Eike Ritter
Eike Ritter
Senior Lecturer in Computer Science, University of Birmingham, UK
Verified email at - Homepage
Cited by
Cited by
New privacy issues in mobile telephony: fix and verification
M Arapinis, L Mancini, E Ritter, M Ryan, N Golde, K Redon, R Borgaonkar
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
Analysing unlinkability and anonymity using the applied pi calculus
M Arapinis, T Chothia, E Ritter, M Ryan
2010 23rd IEEE computer security foundations symposium, 107-121, 2010
Categorical and Kripke semantics for constructive S4 modal logic
N Alechina, M Mendler, V De Paiva, E Ritter
Computer Science Logic: 15th International Workshop, CSL 2001 10th Annual …, 2001
Extended Curry-Howard correspondence for a basic constructive modal logic
G Bellin, V De Paiva, E Ritter
Proceedings of methods for modalities 2, 2001
Statverif: Verification of stateful processes
M Arapinis, J Phillips, E Ritter, MD Ryan
Journal of Computer security 22 (5), 743-821, 2014
An authentication framework for wireless sensor networks using identity-based signatures
R Yasmin, E Ritter, G Wang
2010 10th IEEE International Conference on Computer and Information …, 2010
Privacy through pseudonymity in mobile telephony systems
M Arapinis, LI Mancini, E Ritter, M Ryan
2014 Network and Distributed System Security Symposium, 1-14, 2014
On the semantics of classical disjunction
D Pym, E Ritter
Journal of Pure and Applied Algebra 159 (2-3), 315-338, 2001
A fully abstract translation between a λ-calculus with reference types and Standard ML
E Ritter, AM Pitts
International Conference on Typed Lambda Calculi and Applications, 397-413, 1995
Relating categorical semantics for intuitionistic linear logic
ME Maietti, P Maneggia, V De Paiva, E Ritter
Applied categorical structures 13, 1-36, 2005
Categorical abstract machines for higher-order typed λ-calculi
E Ritter
Theoretical Computer Science 136 (1), 125-162, 1994
Reductive logic and proof-search: proof theory, semantics, and control
DJ Pym, E Ritter
Oxford University Press, 2004
Analysis of a multi-party fair exchange protocol and formal proof of correctness in the strand space model
A Mukhamedov, S Kremer, E Ritter
International Conference on Financial Cryptography and Data Security, 255-269, 2005
Linear explicit substitutions
N Ghani, V De Paiva, E Ritter
Logic Journal of IGPL 8 (1), 7-31, 2000
On the intuitionistic force of classical search
E Ritter, D Pym, L Wallen
Theoretical Computer Science 232 (1-2), 299-333, 2000
Towards the verification of pervasive systems
M Arapinis, M Calder, L Dennis, M Fisher, P Gray, S Konur, A Miller, ...
Electronic Communications of the EASST 22, 2009
Explicit substitutitions for constructive necessity
N Ghani, V de Paiva, E Ritter
Automata, Languages and Programming: 25th International Colloquium, ICALP'98 …, 1998
True trustworthy elections: remote electronic voting using trusted computing
M Smart, E Ritter
International Conference on Autonomic and Trusted Computing, 187-202, 2011
Basic constructive modality
V de Paiva, E Ritter
Logic Without Frontiers-Festschrift for Walter Alexandre Carnielli on the …, 2011
Analysis of privacy in mobile telephony systems
M Arapinis, LI Mancini, E Ritter, MD Ryan
International Journal of Information Security 16, 491-523, 2017
The system can't perform the operation now. Try again later.
Articles 1–20