default search action
Mark Ryan 0001
Person information
- affiliation: University of Birmingham, UK
- affiliation (former): Imperial College, London, UK
Other persons with the same name
- Mark Ryan — disambiguation page
- Mark Ryan 0002 — IBM Canada Laboratory, North York, ON, Canada
- Mark Ryan 0003 — Rotheram Hospital, UK
- Mark Ryan 0004 — KTH Royal Institute of Technology, Stockholm, Sweden (and 1 more)
- Mark Ryan 0005 — National University of Ireland, Galway, Ireland
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c102]Mo Zhang, Eduard Marin, Mark Ryan, Vassilis Kostakos, Toby Murray, Benjamin Tag, David F. Oswald:
OOBKey: Key Exchange with Implantable Medical Devices Using Out-Of-Band Channels. ARES 2024: 191:1-191:13 - [c101]Yongqi Wang, Thalia Laing, José Moreira, Mark D. Ryan:
Remote Registration of Multiple Authenticators. CODASPY 2024: 379-390 - 2023
- [c100]Vincent Cheval, José Moreira, Mark Ryan:
Automatic verification of transparency protocols. EuroS&P 2023: 107-121 - [c99]Daniel Fentham, David Parker, Mark Ryan:
Using Reed-Muller Codes for Classification with Rejection and Recovery. FPS (1) 2023: 36-52 - [i19]Vincent Cheval, José Moreira, Mark Ryan:
Automatic verification of transparency protocols (extended version). CoRR abs/2303.04500 (2023) - [i18]Daniel Fentham, David Parker, Mark Ryan:
Using Reed-Muller Codes for Classification with Rejection and Recovery. CoRR abs/2309.06359 (2023) - [i17]Rujia Li, Yuanzhao Li, Qin Wang, Sisi Duan, Qin Wang, Mark Ryan:
Accountable Decryption made Formal and Practical. IACR Cryptol. ePrint Arch. 2023: 1519 (2023) - 2022
- [j32]Rujia Li, Qin Wang, Qi Wang, David Galindo, Mark Ryan:
SoK: TEE-Assisted Confidential Smart Contract. Proc. Priv. Enhancing Technol. 2022(3): 711-731 (2022) - [c98]Thalia Laing, Eduard Marin, Mark D. Ryan, Joshua Schiffman, Gaëtan Wattiau:
Symbolon: Enabling Flexible Multi-device-based User Authentication. DSC 2022: 1-12 - [c97]José Moreira, Mark Ryan, Flavio D. Garcia:
Protocols for a Two-Tiered Trusted Computing Base. ESORICS (3) 2022: 229-249 - [i16]Rujia Li, Qin Wang, Qi Wang, David Galindo, Mark Ryan:
SoK: TEE-assisted Confidential Smart Contract. CoRR abs/2203.08548 (2022) - [i15]Qin Wang, Rujia Li, Qi Wang, Shiping Chen, Mark Ryan, Thomas Hardjono:
Exploring Web3 From the View of Blockchain. CoRR abs/2206.08821 (2022) - 2021
- [c96]Georgios Fotiadis, José Moreira, Thanassis Giannetsos, Liqun Chen, Peter B. Rønne, Mark Ryan, Peter Y. A. Ryan:
Root-of-Trust Abstractions for Symbolic Analysis: Application to Attestation Protocols. STM 2021: 163-184 - [e12]Robert H. Deng, Feng Bao, Guilin Wang, Jian Shen, Mark Ryan, Weizhi Meng, Ding Wang:
Information Security Practice and Experience: 16th International Conference, ISPEC 2021, Nanjing, China, December 17-19, 2021, Proceedings. Lecture Notes in Computer Science 13107, Springer 2021, ISBN 978-3-030-93206-0 [contents] - 2020
- [c95]Michael Oxford, David Parker, Mark Ryan:
Quantitative Verification of Certificate Transparency Gossip Protocols. CNS 2020: 1-9 - [c94]Rajiv Ranjan Singh, José Moreira, Tom Chothia, Mark Dermot Ryan:
Modelling of 802.11 4-Way Handshake Attacks and Analysis of Security Properties. STM 2020: 3-21
2010 – 2019
- 2019
- [c93]Mihai Ordean, Mark Ryan, David Galindo:
CAOS: Concurrent-Access Obfuscated Store. SACMAT 2019: 13-24 - 2018
- [j31]Jiangshan Yu, Mark Ryan, Cas Cremers:
DECIM: Detecting Endpoint Compromise In Messaging. IEEE Trans. Inf. Forensics Secur. 13(1): 106-118 (2018) - [c92]Michael Denzel, Mark Dermot Ryan:
Malware Tolerant (Mesh-)Networks. CANS 2018: 133-153 - 2017
- [j30]Myrto Arapinis, Loretta Ilaria Mancini, Eike Ritter, Mark Dermot Ryan:
Analysis of privacy in mobile telephony systems. Int. J. Inf. Sec. 16(5): 491-523 (2017) - [j29]Myrto Arapinis, Jia Liu, Eike Ritter, Mark Ryan:
Stateful applied pi calculus: Observational equivalence and labelled bisimilarity. J. Log. Algebraic Methods Program. 89: 95-149 (2017) - [c91]Kevin Milner, Cas Cremers, Jiangshan Yu, Mark Ryan:
Automatically Detecting the Misuse of Secrets: Foundations, Design Principles, and Applications. CSF 2017: 203-216 - [c90]Michael Denzel, Mark Ryan, Eike Ritter:
A Malware-Tolerant, Self-Healing Industrial Control System Framework. SEC 2017: 46-60 - [c89]Mark Dermot Ryan:
Making Decryption Accountable. Security Protocols Workshop 2017: 93-98 - [c88]Mark Dermot Ryan:
Making Decryption Accountable (Transcript of Discussion). Security Protocols Workshop 2017: 99-108 - [c87]Jiangshan Yu, Mark Ryan, Liqun Chen:
Authenticating Compromisable Storage Systems. TrustCom/BigDataSE/ICESS 2017: 25-32 - [e11]Matteo Maffei, Mark Ryan:
Principles of Security and Trust - 6th International Conference, POST 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22-29, 2017, Proceedings. Lecture Notes in Computer Science 10204, Springer 2017, ISBN 978-3-662-54454-9 [contents] - [i14]Mihai Ordean, Mark Ryan, David Galindo:
CAOS: Concurrent-Access Obfuscated Store. CoRR abs/1709.10412 (2017) - [i13]Kevin Milner, Cas Cremers, Jiangshan Yu, Mark Ryan:
Automatically Detecting the Misuse of Secrets: Foundations, Design Principles, and Applications. IACR Cryptol. ePrint Arch. 2017: 234 (2017) - [i12]Jiangshan Yu, Mark Ryan, Liqun Chen:
Authenticating compromisable storage systems. IACR Cryptol. ePrint Arch. 2017: 485 (2017) - [i11]Jiangshan Yu, Mark Ryan:
Evaluating web PKIs. IACR Cryptol. ePrint Arch. 2017: 526 (2017) - 2016
- [j28]Jiangshan Yu, Vincent Cheval, Mark Ryan:
DTKI: A New Formalized PKI with Verifiable Trusted Parties. Comput. J. 59(11): 1695-1713 (2016) - [c86]Michael Denzel, Alessandro Bruni, Mark Dermot Ryan:
Smart-Guard: Defending User Input from Malware. UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld 2016: 502-509 - 2015
- [j27]Bart Preneel, Phillip Rogaway, Mark Dermot Ryan, Peter Y. A. Ryan:
Privacy and Security in an Age of Surveillance (Dagstuhl Perspectives Workshop 14401). Dagstuhl Manifestos 5(1): 25-37 (2015) - [j26]Ben Smyth, Mark Dermot Ryan, Liqun Chen:
Formal analysis of privacy in Direct Anonymous Attestation schemes. Sci. Comput. Program. 111: 300-317 (2015) - [c85]Gurchetan S. Grewal, Mark Dermot Ryan, Liqun Chen, Michael R. Clarkson:
Du-Vote: Remote Electronic Voting with Untrusted Computers. CSF 2015: 155-169 - [c84]Jiangshan Yu, Mark Dermot Ryan:
Device Attacker Models: Fact and Fiction. Security Protocols Workshop 2015: 158-167 - [c83]Mark Ryan:
Device Attacker Models: Fact and Fiction (Transcript of Discussion). Security Protocols Workshop 2015: 168-177 - [i10]Jiangshan Yu, Mark Ryan, Cas Cremers:
How to detect unauthorised usage of a key. IACR Cryptol. ePrint Arch. 2015: 486 (2015) - 2014
- [b3]Sophie Stalla-Bourdillon, Joshua Phillips, Mark Dermot Ryan:
Privacy vs. Security. Springer Briefs in Cybersecurity, Springer 2014, ISBN 978-1-4471-6529-3, pp. 1-115 - [j25]Myrto Arapinis, Joshua Phillips, Eike Ritter, Mark Dermot Ryan:
StatVerif: Verification of stateful processes. J. Comput. Secur. 22(5): 743-821 (2014) - [c82]Mark Ryan, Gurchetan S. Grewal, Liqun Chen:
Du-Vote: Remote Electronic Voting with Untrusted Computers. FMS @ Petri Nets 2014: 4 - [c81]Jia Liu, Mark Dermot Ryan, Liqun Chen:
Balancing Societal Security and Individual Privacy: Accountable Escrow System. CSF 2014: 427-440 - [c80]Myrto Arapinis, Loretta Ilaria Mancini, Eike Ritter, Mark Ryan:
Privacy through Pseudonymity in Mobile Telephony Systems. NDSS 2014 - [c79]Mark Dermot Ryan:
Enhanced Certificate Transparency and End-to-End Encrypted Mail. NDSS 2014 - [c78]Myrto Arapinis, Jia Liu, Eike Ritter, Mark Ryan:
Stateful Applied Pi Calculus. POST 2014: 22-41 - [c77]Vincent Cheval, Stéphanie Delaune, Mark Ryan:
Tests for Establishing Security Properties. TGC 2014: 82-96 - [i9]Masoud Koleini, Eike Ritter, Mark Ryan:
Verification of agent knowledge in dynamic access control policies. CoRR abs/1401.4730 (2014) - [i8]Jiangshan Yu, Vincent Cheval, Mark Ryan:
DTKI: a new formalized PKI with no trusted parties. CoRR abs/1408.1023 (2014) - [i7]Bart Preneel, Phillip Rogaway, Mark Dermot Ryan, Peter Y. A. Ryan:
Privacy and Security in an Age of Surveillance (Dagstuhl Perspectives Workshop 14401). Dagstuhl Reports 4(9): 106-123 (2014) - 2013
- [j24]Céline Chevalier, Stéphanie Delaune, Steve Kremer, Mark Dermot Ryan:
Composition of password-based protocols. Formal Methods Syst. Des. 43(3): 369-413 (2013) - [j23]Myrto Arapinis, Sergiu Bursuc, Mark Ryan:
Privacy-supporting cloud computing by in-browser key translation. J. Comput. Secur. 21(6): 847-880 (2013) - [j22]Mark Dermot Ryan:
Cloud computing security: The scientific challenge, and a survey of solutions. J. Syst. Softw. 86(9): 2263-2268 (2013) - [c76]Myrto Arapinis, Véronique Cortier, Steve Kremer, Mark Ryan:
Practical Everlasting Privacy. POST 2013: 21-40 - [c75]Gurchetan S. Grewal, Mark Dermot Ryan, Sergiu Bursuc, Peter Y. A. Ryan:
Caveat Coercitor: Coercion-Evidence in Electronic Voting. IEEE Symposium on Security and Privacy 2013: 367-381 - [c74]Masoud Koleini, Eike Ritter, Mark Ryan:
Model Checking Agent Knowledge in Dynamic Access Control Policies. TACAS 2013: 448-462 - [c73]Shiwei Xu, Ian Batten, Mark Ryan:
Dynamic Measurement and Protected Execution: Model and Analysis. TGC 2013: 45-63 - [e10]Catuscia Palamidessi, Mark Dermot Ryan:
Trustworthy Global Computing - 7th International Symposium, TGC 2012, Newcastle upon Tyne, UK, September 7-8, 2012, Revised Selected Papers. Lecture Notes in Computer Science 8191, Springer 2013, ISBN 978-3-642-41156-4 [contents] - [i6]Mark Dermot Ryan:
Enhanced certificate transparency (how Johnny could encrypt). IACR Cryptol. ePrint Arch. 2013: 595 (2013) - 2012
- [c72]Myrto Arapinis, Loretta Ilaria Mancini, Eike Ritter, Mark Ryan, Nico Golde, Kevin Redon, Ravishankar Borgaonkar:
