A Calculus for Resource Allocation E Ritter SCHOOL OF COMPUTER SCIENCE RESEARCH REPORTS-UNIVERSITY OF BIRMINGHAM CSR, 2000 | | 2000 |
A fully abstract translation between a λ-calculus with reference types and Standard ML E Ritter, AM Pitts International Conference on Typed Lambda Calculi and Applications, 397-413, 1995 | 45 | 1995 |
A Games semantics for proofs in the classical sequent calculus D Pym, E Ritter, C Führmann | | |
A games semantics for reductive logic and proof-search. DJ Pym, E Ritter GALOP@ ETAPS, 107-123, 2005 | 12 | 2005 |
A generic Strong Normalization argument: application to the Calculus of Constructions CHL Ong, E Ritter International Workshop on Computer Science Logic, 261-279, 1993 | 9 | 1993 |
A malware-tolerant, self-healing industrial control system framework M Denzel, M Ryan, E Ritter ICT Systems Security and Privacy Protection: 32nd IFIP TC 11 International …, 2017 | 9 | 2017 |
A pairing-free ID-based one-pass authenticated key establishment protocol for wireless sensor networks R Yasmin, E Ritter, G Wang The 5th International Conference on Sensor Technologies and Applications, 21-27, 2011 | 9 | 2011 |
A Parigot-style linear-calculus for full intuitionistic linear logic. V de Paiva, E Ritter Theory and Applications of Categories [electronic only] 17, 30-48, 2006 | 9 | 2006 |
A proof-theoretic analysis of the classical propositional matrix method D Pym, E Ritter, E Robinson Journal of Logic and Computation 24 (1), 283-301, 2014 | | 2014 |
A protocol for preventing insider attacks in untrusted infrastructure-as-a-service clouds I Khan, Z Anwar, B Bordbar, E Ritter, H Rehman IEEE Transactions on Cloud Computing 6 (4), 942-954, 2016 | 12 | 2016 |
A Semantics for Proof-search D Pym, E Ritter manuscript, September, 2000 | 3 | 2000 |
A semantics for reductive logic and proof-search DJ Pym, E Ritter Department of Computer Science, University of Bath, 2004 | 2 | 2004 |
A special volume: Chu spaces: theory and applications M Barr, JRB Cockett, M Hasegawa, RAG Seely, V de Paiva, E Ritter, ... THEORY AND APPLICATIONS OF CATEGORIES 17, 07, 2006 | | 2006 |
An authentication framework for wireless sensor networks using identity-based signatures R Yasmin, E Ritter, G Wang 2010 10th IEEE International Conference on Computer and Information …, 2010 | 92 | 2010 |
An authentication framework for wireless sensor networks using identity-based signatures: implementation and evaluation R Yasmin, E Ritter, G Wang IEICE TRANSACTIONS on Information and Systems 95 (1), 126-133, 2012 | 20 | 2012 |
An efficient linear abstract machine with single-pointer property F Alberti, E Ritter ESSLLI, 1998 | 4 | 1998 |
Analysing unlinkability and anonymity using the applied pi calculus M Arapinis, T Chothia, E Ritter, M Ryan 2010 23rd IEEE computer security foundations symposium, 107-121, 2010 | 182 | 2010 |
Analysis of a multi-party fair exchange protocol and formal proof of correctness in the strand space model A Mukhamedov, S Kremer, E Ritter International Conference on Financial Cryptography and Data Security, 255-269, 2005 | 35 | 2005 |
Analysis of privacy in mobile telephony systems M Arapinis, LI Mancini, E Ritter, MD Ryan International Journal of Information Security 16, 491-523, 2017 | 21 | 2017 |
Auditable envelopes: tracking anonymity revocation using trusted computing M Smart, E Ritter International Conference on Trust and Trustworthy Computing, 19-33, 2012 | 1 | 2012 |