Mark Ryan

Affiliations:
  • University of Birmingham, UK
  • Imperial College, London, UK (former)


According to our database1, Mark Ryan authored at least 146 papers between 1991 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Accountable Decryption made Formal and Practical.
IACR Cryptol. ePrint Arch., 2023

Using Reed-Muller Codes for Classification with Rejection and Recovery.
CoRR, 2023

Automatic verification of transparency protocols (extended version).
CoRR, 2023

Automatic verification of transparency protocols.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023

2022
SoK: TEE-Assisted Confidential Smart Contract.
Proc. Priv. Enhancing Technol., 2022

Exploring Web3 From the View of Blockchain.
CoRR, 2022

Protocols for a Two-Tiered Trusted Computing Base.
Proceedings of the Computer Security - ESORICS 2022, 2022

Symbolon: Enabling Flexible Multi-device-based User Authentication.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2022

2021
Root-of-Trust Abstractions for Symbolic Analysis: Application to Attestation Protocols.
Proceedings of the Security and Trust Management - 17th International Workshop, 2021

2020
Modelling of 802.11 4-Way Handshake Attacks and Analysis of Security Properties.
Proceedings of the Security and Trust Management - 16th International Workshop, 2020

Quantitative Verification of Certificate Transparency Gossip Protocols.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

2019
CAOS: Concurrent-Access Obfuscated Store.
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019

2018
DECIM: Detecting Endpoint Compromise In Messaging.
IEEE Trans. Inf. Forensics Secur., 2018

Malware Tolerant (Mesh-)Networks.
Proceedings of the Cryptology and Network Security - 17th International Conference, 2018

2017
Stateful applied pi calculus: Observational equivalence and labelled bisimilarity.
J. Log. Algebraic Methods Program., 2017

Analysis of privacy in mobile telephony systems.
Int. J. Inf. Sec., 2017

Authenticating compromisable storage systems.
IACR Cryptol. ePrint Arch., 2017

Evaluating web PKIs.
IACR Cryptol. ePrint Arch., 2017

Automatically Detecting the Misuse of Secrets: Foundations, Design Principles, and Applications.
IACR Cryptol. ePrint Arch., 2017

Making Decryption Accountable (Transcript of Discussion).
Proceedings of the Security Protocols XXV, 2017

Making Decryption Accountable.
Proceedings of the Security Protocols XXV, 2017

A Malware-Tolerant, Self-Healing Industrial Control System Framework.
Proceedings of the ICT Systems Security and Privacy Protection, 2017

2016
DTKI: A New Formalized PKI with Verifiable Trusted Parties.
Comput. J., 2016

Smart-Guard: Defending User Input from Malware.
Proceedings of the 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, 2016

2015
How to detect unauthorised usage of a key.
IACR Cryptol. ePrint Arch., 2015

Device Attacker Models: Fact and Fiction.
Proceedings of the Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31, 2015

Device Attacker Models: Fact and Fiction (Transcript of Discussion).
Proceedings of the Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31, 2015

Du-Vote: Remote Electronic Voting with Untrusted Computers.
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015

2014
Privacy vs. Security
Springer Briefs in Cybersecurity, Springer, ISBN: 978-1-4471-6530-9, 2014

StatVerif: Verification of stateful processes.
J. Comput. Secur., 2014

Privacy and Security in an Age of Surveillance (Dagstuhl Perspectives Workshop 14401).
Dagstuhl Reports, 2014

DTKI: a new formalized PKI with no trusted parties.
CoRR, 2014

Verification of agent knowledge in dynamic access control policies.
CoRR, 2014

Tests for Establishing Security Properties.
Proceedings of the Trustworthy Global Computing - 9th International Symposium, 2014

Stateful Applied Pi Calculus.
Proceedings of the Principles of Security and Trust - Third International Conference, 2014

Enhanced Certificate Transparency and End-to-End Encrypted Mail.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

Privacy through Pseudonymity in Mobile Telephony Systems.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

Balancing Societal Security and Individual Privacy: Accountable Escrow System.
Proceedings of the IEEE 27th Computer Security Foundations Symposium, 2014

Du-Vote: Remote Electronic Voting with Untrusted Computers.
Proceedings of the Formal Methods for Security Workshop co-located with the PetriNets-2014 Conference , 2014

2013
Cloud computing security: The scientific challenge, and a survey of solutions.
J. Syst. Softw., 2013

Privacy-supporting cloud computing by in-browser key translation.
J. Comput. Secur., 2013

Enhanced certificate transparency (how Johnny could encrypt).
IACR Cryptol. ePrint Arch., 2013

Composition of password-based protocols.
Formal Methods Syst. Des., 2013

Dynamic Measurement and Protected Execution: Model and Analysis.
Proceedings of the Trustworthy Global Computing - 8th International Symposium, 2013

Model Checking Agent Knowledge in Dynamic Access Control Policies.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2013

Caveat Coercitor: Coercion-Evidence in Electronic Voting.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

Practical Everlasting Privacy.
Proceedings of the Principles of Security and Trust - Second International Conference, 2013

2012
Formal analysis of privacy in Direct Anonymous Attestation schemes.
IACR Cryptol. ePrint Arch., 2012

Reduction of Equational Theories for Verification of Trace Equivalence: Re-encryption, Associativity and Commutativity.
Proceedings of the Principles of Security and Trust - First International Conference, 2012

Privacy Supporting Cloud Computing: ConfiChair, a Case Study.
Proceedings of the Principles of Security and Trust - First International Conference, 2012

Automatic Analysis of Security Properties of the TPM.
Proceedings of the Trusted Systems, 4th International Conference, 2012

New privacy issues in mobile telephony: fix and verification.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Formal Analysis of UMTS Privacy
CoRR, 2011

Cloud computing privacy concerns on our doorstep.
Commun. ACM, 2011

Trivitas: Voters Directly Verifying Votes.
Proceedings of the E-Voting and Identity - Third International Conference, 2011

Formal Analysis of Anonymity in ECC-Based Direct Anonymous Attestation Schemes.
Proceedings of the Formal Aspects of Security and Trust - 8th International Workshop, 2011

A Knowledge-Based Verification Method for Dynamic Access Control Policies.
Proceedings of the Formal Methods and Software Engineering, 2011

Formal Analysis of Protocols Based on TPM State Registers.
Proceedings of the 24th IEEE Computer Security Foundations Symposium, 2011

StatVerif: Verification of Stateful Processes.
Proceedings of the 24th IEEE Computer Security Foundations Symposium, 2011

Applied pi calculus.
Proceedings of the Formal Models and Techniques for Analyzing Security Protocols, 2011

2010
Identity Escrow Protocol and Anonymity Analysis in the Applied Pi-Calculus.
ACM Trans. Inf. Syst. Secur., 2010

Symbolic bisimulation for the applied pi calculus.
J. Comput. Secur., 2010

Verifying Privacy-Type Properties of Electronic Voting Protocols: A Taster.
Proceedings of the Towards Trustworthy Elections, New Directions in Electronic Voting, 2010

Escrowed Data and the Digital Envelope.
Proceedings of the Trust and Trustworthy Computing, Third International Conference, 2010

Towards Automatic Analysis of Election Verifiability Properties.
Proceedings of the Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, 2010

A Formal Analysis of Authentication in the TPM.
Proceedings of the Formal Aspects of Security and Trust - 7th International Workshop, 2010

Election Verifiability in Electronic Voting Protocols.
Proceedings of the Computer Security, 2010

Verifying Security Property of Peer-to-Peer Systems Using CSP.
Proceedings of the Computer Security, 2010

Modelling Dynamic Access Control Policies for Web-Based Collaborative Systems.
Proceedings of the Data and Applications Security and Privacy XXIV, 2010

Analysing Unlinkability and Anonymity Using the Applied Pi Calculus.
Proceedings of the 23rd IEEE Computer Security Foundations Symposium, 2010

2009
Verifying privacy-type properties of electronic voting protocols.
J. Comput. Secur., 2009

Towards the Verification of Pervasive Systems.
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2009

Towards a Verified Reference Implementation of a Trusted Platform Module.
Proceedings of the Security Protocols XVII, 2009

A Trusted Infrastructure for P2P-based Marketplaces.
Proceedings of the Proceedings P2P 2009, 2009

Context-Aware Monitoring of Untrusted Mobile Applications.
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2009

Trusted Integrity Measurement and Reporting for Virtualized Platforms.
Proceedings of the Trusted Systems, First International Conference, 2009

Attack, Solution and Verification for Shared Authorisation Data in TCG TPM.
Proceedings of the Formal Aspects in Security and Trust, 6th International Workshop, 2009

Untraceability in the applied pi-calculus.
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009

2008
Synthesising verified access control systems through model checking.
J. Comput. Secur., 2008

Fair multi-party contract signing using private contract signatures.
Inf. Comput., 2008

A Sybil-Resilient Reputation Metric for P2P Applications.
Proceedings of the 2008 International Symposium on Applications and the Internet, 2008

Monitoring the Execution of Third-Party Software on Mobile Devices.
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008

Analysis of a Biometric Authentication Protocol for Signature Creation Application.
Proceedings of the Advances in Information and Computer Security, 2008

Verification of Integrity and Secrecy Properties of a Biometric Authentication Protocol.
Proceedings of the Information Security Practice and Experience, 2008

Synthesising Monitors from High-Level Policies for the Safe Execution of Untrusted Software.
Proceedings of the Information Security Practice and Experience, 2008

Automatic Verification of Privacy Properties in the Applied pi Calculus.
Proceedings of the Trust Management II, 2008

Composition of Password-Based Protocols.
Proceedings of the 21st IEEE Computer Security Foundations Symposium, 2008

2007
Minimal refinements of specifications in modal and temporal logics.
Formal Aspects Comput., 2007

Minimal refinements of specifications in model and termporal logics.
Formal Aspects Comput., 2007

Guest Editorial.
Comput. Networks, 2007

Anonymity Protocol with Identity Escrow and Analysis in the Applied n-Calculus.
Proceedings of the Trustworthy Global Computing, Third Symposium, 2007

Improved Multi-party Contract Signing.
Proceedings of the Financial Cryptography and Data Security, 2007

Direct Anonymous Attestation (DAA): Ensuring Privacy with Corrupt Administrators.
Proceedings of the Security and Privacy in Ad-hoc and Sensor Networks, 2007

07421 Abstracts Collection -- Formal Protocol Verification Applied.
Proceedings of the Formal Protocol Verification Applied, 14.10. - 19.10.2007, 2007

07421 Executive Summary -- Formal Protocol Verification Applied.
Proceedings of the Formal Protocol Verification Applied, 14.10. - 19.10.2007, 2007

2006
Resolve-Impossibility for a Contract-Signing Protocol.
Proceedings of the 19th IEEE Computer Security Foundations Workshop, 2006

Coercion-Resistance and Receipt-Freeness in Electronic Voting.
Proceedings of the 19th IEEE Computer Security Foundations Workshop, 2006

2005
Synthesising Features by Games.
Proceedings of the 5th International Workshop on Automated Verification of Critical Systems, 2005

A New Algorithm for Strategy Synthesis in LTL Games.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2005

Evaluating Access Control Policies Through Model Checking.
Proceedings of the Information Security, 8th International Conference, 2005

On Anonymity with Identity Escrow.
Proceedings of the Formal Aspects in Security and Trust, Third International Workshop, 2005

Analysis of an Electronic Voting Protocol in the Applied Pi Calculus.
Proceedings of the Programming Languages and Systems, 2005

2004
Analysing the Vulnerability of Protocols to Produce Known-pair and Chosen-text Attacks.
Proceedings of the 2nd International Workshop on Security Issues in Coordination Models, 2004

Model-checking the Preservation of Temporal Properties upon Feature Integration.
Proceedings of the Fouth International Workshop on Automated Verification of Critical Systems, 2004

Model-Checking Access Control Policies.
Proceedings of the Information Security, 7th International Conference, 2004

Synthesising verified access control systems in XACML.
Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, 2004

Logic in computer science - modelling and reasoning about systems (2. ed.).
Cambridge University Press, 2004

2003
Towards Symbolic Strategy Synthesis for \left\langle {\left\langle A \right\rangle } \right\rangle-LTL.
Proceedings of the 10th International Symposium on Temporal Representation and Reasoning / 4th International Conference on Temporal Logic (TIME-ICTL 2003), 2003

Theoretical Foundations of Updating Systems.
Proceedings of the 18th IEEE International Conference on Automated Software Engineering (ASE 2003), 2003

