Wang
2010 10th IEEE International Conference on Computer and Information …, 2010
922010
An authentication framework for wireless sensor networks using identity-based signatures: implementation and evaluation
R Yasmin, E Ritter, G Wang
IEICE TRANSACTIONS on Information and Systems 95 (1), 126-133, 2012
202012
An efficient linear abstract machine with single-pointer property
F Alberti, E Ritter
ESSLLI, 1998
41998
Analysing unlinkability and anonymity using the applied pi calculus
M Arapinis, T Chothia, E Ritter, M Ryan
2010 23rd IEEE computer security foundations symposium, 107-121, 2010
1822010
Analysis of a multi-party fair exchange protocol and formal proof of correctness in the strand space model
A Mukhamedov, S Kremer, E Ritter
International Conference on Financial Cryptography and Data Security, 255-269, 2005
352005
Analysis of privacy in mobile telephony systems
M Arapinis, LI Mancini, E Ritter, MD Ryan
International Journal of Information Security 16, 491-523, 2017
212017
Auditable envelopes: tracking anonymity revocation using trusted computing
M Smart, E Ritter
International Conference on Trust and Trustworthy Computing, 19-33, 2012
12012
系统目前无法执行此操作,请稍后再试。
文章 1–20