


Остановите войну!
for scientists:


default search action
Mark Ryan 0001
Mark D. Ryan 0001 – Mark Dermot Ryan
Person information

- affiliation: University of Birmingham, UK
- affiliation (former): Imperial College, London, UK
Other persons with the same name
- Mark Ryan — disambiguation page
- Mark Ryan 0002 — IBM Canada Laboratory, North York, ON, Canada
- Mark Ryan 0003 — Rotheram Hospital, UK
- Mark Ryan 0004
— KTH Royal Institute of Technology, Stockholm, Sweden (and 1 more)
- Mark Ryan 0005 — National University of Ireland, Galway, Ireland
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [i17]Vincent Cheval, José Moreira, Mark Ryan:
Automatic verification of transparency protocols (extended version). CoRR abs/2303.04500 (2023) - 2022
- [j32]Rujia Li, Qin Wang, Qi Wang, David Galindo, Mark Ryan:
SoK: TEE-Assisted Confidential Smart Contract. Proc. Priv. Enhancing Technol. 2022(3): 711-731 (2022) - [c98]Thalia Laing, Eduard Marin, Mark D. Ryan, Joshua Schiffman, Gaëtan Wattiau:
Symbolon: Enabling Flexible Multi-device-based User Authentication. DSC 2022: 1-12 - [c97]José Moreira
, Mark Ryan
, Flavio D. Garcia
:
Protocols for a Two-Tiered Trusted Computing Base. ESORICS (3) 2022: 229-249 - [i16]Rujia Li, Qin Wang, Qi Wang, David Galindo, Mark Ryan
:
SoK: TEE-assisted Confidential Smart Contract. CoRR abs/2203.08548 (2022) - [i15]Qin Wang, Rujia Li, Qi Wang, Shiping Chen, Mark Ryan
, Thomas Hardjono:
Exploring Web3 From the View of Blockchain. CoRR abs/2206.08821 (2022) - 2021
- [c96]Georgios Fotiadis
, José Moreira
, Thanassis Giannetsos
, Liqun Chen
, Peter B. Rønne
, Mark Ryan
, Peter Y. A. Ryan
:
Root-of-Trust Abstractions for Symbolic Analysis: Application to Attestation Protocols. STM 2021: 163-184 - [e12]Robert H. Deng
, Feng Bao, Guilin Wang, Jian Shen, Mark Ryan, Weizhi Meng, Ding Wang:
Information Security Practice and Experience: 16th International Conference, ISPEC 2021, Nanjing, China, December 17-19, 2021, Proceedings. Lecture Notes in Computer Science 13107, Springer 2021, ISBN 978-3-030-93206-0 [contents] - 2020
- [c95]Michael Oxford, David Parker
, Mark Ryan
:
Quantitative Verification of Certificate Transparency Gossip Protocols. CNS 2020: 1-9 - [c94]Rajiv Ranjan Singh
, José Moreira
, Tom Chothia, Mark Dermot Ryan
:
Modelling of 802.11 4-Way Handshake Attacks and Analysis of Security Properties. STM 2020: 3-21
2010 – 2019
- 2019
- [c93]Mihai Ordean
, Mark Ryan
, David Galindo
:
CAOS: Concurrent-Access Obfuscated Store. SACMAT 2019: 13-24 - 2018
- [j31]Jiangshan Yu, Mark Ryan
, Cas Cremers:
DECIM: Detecting Endpoint Compromise In Messaging. IEEE Trans. Inf. Forensics Secur. 13(1): 106-118 (2018) - [c92]Michael Denzel, Mark Dermot Ryan
:
Malware Tolerant (Mesh-)Networks. CANS 2018: 133-153 - 2017
- [j30]Myrto Arapinis, Loretta Ilaria Mancini, Eike Ritter, Mark Dermot Ryan
:
Analysis of privacy in mobile telephony systems. Int. J. Inf. Sec. 16(5): 491-523 (2017) - [j29]Myrto Arapinis, Jia Liu
, Eike Ritter, Mark Ryan
:
Stateful applied pi calculus: Observational equivalence and labelled bisimilarity. J. Log. Algebraic Methods Program. 89: 95-149 (2017) - [c91]Kevin Milner, Cas Cremers, Jiangshan Yu, Mark Ryan
