Arapinis, M, Mancini, LI, Ritter, E & Ryan, MD 2017, 'Analysis of privacy in mobile telephony systems', International Journal of Information Security, vol. 16, no. 5, pp. 491–523. https://doi.org/10.1007/s10207-016-0338-9
Yu, J, Ryan, M & Cremers, C 2017, 'DECIM: Detecting Endpoint Compromise In Messaging', IEEE Transactions on Information Forensics and Security. https://doi.org/10.1109/TIFS.2017.2738609
Arapinis, M, Liu, J, Ritter, E & Ryan, M 2017, 'Stateful Applied Pi Calculus: Observational Equivalence and Labelled Bisimilarity', Journal of Logical and Algebraic Methods in Programming, vol. 89, pp. 95-149. https://doi.org/10.1016/j.jlamp.2017.03.001
Yu, J, Cheval, V & Ryan, M 2016, 'DTKI: a new formalized PKI with verifiable trusted parties', The Computer Journal, vol. 59, no. 11, pp. 1695-1713. https://doi.org/10.1093/comjnl/bxw039
Smyth, B, Ryan, MD & Chen, L 2015, 'Formal analysis of privacy in Direct Anonymous Attestation schemes', Science of Computer Programming, vol. 111, no. 2, pp. 300-317. https://doi.org/10.1016/j.scico.2015.04.004
Fotiadis, G, Moreira-Sanchez, J, Giannetsos, T, Chen, L, Ronne, PB, Ryan, M & Ryan, PYA 2021, Root-of-Trust Abstractions for Symbolic Analysis: Application to Attestation Protocols. in STM 2021: Security and Trust Management.
Singh, RR, Moreira-Sanchez, J, Chothia, T & Ryan, M 2020, Modelling of 802.11 4-Way Handshake Attacks and Analysis of Security Properties. in STM 2020: Security and Trust Management . Springer, pp. 3. https://doi.org/10.1007/978-3-030-59817-4_1
Oxford, M, Parker, D & Ryan, M 2020, Quantitative Verification of Certificate Transparency Gossip Protocols. in Proceedings of 6th International Workshop on Security and Privacy in the Cloud (SPC'20). IEEE Computer Society Press, 6th International Workshop on Security and Privacy in the Cloud (SPC'20), Virtual event, 29/06/20.
Ordean, M, Ryan, M & Galindo Chacon, D 2019, CAOS: Concurrent-Access Obfuscated Store. in Proceedings of the 24th ACM Symposium on Access Control Models and Technologies (SACMAT 2019). Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT, Association for Computing Machinery (ACM), pp. 13-24, 24th ACM Symposium on Access Control Models and Technologies, Toronto, Ontario, Canada, 4/06/19. https://doi.org/10.1145/3322431.3325101
Denzel, M, Ryan, M & Ritter, E 2018, A Malware-Tolerant, Self-Healing Industrial Control System Framework. in S De Capitani di Vimercati & F Martinelli (eds), ICT Systems Security and Privacy Protection: 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings. IFIP Advances in Information and Communication Technology , vol. 502, Springer, pp. 46-60, 32nd International Conference on ICT Systems Security and Privacy Protection (IFIP SEC 2017), Rome, Italy, 29/05/17. https://doi.org/10.1007/978-3-319-58469-0_4
Denzel, M & Ryan, M 2018, Malware Tolerant (Mesh-) Networks. in Proceedings of the 17th International Conference on Cryptology And Network Security (CANS 2018) . Lecture Notes in Computer Science, vol. 11124, Springer, pp. 133-153, 17th International Conference on Cryptology And Network Security (CANS 2018) , Naples, Italy, 30/09/18. https://doi.org/10.1007/978-3-030-00434-7_7
Yu, J, Ryan, M & Chen, L 2017, Authenticating compromisable storage systems. in Proceedings of 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-17). IEEE Computer Society Press, 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-17), Sydney, Australia, 1/08/17. https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.216
Ryan, MD 2017, Making Decryption Accountable. in J Anderson, B Christianson, V Matyas & F Stajano (eds), Security Protocols XXV: 25th International Workshop, Cambridge, UK, March 20-22, 2017, Revised Selected Papers. 1st edn, vol. XXV, Lecture Notes in Computer Science, vol. XXV (25), Springer, pp. 93-98, Twenty-fifth International Workshop on Security Protocols, Cambridge, United Kingdom, 20/03/17. https://doi.org/10.1007/978-3-319-71075-4
Denzel, M, Bruni, A & Ryan, M 2017, Smart-Guard: defending user input from malware. in D El Baz & J Bourgeois (eds), 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld). Institute of Electrical and Electronics Engineers (IEEE), pp. 502-509, 13th IEEE International Conference on Advanced and Trusted Computing, Toulouse, France, 18/07/16. https://doi.org/10.1109/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0089
Grewal, GS, Ryan, MD, Chen, L & Clarkson, MR 2015, Du-Vote: Remote Electronic Voting with Untrusted Computers. in 2015 IEEE 28th Computer Security Foundations Symposium . IEEE Computer Society Press, pp. 155-169, 2015 IEEE 28th Computer Security Foundations Symposium (CSF), 13/07/15. https://doi.org/10.1109/CSF.2015.18
View all publications in research portal