Follow
Mark D. Ryan
Mark D. Ryan
Professor of Computer Security, University of Birmingham
Verified email at cs.bham.ac.uk
Title
Cited by
Cited by
Year
Logic in Computer Science: Modelling and reasoning about systems
M Huth, M Ryan
Cambridge Univ Pr, 2004
25982004
Verifying properties of electronic voting protocols
S Delaune
in " Proceedings of the IAVoSS Workshop On Trustworthy Elections (WOTE’06, 2006
448*2006
Cloud computing security: The scientific challenge, and a survey of solutions
MD Ryan
Journal of Systems and Software 86 (9), 2263-2268, 2013
3752013
Analysis of an electronic voting protocol in the applied pi calculus
S Kremer, M Ryan
European Symposium on Programming, 186-200, 2005
3422005
Cloud computing privacy concerns on our doorstep
MD Ryan
Communications of the ACM 54 (1), 36-38, 2011
2812011
Election verifiability in electronic voting protocols
S Kremer, M Ryan, B Smyth
Computer Security–ESORICS 2010: 15th European Symposium on Research in …, 2010
2612010
Symbolic model checking for probabilistic processes
C Baier, EM Clarke, V Hartonas-Garmhausen, M Kwiatkowska, M Ryan
Automata, Languages and Programming: 24th International Colloquium, ICALP'97 …, 1997
2491997
New privacy issues in mobile telephony: fix and verification
M Arapinis, L Mancini, E Ritter, M Ryan, N Golde, K Redon, R Borgaonkar
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
2452012
Enhanced certificate transparency and end-to-end encrypted mail
MD Ryan
Cryptology ePrint Archive, 2013
2372013
Coercion-resistance and receipt-freeness in electronic voting
S Delaune, S Kremer, M Ryan
19th IEEE Computer Security Foundations Workshop (CSFW'06), 12 pp.-42, 2006
2342006
Analysing unlinkability and anonymity using the applied pi calculus
M Arapinis, T Chothia, E Ritter, M Ryan
2010 23rd IEEE computer security foundations symposium, 107-121, 2010
1832010
Feature integration using a feature construct
M Plath, M Ryan
Science of Computer Programming 41 (1), 53-84, 2001
1822001
Operators and laws for combining preference relations
H Andréka, M Ryan, PY Schobbens
Journal of logic and computation 12 (1), 13-53, 2002
1642002
Evaluating access control policies through model checking
N Zhang, M Ryan, DP Guelev
Information Security: 8th International Conference, ISC 2005, Singapore …, 2005
1542005
Weather information delivery systems and methods providing planning functionality and navigational tools
M Ryan, J Fennell, J Pearson
US Patent 7,185,044, 2007
1472007
Sharing actions and attributes in modal action logic
M Ryan, J Fiadeiro, T Maibaum
Theoretical Aspects of Computer Software: International Conference TACS'91 …, 1991
1371991
Software package requirements and procurement
A Finkelstein, G Spanoudakis, M Ryan
Proceedings of the 8th international workshop on software specification and …, 1996
1241996
Rehabilitation after hip femoroacetabular impingement arthroscopy.
M Wahoff, M Ryan
Clinics in sports medicine 30 (2), 463-482, 2011
1212011
Formalisms for multi-agent systems
M d'Inverno, M Fisher, A Lomuscio, M Luck, M De Rijke, M Ryan, ...
The Knowledge Engineering Review 12 (3), 315-321, 1997
1191997
Applied pi calculus
MD Ryan, B Smyth
Formal Models and Techniques for Analyzing Security Protocols, 112-142, 2011
1102011
The system can't perform the operation now. Try again later.
Articles 1–20