:
Automatically Detecting the Misuse of Secrets: Foundations, Design Principles, and Applications. CSF 2017: 203-216 - [c90]Michael Denzel, Mark Ryan
, Eike Ritter:
A Malware-Tolerant, Self-Healing Industrial Control System Framework. SEC 2017: 46-60 - [c89]Mark Dermot Ryan
:
Making Decryption Accountable. Security Protocols Workshop 2017: 93-98 - [c88]Mark Dermot Ryan
:
Making Decryption Accountable (Transcript of Discussion). Security Protocols Workshop 2017: 99-108 - [c87]Jiangshan Yu, Mark Ryan
, Liqun Chen
:
Authenticating Compromisable Storage Systems. TrustCom/BigDataSE/ICESS 2017: 25-32 - [e11]Matteo Maffei, Mark Ryan:
Principles of Security and Trust - 6th International Conference, POST 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22-29, 2017, Proceedings. Lecture Notes in Computer Science 10204, Springer 2017, ISBN 978-3-662-54454-9 [contents] - [i14]Mihai Ordean, Mark Ryan, David Galindo:
CAOS: Concurrent-Access Obfuscated Store. CoRR abs/1709.10412 (2017) - [i13]Kevin Milner, Cas Cremers, Jiangshan Yu, Mark Ryan:
Automatically Detecting the Misuse of Secrets: Foundations, Design Principles, and Applications. IACR Cryptol. ePrint Arch. 2017: 234 (2017) - [i12]Jiangshan Yu, Mark Ryan, Liqun Chen:
Authenticating compromisable storage systems. IACR Cryptol. ePrint Arch. 2017: 485 (2017) - [i11]Jiangshan Yu, Mark Ryan:
Evaluating web PKIs. IACR Cryptol. ePrint Arch. 2017: 526 (2017) - 2016
- [j28]Jiangshan Yu, Vincent Cheval, Mark Ryan
:
DTKI: A New Formalized PKI with Verifiable Trusted Parties. Comput. J. 59(11): 1695-1713 (2016) - [c86]Michael Denzel, Alessandro Bruni, Mark Dermot Ryan
:
Smart-Guard: Defending User Input from Malware. UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld 2016: 502-509 - 2015
- [j27]Bart Preneel, Phillip Rogaway, Mark Dermot Ryan, Peter Y. A. Ryan:
Privacy and Security in an Age of Surveillance (Dagstuhl Perspectives Workshop 14401). Dagstuhl Manifestos 5(1): 25-37 (2015) - [j26]Ben Smyth, Mark Dermot Ryan
, Liqun Chen
:
Formal analysis of privacy in Direct Anonymous Attestation schemes. Sci. Comput. Program. 111: 300-317 (2015) - [c85]Gurchetan S. Grewal, Mark Dermot Ryan
, Liqun Chen
, Michael R. Clarkson:
Du-Vote: Remote Electronic Voting with Untrusted Computers. CSF 2015: 155-169 - [c84]Jiangshan Yu, Mark Dermot Ryan
:
Device Attacker Models: Fact and Fiction. Security Protocols Workshop 2015: 158-167 - [c83]Mark Ryan
:
Device Attacker Models: Fact and Fiction (Transcript of Discussion). Security Protocols Workshop 2015: 168-177 - [i10]Jiangshan Yu, Mark Ryan, Cas Cremers:
How to detect unauthorised usage of a key. IACR Cryptol. ePrint Arch. 2015: 486 (2015) - 2014
- [b3]Sophie Stalla-Bourdillon, Joshua Phillips, Mark Dermot Ryan:
Privacy vs. Security. Springer Briefs in Cybersecurity, Springer 2014, ISBN 978-1-4471-6529-3, pp. 1-115 - [j25]Myrto Arapinis, Joshua Phillips, Eike Ritter, Mark Dermot Ryan
:
StatVerif: Verification of stateful processes. J. Comput. Secur. 22(5): 743-821 (2014) - [c82]Mark Ryan, Gurchetan S. Grewal, Liqun Chen:
Du-Vote: Remote Electronic Voting with Untrusted Computers. FMS @ Petri Nets 2014: 4 - [c81]Jia Liu, Mark Dermot Ryan
, Liqun Chen
:
Balancing Societal Security and Individual Privacy: Accountable Escrow System. CSF 2014: 427-440 - [c80]Myrto Arapinis, Loretta Ilaria Mancini, Eike Ritter, Mark Ryan:
Privacy through Pseudonymity in Mobile Telephony Systems. NDSS 2014 - [c79]Mark Dermot Ryan:
Enhanced Certificate Transparency and End-to-End Encrypted Mail. NDSS 2014 - [c78]Myrto Arapinis, Jia Liu, Eike Ritter, Mark Ryan
:
Stateful Applied Pi Calculus. POST 2014: 22-41 - [c77]Vincent Cheval, Stéphanie Delaune, Mark Ryan
:
Tests for Establishing Security Properties. TGC 2014: 82-96 - [i9]Masoud Koleini, Eike Ritter, Mark Ryan:
Verification of agent knowledge in dynamic access control policies. CoRR abs/1401.4730 (2014) - [i8]Jiangshan Yu, Vincent Cheval, Mark Ryan:
DTKI: a new formalized PKI with no trusted parties. CoRR abs/1408.1023 (2014) - [i7]Bart Preneel, Phillip Rogaway, Mark Dermot Ryan, Peter Y. A. Ryan:
Privacy and Security in an Age of Surveillance (Dagstuhl Perspectives Workshop 14401). Dagstuhl Reports 4(9): 106-123 (2014) - 2013
- [j24]Céline Chevalier, Stéphanie Delaune, Steve Kremer, Mark Dermot Ryan
:
Composition of password-based protocols. Formal Methods Syst. Des. 43(3): 369-413 (2013) - [j23]Myrto Arapinis, Sergiu Bursuc, Mark Ryan
:
Privacy-supporting cloud computing by in-browser key translation. J. Comput. Secur. 21(6): 847-880 (2013) - [j22]Mark Dermot Ryan
:
Cloud computing security: The scientific challenge, and a survey of solutions. J. Syst. Softw. 86(9): 2263-2268 (2013) - [c76]Myrto Arapinis, Véronique Cortier, Steve Kremer, Mark Ryan
:
Practical Everlasting Privacy. POST 2013: 21-40 - [c75]Gurchetan S. Grewal, Mark Dermot Ryan
, Sergiu Bursuc, Peter Y. A. Ryan
:
Caveat Coercitor: Coercion-Evidence in Electronic Voting. IEEE Symposium on Security and Privacy 2013: 367-381 - [c74]Masoud Koleini, Eike Ritter, Mark Ryan
:
Model Checking Agent Knowledge in Dynamic Access Control Policies. TACAS 2013: 448-462 - [c73]Shiwei Xu, Ian Batten, Mark Ryan
:
Dynamic Measurement and Protected Execution: Model and Analysis. TGC 2013: 45-63 - [e10]Catuscia Palamidessi
, Mark Dermot Ryan
:
Trustworthy Global Computing - 7th International Symposium, TGC 2012, Newcastle upon Tyne, UK, September 7-8, 2012, Revised Selected Papers. Lecture Notes in Computer Science 8191, Springer 2013, ISBN 978-3-642-41156-4 [contents] - [i6]Mark Dermot Ryan:
Enhanced certificate transparency (how Johnny could encrypt). IACR Cryptol. ePrint Arch. 2013: 595 (2013) - 2012
- [c72]Myrto Arapinis, Loretta Ilaria Mancini, Eike Ritter, Mark Ryan
, Nico Golde, Kevin Redon, Ravishankar Borgaonkar:
New privacy issues in mobile telephony: fix and verification. CCS 2012: 205-216 - [c71]Mark Dermot Ryan
:
Automatic Analysis of Security Properties of the TPM. INTRUST 2012: 1-4 - [c70]Myrto Arapinis, Sergiu Bursuc, Mark Ryan
:
Privacy Supporting Cloud Computing: ConfiChair, a Case Study. POST 2012: 89-108 - [c69]Myrto Arapinis, Sergiu Bursuc, Mark Dermot Ryan
:
