Mark Ryan

Publications

  1. 2020
  2. Published

    Modelling of 802.11 4-Way Handshake Attacks and Analysis of Security Properties

    Jose Moreira-Sanchez, Tom Chothia & Mark Ryan, 16 Sep 2020, STM 2020: Security and Trust Management . Springer, p. 3 21 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Accepted/In press

    Quantitative Verification of Certificate Transparency Gossip Protocols

    Michael Oxford, David Parker & Mark Ryan, 3 May 2020, (Accepted/In press) Proceedings of 6th International Workshop on Security and Privacy in the Cloud (SPC'20). IEEE Computer Society Press, 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. 2019
  5. Published

    CAOS: Concurrent-Access Obfuscated Store

    Mihai Ordean, Mark Ryan & David Galindo Chacon, 28 May 2019, Proceedings of the 24th ACM Symposium on Access Control Models and Technologies (SACMAT 2019). Association for Computing Machinery (ACM), p. 13-24 12 p. (Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. 2018
  7. Published

    Malware Tolerant (Mesh-) Networks

    Michael Denzel & Mark Ryan, 1 Sep 2018, Proceedings of the 17th International Conference on Cryptology And Network Security (CANS 2018) . Springer, p. 133-153 (Lecture Notes in Computer Science; vol. 11124).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    A Malware-Tolerant, Self-Healing Industrial Control System Framework

    Michael Denzel, Mark Ryan & Eike Ritter, 22 Jul 2018, ICT Systems Security and Privacy Protection: 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings. De Capitani di Vimercati, S. & Martinelli, F. (eds.). Springer, p. 46-60 (IFIP Advances in Information and Communication Technology ; vol. 502).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. 2017
  10. Published

    Analysis of privacy in mobile telephony systems

    Loretta Ilaria Mancini, Eike Ritter & Mark Ryan, Oct 2017, In: International Journal of Information Security. 16, 5, p. 491–523 33 p.

    Research output: Contribution to journalArticlepeer-review

  11. Published

    Authenticating compromisable storage systems

    Mark Ryan & , 11 Sep 2017, Proceedings of 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-17). IEEE Computer Society Press, 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    DECIM: Detecting Endpoint Compromise In Messaging

    Mark Ryan & , 11 Aug 2017, In: IEEE Transactions on Information Forensics and Security. 13 p.

    Research output: Contribution to journalArticlepeer-review

  13. Published

    Stateful Applied Pi Calculus: Observational Equivalence and Labelled Bisimilarity

    Jia Liu, Eike Ritter & Mark Ryan, 1 Jun 2017, In: Journal of Logical and Algebraic Methods in Programming. 89, p. 95-149 88 p.

    Research output: Contribution to journalArticlepeer-review

  14. Published

    Smart-Guard: defending user input from malware

    Michael Denzel, & Mark Ryan, 16 Jan 2017, 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld). El Baz, D. & Bourgeois, J. (eds.). Institute of Electrical and Electronics Engineers (IEEE), p. 502-509 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

Previous 1 2 3 4 5 6 7 8 ...10 Next