Mark Ryan

Publications

  1. 2019
  2. Published

    CAOS: Concurrent-Access Obfuscated Store

    Mihai Ordean, Mark Ryan & David Galindo Chacon, 28 May 2019, Proceedings of the 24th ACM Symposium on Access Control Models and Technologies (SACMAT 2019). Association for Computing Machinery (ACM), p. 13-24 12 p. (Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. 2018
  4. Published

    Malware Tolerant (Mesh-) Networks

    Michael Denzel & Mark Ryan, 1 Sep 2018, Proceedings of the 17th International Conference on Cryptology And Network Security (CANS 2018) . Springer, p. 133-153 (Lecture Notes in Computer Science; vol. 11124).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    A Malware-Tolerant, Self-Healing Industrial Control System Framework

    Michael Denzel, Mark Ryan & Eike Ritter, 22 Jul 2018, ICT Systems Security and Privacy Protection: 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings. De Capitani di Vimercati, S. & Martinelli, F. (eds.). Springer, p. 46-60 (IFIP Advances in Information and Communication Technology ; vol. 502).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. 2017
  7. Published

    Analysis of privacy in mobile telephony systems

    Arapinis, M., Loretta Ilaria Mancini, Eike Ritter & Mark Ryan, Oct 2017, In : International Journal of Information Security. 16, 5, p. 491–523 33 p.

    Research output: Contribution to journalArticle

  8. Published

    Authenticating compromisable storage systems

    Yu, J., Mark Ryan & Chen, L., 11 Sep 2017, Proceedings of 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-17). IEEE Computer Society Press, 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    DECIM: Detecting Endpoint Compromise In Messaging

    Yu, J., Mark Ryan & Cremers, C., 11 Aug 2017, In : IEEE Transactions on Information Forensics and Security. 13 p.

    Research output: Contribution to journalArticle

  10. Published

    Stateful Applied Pi Calculus: Observational Equivalence and Labelled Bisimilarity

    Arapinis, M., Jia Liu, Eike Ritter & Mark Ryan, 1 Jun 2017, In : Journal of Logical and Algebraic Methods in Programming. 89, p. 95-149 88 p.

    Research output: Contribution to journalArticle

  11. Published

    Smart-Guard: defending user input from malware

    Michael Denzel, Bruni, A. & Mark Ryan, 16 Jan 2017, 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld). El Baz, D. & Bourgeois, J. (eds.). Institute of Electrical and Electronics Engineers (IEEE), p. 502-509 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Making Decryption Accountable

    Mark Ryan, 2017, Security Protocols XXV: 25th International Workshop, Cambridge, UK, March 20-22, 2017, Revised Selected Papers. Anderson, J., Christianson, B., Matyas, V. & Stajano, F. (eds.). 1st ed. Springer, Vol. XXV. p. 93-98 6 p. (Lecture Notes in Computer Science; vol. XXV (25)).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. 2016
  14. Published

    DTKI: a new formalized PKI with verifiable trusted parties

    Yu, J., Cheval, V. & Mark Ryan, 3 Nov 2016, In : The Computer Journal. 59, 11, p. 1695-1713 19 p.

    Research output: Contribution to journalArticle

Previous 1 2 3 4 5 6 7 8 ...10 Next