Reduction of Equational Theories for Verification of Trace Equivalence: Re-encryption, Associativity and Commutativity. POST 2012: 169-188 - [e9]Mark Dermot Ryan
, Ben Smyth, Guilin Wang:
Information Security Practice and Experience - 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012. Proceedings. Lecture Notes in Computer Science 7232, Springer 2012, ISBN 978-3-642-29100-5 [contents] - [i5]Ben Smyth, Mark Dermot Ryan, Liqun Chen:
Formal analysis of privacy in Direct Anonymous Attestation schemes. IACR Cryptol. ePrint Arch. 2012: 650 (2012) - 2011
- [j21]Mark Dermot Ryan
:
Cloud computing privacy concerns on our doorstep. Commun. ACM 54(1): 36-38 (2011) - [c68]Myrto Arapinis, Eike Ritter, Mark Dermot Ryan
:
StatVerif: Verification of Stateful Processes. CSF 2011: 33-47 - [c67]Stéphanie Delaune, Steve Kremer, Mark Dermot Ryan
, Graham Steel:
Formal Analysis of Protocols Based on TPM State Registers. CSF 2011: 66-80 - [c66]Masoud Koleini, Mark Ryan
:
A Knowledge-Based Verification Method for Dynamic Access Control Policies. ICFEM 2011: 243-258 - [c65]Ben Smyth, Mark Ryan
, Liqun Chen
:
Formal Analysis of Anonymity in ECC-Based Direct Anonymous Attestation Schemes. Formal Aspects in Security and Trust 2011: 245-262 - [c64]Sergiu Bursuc, Gurchetan S. Grewal, Mark Dermot Ryan
:
Trivitas: Voters Directly Verifying Votes. VoteID 2011: 190-207 - [p2]Mark Dermot Ryan
, Ben Smyth:
Applied pi calculus. Formal Models and Techniques for Analyzing Security Protocols 2011: 112-142 - [i4]Myrto Arapinis, Loretta Ilaria Mancini, Eike Ritter, Mark Ryan:
Formal Analysis of UMTS Privacy. CoRR abs/1109.2066 (2011) - 2010
- [j20]Stéphanie Delaune, Steve Kremer, Mark Dermot Ryan
:
Symbolic bisimulation for the applied pi calculus. J. Comput. Secur. 18(2): 317-377 (2010) - [j19]Aybek Mukhamedov, Mark Dermot Ryan
:
Identity Escrow Protocol and Anonymity Analysis in the Applied Pi-Calculus. ACM Trans. Inf. Syst. Secur. 13(4): 41:1-41:29 (2010) - [c63]Myrto Arapinis, Tom Chothia, Eike Ritter, Mark Ryan
:
Analysing Unlinkability and Anonymity Using the Applied Pi Calculus. CSF 2010: 107-121 - [c62]Hasan Qunoo, Mark Ryan
:
Modelling Dynamic Access Control Policies for Web-Based Collaborative Systems. DBSec 2010: 295-302 - [c61]Tien Tuan Anh Dinh, Mark Ryan
:
Verifying Security Property of Peer-to-Peer Systems Using CSP. ESORICS 2010: 319-339 - [c60]Steve Kremer, Mark Ryan
, Ben Smyth:
Election Verifiability in Electronic Voting Protocols. ESORICS 2010: 389-404 - [c59]Stéphanie Delaune, Steve Kremer, Mark Dermot Ryan
, Graham Steel:
A Formal Analysis of Authentication in the TPM. Formal Aspects in Security and Trust 2010: 111-125 - [c58]Ben Smyth, Mark Ryan
, Steve Kremer, Mounira Kourjieh:
Towards Automatic Analysis of Election Verifiability Properties. ARSPA-WITS 2010: 146-163 - [c57]King Ables, Mark Dermot Ryan
:
Escrowed Data and the Digital Envelope. TRUST 2010: 246-256 - [c56]Stéphanie Delaune, Steve Kremer, Mark Ryan
:
Verifying Privacy-Type Properties of Electronic Voting Protocols: A Taster. Towards Trustworthy Elections 2010: 289-309
2000 – 2009
- 2009
