Eike Ritter

Publications

  1. 2018
  2. Published

    A Protocol for Preventing Insider Attacks in Untrusted Infrastructure-as-a-Service Clouds.

    Khan, I., Anwar, Z., Behzad Bordbar, Eike Ritter & Rehman, H., 1 Oct 2018, In : IEEE Transactions on Cloud Computing. 6, 4, p. 942-954

    Research output: Contribution to journalArticle

  3. Published

    A Malware-Tolerant, Self-Healing Industrial Control System Framework

    Michael Denzel, Mark Ryan & Eike Ritter, 22 Jul 2018, ICT Systems Security and Privacy Protection: 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings. De Capitani di Vimercati, S. & Martinelli, F. (eds.). Springer, p. 46-60 (IFIP Advances in Information and Communication Technology ; vol. 502).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. 2017
  5. Published

    Analysis of privacy in mobile telephony systems

    Arapinis, M., Loretta Ilaria Mancini, Eike Ritter & Mark Ryan, Oct 2017, In : International Journal of Information Security. 16, 5, p. 491–523 33 p.

    Research output: Contribution to journalArticle

  6. Published

    Stateful Applied Pi Calculus: Observational Equivalence and Labelled Bisimilarity

    Arapinis, M., Jia Liu, Eike Ritter & Mark Ryan, 1 Jun 2017, In : Journal of Logical and Algebraic Methods in Programming. 89, p. 95-149 88 p.

    Research output: Contribution to journalArticle

  7. 2014
  8. Published
  9. Published

    StatVerif: Verification of stateful processes

    Myrto Arapinis, Joshua Phillips, Eike Ritter & Mark Ryan, 11 Jul 2014, In : Journal of Computer Security. 22, 5, p. 743-821 79 p.

    Research output: Contribution to journalArticle

  10. Published

    Privacy through Pseudonymity in Mobile Telephony Systems

    Myrto Arapinis, Loretta Ilaria Mancini, Eike Ritter & Mark Ryan, 23 Feb 2014, 21st Annual Network and Distributed System Security Symposium (NDSS'14). The Internet Society, 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    A proof-theoretic analysis of the classical propositional matrix method

    Pym, D., Eike Ritter & Robinson, E., 1 Feb 2014, In : Journal of Logic and Computation. 24, 1, p. 283-301 19 p.

    Research output: Contribution to journalArticle

  12. Published

    Stateful Applied Pi Calculus

    Myrto Arapinis, Liu, J., Eike Ritter & Mark Ryan, 2014, Principles of Security and Trust : Third International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014, Proceedings. Abadi, M. & Kremer, S. (eds.). Springer, Vol. 8414. p. 22-41 Chapter 2. (Lecture Notes in Computer Science; vol. 8414).

    Research output: Chapter in Book/Report/Conference proceedingOther chapter contribution

  13. 2013
  14. Published

    Model checking agent knowledge in dynamic access control policies

    Koleini, M., Eike Ritter & Mark Ryan, 2013, Tools and Algorithms for the Construction and Analysis of Systems : 19th International Conference, TACAS 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013, Rome, Italy, March 16-24, 2013. Proceedings. Piterman, N. & Smolka, SA. (eds.). Springer, p. 448-462 (Lecture Notes in Computer Science; vol. 7795).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

Previous 1 2 3 4 Next