Mark D. Ryan
Mark D. Ryan
Professor of Computer Security, University of Birmingham
Verifierad e-postadress på cs.bham.ac.uk
TitelCiteras avÅr
Logic in Computer Science: Modelling and reasoning about systems
M Huth, M Ryan
Cambridge Univ Pr, 2004
20942004
Verifying privacy-type properties of electronic voting protocols
S Delaune, S Kremer, M Ryan
Journal of Computer Security 17 (4), 435-487, 2009
3372009
Analysis of an electronic voting protocol in the applied pi calculus
S Kremer, M Ryan
European Symposium on Programming, 186-200, 2005
2962005
Cloud computing security: The scientific challenge, and a survey of solutions
MD Ryan
Journal of Systems and Software 86 (9), 2263-2268, 2013
2642013
Cloud computing privacy concerns on our doorstep
MD Ryan
Communications of the ACM 54 (1), 36-38, 2011
2122011
Symbolic model checking for probabilistic processes
C Baier, EM Clarke, V Hartonas-Garmhausen, M Kwiatkowska, M Ryan
International Colloquium on Automata, Languages, and Programming, 430-440, 1997
2101997
Coercion-resistance and receipt-freeness in electronic voting
S Delaune, S Kremer, M Ryan
19th IEEE Computer Security Foundations Workshop (CSFW'06), 12 pp.-42, 2006
1852006
Election verifiability in electronic voting protocols
S Kremer, M Ryan, B Smyth
European Symposium on Research in Computer Security, 389-404, 2010
1842010
Operators and laws for combining preference relations
H Andréka, M Ryan, PY Schobbens
Journal of logic and computation 12 (1), 13-53, 2002
1462002
Analysing unlinkability and anonymity using the applied pi calculus
M Arapinis, T Chothia, E Ritter, M Ryan
2010 23rd IEEE Computer Security Foundations Symposium, 107-121, 2010
1432010
Feature integration using a feature construct
M Plath, M Ryan
Science of Computer Programming 41 (1), 53-84, 2001
1382001
New privacy issues in mobile telephony: fix and verification
M Arapinis, L Mancini, E Ritter, M Ryan, N Golde, K Redon, R Borgaonkar
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
1312012
Evaluating access control policies through model checking
N Zhang, M Ryan, DP Guelev
International Conference on Information Security, 446-460, 2005
1292005
Sharing actions and attributes in modal action logic
M Ryan, J Fiadeiro, T Maibaum
International Symposium on Theoretical Aspects of Computer Software, 569-593, 1991
1251991
Enhanced Certificate Transparency and End-to-End Encrypted Mail.
MD Ryan
NDSS, 1-14, 2014
1212014
Software package requirements and procurement
A Finkelsteiin, G Spanoudakis, M Ryan
Proceedings of the 8th international workshop on software specification and …, 1996
1141996
Formalisms for multi-agent systems
M D'inverno, M Fisher, A Lomuscio, M Luck, M De Rijke, M Ryan, ...
The Knowledge Engineering Review 12 (3), 315-321, 1997
1061997
Model-checking access control policies
DP Guelev, M Ryan, PY Schobbens
International Conference on Information Security, 219-230, 2004
922004
Statverif: Verification of stateful processes
M Arapinis, J Phillips, E Ritter, MD Ryan
Journal of Computer Security 22 (5), 743-821, 2014
792014
Applied pi calculus
MD Ryan, B Smyth
Ios Press, 2011
782011
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20