- [j18]Myrto Arapinis, Muffy Calder, Louise A. Dennis, Michael Fisher, Philip D. Gray, Savas Konur, Alice Miller, Eike Ritter, Mark Ryan, Sven Schewe, Chris Unsworth, Rehana Yasmin:
Towards the Verification of Pervasive Systems. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 22 (2009) - [j17]Stéphanie Delaune, Steve Kremer, Mark Ryan
:
Verifying privacy-type properties of electronic voting protocols. J. Comput. Secur. 17(4): 435-487 (2009) - [c55]Myrto Arapinis, Tom Chothia, Eike Ritter, Mark Ryan
:
Untraceability in the applied pi-calculus. ICITST 2009: 1-6 - [c54]Liqun Chen
, Mark Ryan
:
Attack, Solution and Verification for Shared Authorisation Data in TCG TPM. Formal Aspects in Security and Trust 2009: 201-216 - [c53]Serdar Cabuk, Liqun Chen
, David Plaquin, Mark Ryan
:
Trusted Integrity Measurement and Reporting for Virtualized Platforms. INTRUST 2009: 180-196 - [c52]Andrew Brown, Mark Ryan
:
Context-Aware Monitoring of Untrusted Mobile Applications. MobiSec 2009: 83-96 - [c51]Tien Tuan Anh Dinh, Tom Chothia, Mark Ryan
:
A Trusted Infrastructure for P2P-based Marketplaces. Peer-to-Peer Computing 2009: 151-154 - [c50]Aybek Mukhamedov, Andrew D. Gordon, Mark Ryan
:
Towards a Verified Reference Implementation of a Trusted Platform Module. Security Protocols Workshop 2009: 69-81 - 2008
- [j16]Aybek Mukhamedov, Mark Dermot Ryan
:
Fair multi-party contract signing using private contract signatures. Inf. Comput. 206(2-4): 272-290 (2008) - [j15]Nan Zhang, Mark Ryan
, Dimitar P. Guelev:
Synthesising verified access control systems through model checking. J. Comput. Secur. 16(1): 1-61 (2008) - [c49]Stéphanie Delaune, Steve Kremer, Mark Ryan
:
Composition of Password-Based Protocols. CSF 2008: 239-251 - [c48]Stéphanie Delaune, Mark Ryan
, Ben Smyth:
Automatic Verification of Privacy Properties in the Applied pi Calculus. IFIPTM 2008: 263-278 - [c47]Anongporn Salaiwarakul, Mark Dermot Ryan
:
Verification of Integrity and Secrecy Properties of a Biometric Authentication Protocol. ISPEC 2008: 1-13 - [c46]Andrew Brown, Mark Ryan
:
Synthesising Monitors from High-Level Policies for the Safe Execution of Untrusted Software. ISPEC 2008: 233-247 - [c45]Anongporn Salaiwarakul, Mark Ryan
:
Analysis of a Biometric Authentication Protocol for Signature Creation Application. IWSEC 2008: 231-245 - [c44]Andrew Brown, Mark Ryan
:
Monitoring the Execution of Third-Party Software on Mobile Devices. RAID 2008: 410-411 - [c43]Tien Tuan Anh Dinh, Mark Ryan
:
A Sybil-Resilient Reputation Metric for P2P Applications. SAINT 2008: 193-196 - [e8]Liqun Chen, Steve Kremer, Mark Dermot Ryan:
Formal Protocol Verification Applied, 14.10. - 19.10.2007. Dagstuhl Seminar Proceedings 07421, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany 2008 [contents] - [e7]Liqun Chen, Mark Dermot Ryan, Guilin Wang:
Information and Communications Security, 10th International Conference, ICICS 2008, Birmingham, UK, October 20-22, 2008, Proceedings. Lecture Notes in Computer Science 5308, Springer 2008, ISBN 978-3-540-88624-2 [contents] - 2007
- [j14]Stephan Reiff-Marganiec
, Mark Ryan
:
Guest Editorial. Comput. Networks 51(2): 357-358 (2007) - [j13]Nikos Gorogiannis, Mark Ryan
