Mark Ryan
Orcid: 0000-0002-1632-497XAffiliations:
- University of Birmingham, UK
- Imperial College, London, UK (former)
According to our database1,
Mark Ryan
authored at least 148 papers
between 1991 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy, 2024
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2023
Proceedings of the Foundations and Practice of Security - 16th International Symposium, 2023
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023
2022
Proceedings of the Computer Security - ESORICS 2022, 2022
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2022
2021
Root-of-Trust Abstractions for Symbolic Analysis: Application to Attestation Protocols.
Proceedings of the Security and Trust Management - 17th International Workshop, 2021
2020
Proceedings of the Security and Trust Management - 16th International Workshop, 2020
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020
2019
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019
2018
IEEE Trans. Inf. Forensics Secur., 2018
Proceedings of the Cryptology and Network Security - 17th International Conference, 2018
2017
J. Log. Algebraic Methods Program., 2017
Automatically Detecting the Misuse of Secrets: Foundations, Design Principles, and Applications.
IACR Cryptol. ePrint Arch., 2017
Proceedings of the Security Protocols XXV, 2017
Proceedings of the ICT Systems Security and Privacy Protection, 2017
2016
Proceedings of the 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, 2016
2015
Sci. Comput. Program., 2015
Proceedings of the Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31, 2015
Proceedings of the Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31, 2015
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015
2014
Springer Briefs in Cybersecurity, Springer, ISBN: 978-1-4471-6530-9, 2014
Privacy and Security in an Age of Surveillance (Dagstuhl Perspectives Workshop 14401).
Dagstuhl Reports, 2014
Proceedings of the Trustworthy Global Computing - 9th International Symposium, 2014
Proceedings of the Principles of Security and Trust - Third International Conference, 2014
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014
Proceedings of the IEEE 27th Computer Security Foundations Symposium, 2014
Proceedings of the Formal Methods for Security Workshop co-located with the PetriNets-2014 Conference , 2014
2013
J. Syst. Softw., 2013
J. Comput. Secur., 2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Trustworthy Global Computing - 8th International Symposium, 2013
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2013
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013
Proceedings of the Principles of Security and Trust - Second International Conference, 2013
2012
Reduction of Equational Theories for Verification of Trace Equivalence: Re-encryption, Associativity and Commutativity.
Proceedings of the Principles of Security and Trust - First International Conference, 2012
Proceedings of the Principles of Security and Trust - First International Conference, 2012
Proceedings of the Trusted Systems, 4th International Conference, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
2011
Proceedings of the E-Voting and Identity - Third International Conference, 2011
Proceedings of the Formal Aspects of Security and Trust - 8th International Workshop, 2011
Proceedings of the Formal Methods and Software Engineering, 2011
Proceedings of the 24th IEEE Computer Security Foundations Symposium, 2011
Proceedings of the 24th IEEE Computer Security Foundations Symposium, 2011
Proceedings of the Formal Models and Techniques for Analyzing Security Protocols, 2011
2010
ACM Trans. Inf. Syst. Secur., 2010
Proceedings of the Towards Trustworthy Elections, New Directions in Electronic Voting, 2010
Proceedings of the Trust and Trustworthy Computing, Third International Conference, 2010
Proceedings of the Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, 2010
Proceedings of the Formal Aspects of Security and Trust - 7th International Workshop, 2010
Proceedings of the Computer Security, 2010
Proceedings of the Computer Security, 2010
Proceedings of the Data and Applications Security and Privacy XXIV, 2010
Proceedings of the 23rd IEEE Computer Security Foundations Symposium, 2010
2009
J. Comput. Secur., 2009
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2009
Proceedings of the Security Protocols XVII, 2009
Proceedings of the Proceedings P2P 2009, 2009
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2009
Proceedings of the Trusted Systems, First International Conference, 2009
Proceedings of the Formal Aspects in Security and Trust, 6th International Workshop, 2009
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009
2008
J. Comput. Secur., 2008
Inf. Comput., 2008
Proceedings of the 2008 International Symposium on Applications and the Internet, 2008
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008
Proceedings of the Advances in Information and Computer Security, 2008
Verification of Integrity and Secrecy Properties of a Biometric Authentication Protocol.
Proceedings of the Information Security Practice and Experience, 2008
Synthesising Monitors from High-Level Policies for the Safe Execution of Untrusted Software.
Proceedings of the Information Security Practice and Experience, 2008
Proceedings of the Trust Management II, 2008
Proceedings of the 21st IEEE Computer Security Foundations Symposium, 2008
2007
Int. J. Softw. Tools Technol. Transf., 2007
Formal Aspects Comput., 2007
Formal Aspects Comput., 2007
Proceedings of the Trustworthy Global Computing, Third Symposium, 2007
Proceedings of the Financial Cryptography and Data Security, 2007
Proceedings of the Security and Privacy in Ad-hoc and Sensor Networks, 2007
Proceedings of the Formal Protocol Verification Applied, 14.10. - 19.10.2007, 2007
Proceedings of the Formal Protocol Verification Applied, 14.10. - 19.10.2007, 2007
2006
Proceedings of the 19th IEEE Computer Security Foundations Workshop, 2006
Proceedings of the 19th IEEE Computer Security Foundations Workshop, 2006
2005
Proceedings of the 5th International Workshop on Automated Verification of Critical Systems, 2005
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2005
Proceedings of the Information Security, 8th International Conference, 2005
Proceedings of the Formal Aspects in Security and Trust, Third International Workshop, 2005
Proceedings of the Programming Languages and Systems, 2005
2004
Analysing the Vulnerability of Protocols to Produce Known-pair and Chosen-text Attacks.
Proceedings of the 2nd International Workshop on Security Issues in Coordination Models, 2004
Proceedings of the Information Security, 7th International Conference, 2004
Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, 2004
Logic in computer science - modelling and reasoning about systems (2. ed.).
Cambridge University Press, 2004
2003
Towards Symbolic Strategy Synthesis for \left\langle {\left\langle A \right\rangle } \right\rangle-LTL.
Proceedings of the 10th International Symposium on Temporal Representation and Reasoning / 4th International Conference on Temporal Logic (TIME-ICTL 2003), 2003
Proceedings of the 18th IEEE International Conference on Automated Software Engineering (ASE 2003), 2003
Feature Integration as Substitution.
Proceedings of the Feature Interactions in Telecommunications and Software Systems VII, 2003
2002
Proceedings of the 9th Workhop on Logic, Language, Information and Computation, 2002
Feature Integration as an Operation of Theory Change.
Proceedings of the 15th European Conference on Artificial Intelligence, 2002
2001
Proceedings of the Intelligent Agents VIII, 8th International Workshop, 2001
2000
ACM Trans. Comput. Log., 2000
The feature construct for SMV: Semantics.
Proceedings of the Feature Interactions in Telecommunications and Software Systems VI, 2000
Proceedings of the Language Constructs for Describing Features, 2000
Proceedings of the Language Constructs for Describing Features, 2000
Logic in computer science - modelling and reasoning about systems.
Cambridge University Press, ISBN: 978-0-521-65602-3, 2000
1999
Artif. Intell. Eng. Des. Anal. Manuf., 1999
Proceedings of the Intelligent Agents VI, 1999
1998
Proceedings of the First International Workshop on Probabilistic Methods in Verification, 1998
Proceedings of the International Workshop Tool Support for System Specification, 1998
Plug-and-play Features.
Proceedings of the Feature Interactions in Telecommunications and Software Systems V, September 29, 1998
Ideal Agents Sharing (some!) Knowledge.
Proceedings of the 13th European Conference on Artificial Intelligence, 1998
1997
Proceedings of the Automata, Languages and Programming, 24th International Colloquium, 1997
Proceedings of the Agents and Multi-Agent Systems Formalisms, 1997
1996
Counterfactuals and Updates as Inverse Modalities.
Proceedings of the Sixth Conference on Theoretical Aspects of Rationality and Knowledge, 1996
Belief Revision and Ordered Theory Presentations.
Proceedings of the Logic, Action, and Information, 1996
Proceedings of the 8th International Workshop on Software Specification and Design, 1996
Intertranslating Counterfactuals and Updates.
Proceedings of the 12th European Conference on Artificial Intelligence, 1996
1995
Proceedings of the Progress in Artificial Intelligence, 1995
1993
Proceedings of IEEE International Symposium on Requirements Engineering, 1993
Prioritising Preference Relations.
Proceedings of the Theory and Formal Methods 1993, 1993
1992
Representing Defaults as Sentences with Reduced Priority.
Proceedings of the 3rd International Conference on Principles of Knowledge Representation and Reasoning (KR'92). Cambridge, 1992
1991
Proceedings of the Theoretical Aspects of Computer Software, 1991
Proceedings of the Sixth Annual Symposium on Logic in Computer Science (LICS '91), 1991