Feature Integration as Substitution.
Proceedings of the Feature Interactions in Telecommunications and Software Systems VII, 2003

Objects, Agents, and Features: An Introduction.
Proceedings of the Objects, 2003

2002
Implementation of Belief Change Operators Using BDDs.
Stud Logica, 2002

Operators and Laws for Combining Preference Relations.
J. Log. Comput., 2002

Requirements, specifications, and minimal refinement.
Proceedings of the 9th Workhop on Logic, Language, Information and Computation, 2002

Approximating ATL<sup>*</sup> in ATL.
Proceedings of the Verification, 2002

Feature Integration as an Operation of Theory Change.
Proceedings of the 15th European Conference on Artificial Intelligence, 2002

2001
Feature integration using a feature construct.
Sci. Comput. Program., 2001

Agents and Roles: Refinement in Alternating-Time Temporal Logic.
Proceedings of the Intelligent Agents VIII, 8th International Workshop, 2001

2000
Knowledge in multiagent systems: initial configurations and broadcast.
ACM Trans. Comput. Log., 2000

The feature construct for SMV: Semantics.
Proceedings of the Feature Interactions in Telecommunications and Software Systems VI, 2000

Defining Features for CSP: Reflections on the Feature Interaction Contest.
Proceedings of the Language Constructs for Describing Features, 2000

Proving feature non-interaction with Alternating-Time Temporal Logic.
Proceedings of the Language Constructs for Describing Features, 2000

Logic in computer science - modelling and reasoning about systems.
Cambridge University Press, ISBN: 978-0-521-65602-3, 2000

1999
Knowledge in Multi-Agent Systems: Initial Configurations and Broadcast
CoRR, 1999

An algorithmic approach to knowledge evolution.
Artif. Intell. Eng. Des. Anal. Manuf., 1999

A Spectrum of Modes of Knowledge Sharing between Agents.
Proceedings of the Intelligent Agents VI, 1999

1998
Preface.
Proceedings of the First International Workshop on Probabilistic Methods in Verification, 1998

SFI: a Feature Integration Tool.
Proceedings of the International Workshop Tool Support for System Specification, 1998

Plug-and-play Features.
Proceedings of the Feature Interactions in Telecommunications and Software Systems V, September 29, 1998

Ideal Agents Sharing (some!) Knowledge.
Proceedings of the 13th European Conference on Artificial Intelligence, 1998

1997
Formalisms for multi-agent systems.
Knowl. Eng. Rev., 1997

Counterfactuals and Updates as Inverse Modalities.
J. Log. Lang. Inf., 1997

Symbolic Model Checking for Probabilistic Processes.
Proceedings of the Automata, Languages and Programming, 24th International Colloquium, 1997

On the Relation between Interpreted Systems and Kripke Models.
Proceedings of the Agents and Multi-Agent Systems Formalisms, 1997

1996
Counterfactuals and Updates as Inverse Modalities.
Proceedings of the Sixth Conference on Theoretical Aspects of Rationality and Knowledge, 1996

Belief Revision and Ordered Theory Presentations.
Proceedings of the Logic, Action, and Information, 1996

Software Package Requirements and Procurement.
Proceedings of the 8th International Workshop on Software Specification and Design, 1996

Intertranslating Counterfactuals and Updates.
Proceedings of the 12th European Conference on Artificial Intelligence, 1996

1995
Belief Revision and Verisimilitude.
Notre Dame J. Formal Log., 1995

A New Continuous Propositional Logic.
Proceedings of the Progress in Artificial Intelligence, 1995

1993
Towards Specifying Norms.
Ann. Math. Artif. Intell., 1993

Defaults in specifications.
Proceedings of IEEE International Symposium on Requirements Engineering, 1993

Prioritising Preference Relations.
Proceedings of the Theory and Formal Methods 1993, 1993

1992
Representing Defaults as Sentences with Reduced Priority.
Proceedings of the 3rd International Conference on Principles of Knowledge Representation and Reasoning (KR'92). Cambridge, 1992

1991
Sharing Actions and Attributes in Modal Action Logic.
Proceedings of the Theoretical Aspects of Computer Software, 1991

Defaults and Revision in Structured Theories
Proceedings of the Sixth Annual Symposium on Logic in Computer Science (LICS '91), 1991


  Loading...