:
Minimal refinements of specifications in model and termporal logics. Formal Aspects Comput. 19(1): 35-62 (2007) - [j12]Nikos Gorogiannis, Mark Ryan
:
Minimal refinements of specifications in modal and temporal logics. Formal Aspects Comput. 19(2): 273 (2007) - [j11]Nikos Gorogiannis, Mark Ryan
:
Minimal refinements of specifications in modal and temporal logics. Formal Aspects Comput. 19(4): 417-444 (2007) - [j10]Dimitar P. Guelev, Mark Dermot Ryan
, Pierre-Yves Schobbens
:
Model-checking the preservation of temporal properties upon feature integration. Int. J. Softw. Tools Technol. Transf. 9(1): 53-62 (2007) - [c42]Ben Smyth, Mark Ryan
, Liqun Chen
:
Direct Anonymous Attestation (DAA): Ensuring Privacy with Corrupt Administrators. ESAS 2007: 218-231 - [c41]Aybek Mukhamedov, Mark Ryan
:
Improved Multi-party Contract Signing. Financial Cryptography 2007: 179-191 - [c40]Stéphanie Delaune, Steve Kremer, Mark Ryan
:
Symbolic Bisimulation for the Applied Pi Calculus. FSTTCS 2007: 133-145 - [c39]Aybek Mukhamedov, Mark Dermot Ryan
:
Anonymity Protocol with Identity Escrow and Analysis in the Applied n-Calculus. TGC 2007: 330-346 - [i3]Liqun Chen, Steve Kremer, Mark Dermot Ryan:
07421 Executive Summary -- Formal Protocol Verification Applied. Formal Protocol Verification Applied 2007 - [i2]Liqun Chen, Steve Kremer, Mark Dermot Ryan:
07421 Abstracts Collection -- Formal Protocol Verification Applied. Formal Protocol Verification Applied 2007 - 2006
- [c38]Stéphanie Delaune, Steve Kremer, Mark Ryan
:
Coercion-Resistance and Receipt-Freeness in Electronic Voting. CSFW 2006: 28-42 - [c37]Aybek Mukhamedov, Mark Dermot Ryan
:
Resolve-Impossibility for a Contract-Signing Protocol. CSFW 2006: 167-176 - 2005
- [c36]Steve Kremer, Mark Ryan
:
Analysis of an Electronic Voting Protocol in the Applied Pi Calculus. ESOP 2005: 186-200 - [c35]Aybek Mukhamedov, Mark Dermot Ryan
:
On Anonymity with Identity Escrow. Formal Aspects in Security and Trust 2005: 235-243 - [c34]Nan Zhang, Mark Ryan
, Dimitar P. Guelev:
Evaluating Access Control Policies Through Model Checking. ISC 2005: 446-460 - [c33]Aidan Harding, Mark Ryan
, Pierre-Yves Schobbens
:
A New Algorithm for Strategy Synthesis in LTL Games. TACAS 2005: 477-492 - [c32]Dimitar P. Guelev, Mark Dermot Ryan
, Pierre-Yves Schobbens
:
Synthesising Features by Games. AVoCS 2005: 79-93 - [e6]Stephan Reiff-Marganiec, Mark Ryan:
Feature Interactions in Telecommunications and Software Systems VIII, ICFI'05, 28-30 June 2005, Leicester, UK. IOS Press 2005, ISBN 1-58603-524-X [contents] - 2004
- [b2]Michael Huth, Mark Dermot Ryan:
Logic in computer science - modelling and reasoning about systems (2. ed.). Cambridge University Press 2004, pp. I-XIV, 1-427 - [c31]Nan Zhang, Mark Ryan
, Dimitar P. Guelev:
Synthesising verified access control systems in XACML. FMSE 2004: 56-65 - [c30]Dimitar P. Guelev, Mark Ryan
, Pierre-Yves Schobbens
:
Model-Checking Access Control Policies. ISC 2004: 219-230 - [c29]Steve Kremer, Mark Ryan
:
Analysing the Vulnerability of Protocols to Produce Known-pair and Chosen-text Attacks. SecCo 2004: 87-104 - [c28]D