New privacy issues in mobile telephony: fix and verification. CCS 2012: 205-216 - [c71]Mark Dermot Ryan:
Automatic Analysis of Security Properties of the TPM. INTRUST 2012: 1-4 - [c70]Myrto Arapinis, Sergiu Bursuc, Mark Ryan:
Privacy Supporting Cloud Computing: ConfiChair, a Case Study. POST 2012: 89-108 - [c69]Myrto Arapinis, Sergiu Bursuc, Mark Dermot Ryan:
Reduction of Equational Theories for Verification of Trace Equivalence: Re-encryption, Associativity and Commutativity. POST 2012: 169-188 - [e9]Mark Dermot Ryan, Ben Smyth, Guilin Wang:
Information Security Practice and Experience - 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012. Proceedings. Lecture Notes in Computer Science 7232, Springer 2012, ISBN 978-3-642-29100-5 [contents] - [i5]Ben Smyth, Mark Dermot Ryan, Liqun Chen:
Formal analysis of privacy in Direct Anonymous Attestation schemes. IACR Cryptol. ePrint Arch. 2012: 650 (2012) - 2011
- [j21]Mark Dermot Ryan:
Cloud computing privacy concerns on our doorstep. Commun. ACM 54(1): 36-38 (2011) - [c68]Myrto Arapinis, Eike Ritter, Mark Dermot Ryan:
StatVerif: Verification of Stateful Processes. CSF 2011: 33-47 - [c67]Stéphanie Delaune, Steve Kremer, Mark Dermot Ryan, Graham Steel:
Formal Analysis of Protocols Based on TPM State Registers. CSF 2011: 66-80 - [c66]Masoud Koleini, Mark Ryan:
A Knowledge-Based Verification Method for Dynamic Access Control Policies. ICFEM 2011: 243-258 - [c65]Ben Smyth, Mark Ryan, Liqun Chen:
Formal Analysis of Anonymity in ECC-Based Direct Anonymous Attestation Schemes. Formal Aspects in Security and Trust 2011: 245-262 - [c64]Sergiu Bursuc, Gurchetan S. Grewal, Mark Dermot Ryan:
Trivitas: Voters Directly Verifying Votes. VoteID 2011: 190-207 - [p2]Mark Dermot Ryan, Ben Smyth:
Applied pi calculus. Formal Models and Techniques for Analyzing Security Protocols 2011: 112-142 - [i4]Myrto Arapinis, Loretta Ilaria Mancini, Eike Ritter, Mark Ryan:
Formal Analysis of UMTS Privacy. CoRR abs/1109.2066 (2011) - 2010
- [j20]Stéphanie Delaune, Steve Kremer, Mark Dermot Ryan:
Symbolic bisimulation for the applied pi calculus. J. Comput. Secur. 18(2): 317-377 (2010) - [j19]Aybek Mukhamedov, Mark Dermot Ryan:
Identity Escrow Protocol and Anonymity Analysis in the Applied Pi-Calculus. ACM Trans. Inf. Syst. Secur. 13(4): 41:1-41:29 (2010) - [c63]Myrto Arapinis, Tom Chothia, Eike Ritter, Mark Ryan:
Analysing Unlinkability and Anonymity Using the Applied Pi Calculus. CSF 2010: 107-121 - [c62]Hasan Qunoo, Mark Ryan:
Modelling Dynamic Access Control Policies for Web-Based Collaborative Systems. DBSec 2010: 295-302 - [c61]Tien Tuan Anh Dinh, Mark Ryan:
Verifying Security Property of Peer-to-Peer Systems Using CSP. ESORICS 2010: 319-339 - [c60]Steve Kremer, Mark Ryan, Ben Smyth:
Election Verifiability in Electronic Voting Protocols. ESORICS 2010: 389-404 - [c59]Stéphanie Delaune, Steve Kremer, Mark Dermot Ryan, Graham Steel:
A Formal Analysis of Authentication in the TPM. Formal Aspects in Security and Trust 2010: 111-125 - [c58]Ben Smyth, Mark Ryan, Steve Kremer, Mounira Kourjieh:
Towards Automatic Analysis of Election Verifiability Properties. ARSPA-WITS 2010: 146-163 - [c57]King Ables, Mark Dermot Ryan:
Escrowed Data and the Digital Envelope. TRUST 2010: 246-256 - [c56]Stéphanie Delaune, Steve Kremer, Mark Ryan:
Verifying Privacy-Type Properties of Electronic Voting Protocols: A Taster. Towards Trustworthy Elections 2010: 289-309
2000 – 2009
- 2009
- [j18]Myrto Arapinis, Muffy Calder, Louise A. Dennis, Michael Fisher, Philip D. Gray, Savas Konur, Alice Miller, Eike Ritter, Mark Ryan, Sven Schewe, Chris Unsworth, Rehana Yasmin:
Towards the Verification of Pervasive Systems. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 22 (2009) - [j17]Stéphanie Delaune, Steve Kremer, Mark Ryan:
Verifying privacy-type properties of electronic voting protocols. J. Comput. Secur. 17(4): 435-487 (2009) - [c55]Myrto Arapinis, Tom Chothia, Eike Ritter, Mark Ryan:
Untraceability in the applied pi-calculus. ICITST 2009: 1-6 - [c54]Liqun Chen, Mark Ryan:
Attack, Solution and Verification for Shared Authorisation Data in TCG TPM. Formal Aspects in Security and Trust 2009: 201-216 - [c53]Serdar Cabuk, Liqun Chen, David Plaquin, Mark Ryan:
Trusted Integrity Measurement and Reporting for Virtualized Platforms. INTRUST 2009: 180-196 - [c52]Andrew Brown, Mark Ryan:
Context-Aware Monitoring of Untrusted Mobile Applications. MobiSec 2009: 83-96 - [c51]Tien Tuan Anh Dinh, Tom Chothia, Mark Ryan:
A Trusted Infrastructure for P2P-based Marketplaces. Peer-to-Peer Computing 2009: 151-154 - [c50]Aybek Mukhamedov, Andrew D. Gordon, Mark Ryan:
Towards a Verified Reference Implementation of a Trusted Platform Module. Security Protocols Workshop 2009: 69-81 - 2008
- [j16]Aybek Mukhamedov, Mark Dermot Ryan:
Fair multi-party contract signing using private contract signatures. Inf. Comput. 206(2-4): 272-290 (2008) - [j15]Nan Zhang, Mark Ryan, Dimitar P. Guelev:
Synthesising verified access control systems through model checking. J. Comput. Secur. 16(1): 1-61 (2008) - [c49]Stéphanie Delaune, Steve Kremer, Mark Ryan:
Composition of Password-Based Protocols. CSF 2008: 239-251 - [c48]Stéphanie Delaune, Mark Ryan, Ben Smyth:
Automatic Verification of Privacy Properties in the Applied pi Calculus. IFIPTM 2008: 263-278 - [c47]Anongporn Salaiwarakul, Mark Dermot Ryan:
Verification of Integrity and Secrecy Properties of a Biometric Authentication Protocol. ISPEC 2008: 1-13 - [c46]Andrew Brown, Mark Ryan:
Synthesising Monitors from High-Level Policies for the Safe Execution of Untrusted Software. ISPEC 2008: 233-247 - [c45]Anongporn Salaiwarakul, Mark Ryan:
Analysis of a Biometric Authentication Protocol for Signature Creation Application. IWSEC 2008: 231-245 - [c44]Andrew Brown, Mark Ryan:
Monitoring the Execution of Third-Party Software on Mobile Devices. RAID 2008: 410-411 - [c43]Tien Tuan Anh Dinh, Mark Ryan:
A Sybil-Resilient Reputation Metric for P2P Applications. SAINT 2008: 193-196 - [e8]Liqun Chen, Steve Kremer, Mark Dermot Ryan:
Formal Protocol Verification Applied, 14.10. - 19.10.2007. Dagstuhl Seminar Proceedings 07421, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany 2008 [contents] - [e7]Liqun Chen, Mark Dermot Ryan, Guilin Wang:
Information and Communications Security, 10th International Conference, ICICS 2008, Birmingham, UK, October 20-22, 2008, Proceedings. Lecture Notes in Computer Science 5308, Springer 2008, ISBN 978-3-540-88624-2 [contents] - 2007
- [j14]Stephan Reiff-Marganiec, Mark Ryan:
Guest Editorial. Comput. Networks 51(2): 357-358 (2007) - [j13]Nikos Gorogiannis, Mark Ryan:
Minimal refinements of specifications in model and termporal logics. Formal Aspects Comput. 19(1): 35-62 (2007) - [j12]Nikos Gorogiannis, Mark Ryan:
Minimal refinements of specifications in modal and temporal logics. Formal Aspects Comput. 19(2): 273 (2007) - [j11]Nikos Gorogiannis, Mark Ryan:
Minimal refinements of specifications in modal and temporal logics. Formal Aspects Comput. 19(4): 417-444 (2007) - [j10]Dimitar P. Guelev, Mark Dermot Ryan, Pierre-Yves Schobbens:
Model-checking the preservation of temporal properties upon feature integration. Int. J. Softw. Tools Technol. Transf. 9(1): 53-62 (2007) - [c42]Ben Smyth, Mark Ryan, Liqun Chen:
Direct Anonymous Attestation (DAA): Ensuring Privacy with Corrupt Administrators. ESAS 2007: 218-231 - [c41]Aybek Mukhamedov, Mark Ryan:
Improved Multi-party Contract Signing. Financial Cryptography 2007: 179-191 - [c40]Stéphanie Delaune, Steve Kremer, Mark Ryan:
Symbolic Bisimulation for the Applied Pi Calculus. FSTTCS 2007: 133-145 - [c39]Aybek Mukhamedov, Mark Dermot Ryan:
Anonymity Protocol with Identity Escrow and Analysis in the Applied n-Calculus. TGC 2007: 330-346 - [i3]Liqun Chen, Steve Kremer, Mark Dermot Ryan:
07421 Executive Summary -- Formal Protocol Verification Applied. Formal Protocol Verification Applied 2007 - [i2]Liqun Chen, Steve Kremer, Mark Dermot Ryan:
07421 Abstracts Collection -- Formal Protocol Verification Applied. Formal Protocol Verification Applied 2007 - 2006
- [c38]Stéphanie Delaune, Steve Kremer, Mark Ryan:
Coercion-Resistance and Receipt-Freeness in Electronic Voting. CSFW 2006: 28-42 - [c37]Aybek Mukhamedov, Mark Dermot Ryan:
Resolve-Impossibility for a Contract-Signing Protocol. CSFW 2006: 167-176 - 2005
- [c36]Steve Kremer, Mark Ryan:
Analysis of an Electronic Voting Protocol in the Applied Pi Calculus. ESOP 2005: 186-200 - [c35]Aybek Mukhamedov, Mark Dermot Ryan:
On Anonymity with Identity Escrow. Formal Aspects in Security and Trust 2005: 235-243 - [c34]Nan Zhang, Mark Ryan, Dimitar P. Guelev:
Evaluating Access Control Policies Through Model Checking. ISC 2005: 446-460 - [c33]Aidan Harding, Mark Ryan, Pierre-Yves Schobbens:
A New Algorithm for Strategy Synthesis in LTL Games. TACAS 2005: 477-492 - [c32]Dimitar P. Guelev, Mark Dermot Ryan, Pierre-Yves Schobbens:
Synthesising Features by Games. AVoCS 2005: 79-93 - [e6]Stephan Reiff-Marganiec, Mark Ryan:
Feature Interactions in Telecommunications and Software Systems VIII, ICFI'05, 28-30 June 2005, Leicester, UK. IOS Press 2005, ISBN 1-58603-524-X [contents] - 2004
- [b2]Michael Huth, Mark Dermot Ryan:
Logic in computer science - modelling and reasoning about systems (2. ed.). Cambridge University Press 2004, pp. I-XIV, 1-427 - [c31]Nan Zhang, Mark Ryan, Dimitar P. Guelev:
Synthesising verified access control systems in XACML. FMSE 2004: 56-65 - [c30]Dimitar P. Guelev, Mark Ryan, Pierre-Yves Schobbens:
Model-Checking Access Control Policies. ISC 2004: 219-230 - [c29]Steve Kremer, Mark Ryan:
Analysing the Vulnerability of Protocols to Produce Known-pair and Chosen-text Attacks. SecCo 2004: 87-104 - [c28]Dimitar P. Guelev, Mark Dermot Ryan, Pierre-Yves Schobbens:
Model-checking the Preservation of Temporal Properties upon Feature Integration. AVoCS 2004: 311-324 - [e5]Mark Dermot Ryan, John-Jules Ch. Meyer, Hans-Dieter Ehrich:
Objects, Agents, and Features, International Seminar, Dagstuhl Castle, Germany, February 2003, Revised and Invited Papers. Lecture Notes in Computer Science 2975, Springer 2004, ISBN 3-540-21989-7 [contents] - 2003
- [c27]John-Jules Ch. Meyer, Mark Dermot Ryan, Hans-Dieter Ehrich:
Objects, Agents, and Features: An Introduction. Objects, Agents, and Features 2003: 1-7 - [c26]Dimitar P. Guelev, Mark Dermot Ryan, Pierre-Yves Schobbens:
Feature Integration as Substitution. FIW 2003: 275-294 - [c25]Hannah Harris, Mark Ryan:
Theoretical Foundations of Updating Systems. ASE 2003: 291-294 - [c24]Aidan Harding, Mark Ryan, Pierre-Yves Schobbens:
Towards Symbolic Strategy Synthesis for \left\langle {\left\langle A \right\rangle } \right\rangle-LTL. TIME 2003: 137-146 - 2002
- [j9]Hajnal Andréka, Mark Ryan, Pierre-Yves Schobbens:
Operators and Laws for Combining Preference Relations. J. Log. Comput. 12(1): 13-53 (2002) - [j8]Nikos Gorogiannis, Mark Ryan:
Implementation of Belief Change Operators Using BDDs. Stud Logica 70(1): 131-156 (2002) - [c23]Hannah Harris, Mark Ryan:
Feature Integration as an Operation of Theory Change. ECAI 2002: 546-550 - [c22]Aidan Harding, Mark Ryan, Pierre-Yves Schobbens:
Approximating ATL* in ATL. VMCAI 2002: 289-301 - [c21]Nikos Gorogiannis, Mark Ryan:
Requirements, specifications, and minimal refinement. WoLLIC 2002: 218-232 - 2001
- [j7]Malte Plath, Mark Ryan:
Feature integration using a feature construct. Sci. Comput. Program. 41(1): 53-84 (2001) - [c20]Mark Ryan, Pierre-Yves Schobbens:
Agents and Roles: Refinement in Alternating-Time Temporal Logic. ATAL 2001: 100-114 - [e4]Stephen Gilmore, Mark Ryan:
Language Constructs for Describing Features, Proceedings of the FIREworks Workshop, Glasgow, UK, May 2000. Springer 2001, ISBN 978-1-85233-392-8 [contents] - [e3]Franck Cassez, Claude Jard, Brigitte Rozoy, Mark Dermot Ryan:
Modeling and Verification of Parallel Processes, 4th Summer School, MOVEP 2000, Nantes, France, June 19-23, 2000. Lecture Notes in Computer Science 2067, Springer 2001, ISBN 3-540-42787-2 [contents] - 2000
- [b1]Michael Huth, Mark Dermot Ryan:
Logic in computer science - modelling and reasoning about systems. Cambridge University Press 2000, ISBN 978-0-521-65602-3, pp. I-XVII, 1-387 - [j6]Alessio Lomuscio, Ron van der Meyden, Mark Ryan:
Knowledge in multiagent systems: initial configurations and broadcast. ACM Trans. Comput. Log. 1(2): 247-284 (2000) - [c19]Franck Cassez, Mark Dermot Ryan, Pierre-Yves Schobbens:
Proving feature non-interaction with Alternating-Time Temporal Logic. FIREworks 2000: 85-103 - [c18]Malte Plath, Mark Dermot Ryan:
Defining Features for CSP: Reflections on the Feature Interaction Contest. FIREworks 2000: 163-175 - [c17]Malte Plath, Mark Dermot Ryan:
The feature construct for SMV: Semantics. FIW 2000: 129-144
1990 – 1999
- 1999
- [j5]Alessio Lomuscio, Mark Ryan:
An algorithmic approach to knowledge evolution. Artif. Intell. Eng. Des. Anal. Manuf. 13(2): 119-132 (1999) - [c16]Alessio Lomuscio, Mark Ryan:
A Spectrum of Modes of Knowledge Sharing between Agents. ATAL 1999: 13-26 - [e2]Christel Baier, Michael Huth, Marta Z. Kwiatkowska, Mark Ryan:
First International Workshop on Probabilistic Methods in Verification, PROBMIV 1998, Indianapolis, Indiana, USA, June 19-20, 1998. Electronic Notes in Theoretical Computer Science 22, Elsevier 1999 [contents] - [i1]Alessio Lomuscio, Ron van der Meyden, Mark Ryan:
Knowledge in Multi-Agent Systems: Initial Configurations and Broadcast. CoRR cs.LO/9909019 (1999) - 1998
- [c15]Alessio Lomuscio, Mark Ryan:
Ideal Agents Sharing (some!) Knowledge. ECAI 1998: 557-561 - [c14]Malte Plath, Mark Dermot Ryan:
Plug-and-play Features. FIW 1998: 150-164 - [c13]Malte Plath, Mark Ryan:
SFI: a Feature Integration Tool. Tool Support for System Specification, Development and Verification 1998: 201-216 - [c12]Christel Baier, Michael Huth, Marta Z. Kwiatkowska, Mark Ryan:
Preface. PROBMIV 1998: 1-2 - 1997
- [j4]Mark Ryan, Pierre-Yves Schobbens:
Counterfactuals and Updates as Inverse Modalities. J. Log. Lang. Inf. 6(2): 123-146 (1997) - [j3]Mark d'Inverno, Michael Fisher, Alessio Lomuscio, Michael Luck, Maarten de Rijke, Mark Ryan, Michael J. Wooldridge:
Formalisms for multi-agent systems. Knowl. Eng. Rev. 12(3): 315-321 (1997) - [c11]Alessio Lomuscio, Mark Ryan:
On the Relation between Interpreted Systems and Kripke Models. Agents and Multi-Agent Systems Formalisms, Methodologies, and Applications 1997: 46-59 - [c10]Christel Baier, Edmund M. Clarke, Vasiliki Hartonas-Garmhausen, Marta Z. Kwiatkowska, Mark Ryan:
Symbolic Model Checking for Probabilistic Processes. ICALP 1997: 430-440 - 1996
- [c9]Mark Ryan, Pierre-Yves Schobbens:
Intertranslating Counterfactuals and Updates. ECAI 1996: 100-104 - [c8]Anthony Finkelsteiin, George Spanoudakis, Mark Ryan:
Software Package Requirements and Procurement. IWSSD 1996: 141-145 - [c7]Mark Ryan, Pierre-Yves Schobbens, Odinaldo Rodrigues:
Counterfactuals and Updates as Inverse Modalities. TARK 1996: 163-173 - [p1]Mark Ryan:
Belief Revision and Ordered Theory Presentations. Logic, Action, and Information 1996: 129-151 - 1995
- [j2]Mark Ryan, Pierre-Yves Schobbens:
Belief Revision and Verisimilitude. Notre Dame J. Formal Log. 36(1): 15-29 (1995) - [c6]Riccardo Poli, Mark Ryan, Aaron Sloman:
A New Continuous Propositional Logic. EPIA 1995: 17-28 - 1993
- [j1]Mark Ryan:
Towards Specifying Norms. Ann. Math. Artif. Intell. 9(1-2): 49-68 (1993) - [c5]Mark Ryan:
Prioritising Preference Relations. Theory and Formal Methods 1993: 265-275 - [c4]Mark Ryan:
Defaults in specifications. RE 1993: 142-149 - [e1]Geoffrey Livingston Burn, Simon J. Gay, Mark Ryan:
Theory and Formal Methods 1993, Proceedings of the First Imperial College Department of Computing Workshop on Theory and Formal Methods, Isle of Thorns Conference Centre, Chelwood Gate, Sussex, UK, 29-31 March 1993. Workshops in Computing, Springer 1993, ISBN 3-540-19842-3 [contents] - 1992
- [c3]Mark Ryan:
Representing Defaults as Sentences with Reduced Priority. KR 1992: 649-660 - 1991
- [c2]Mark Ryan:
Defaults and Revision in Structured Theories. LICS 1991: 362-373 - [c1]Mark Ryan, José Luiz Fiadeiro, T. S. E. Maibaum:
Sharing Actions and Attributes in Modal Action Logic. TACS 1991: 569-593
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-25 20:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint