Professor Mark Ryan

Professor Mark Ryan

School of Computer Science
Professor in Computer Security

Contact details

Address
School of Computer Science
University of Birmingham
Edgbaston
Birmingham
B15 2TT
UK

Mark Ryan is a Professor in Computer Security for the School of Computer Science and the lead for the Centre of Security and Privacy at the University of Birmingham. For more information, please see Mark's homepage.

Publications

Recent publications

Article

Arapinis, M, Mancini, LI, Ritter, E & Ryan, MD 2017, 'Analysis of privacy in mobile telephony systems', International Journal of Information Security, vol. 16, no. 5, pp. 491–523. https://doi.org/10.1007/s10207-016-0338-9

Yu, J, Ryan, M & Cremers, C 2017, 'DECIM: Detecting Endpoint Compromise In Messaging', IEEE Transactions on Information Forensics and Security. https://doi.org/10.1109/TIFS.2017.2738609

Arapinis, M, Liu, J, Ritter, E & Ryan, M 2017, 'Stateful Applied Pi Calculus: Observational Equivalence and Labelled Bisimilarity', Journal of Logical and Algebraic Methods in Programming, vol. 89, pp. 95-149. https://doi.org/10.1016/j.jlamp.2017.03.001

Yu, J, Cheval, V & Ryan, M 2016, 'DTKI: a new formalized PKI with verifiable trusted parties', The Computer Journal, vol. 59, no. 11, pp. 1695-1713. https://doi.org/10.1093/comjnl/bxw039

Smyth, B, Ryan, MD & Chen, L 2015, 'Formal analysis of privacy in Direct Anonymous Attestation schemes', Science of Computer Programming, vol. 111, no. 2, pp. 300-317. https://doi.org/10.1016/j.scico.2015.04.004

Arapinis, M, Phillips, J, Ritter, E & Ryan, MD 2014, 'StatVerif: Verification of stateful processes', Journal of Computer Security, vol. 22, no. 5, pp. 743-821. https://doi.org/10.3233/JCS-140501

Conference contribution

Ordean, M, Ryan, M & Galindo Chacon, D 2019, CAOS: Concurrent-Access Obfuscated Store. in The ACM Symposium on Access Control Models and Technologies (SACMAT). Association for Computing Machinery (ACM). https://doi.org/10.1145/3322431.3325101

Denzel, M & Ryan, M 2018, Malware Tolerant (Mesh-) Networks. in Proceedings of the 17th International Conference on Cryptology And Network Security (CANS 2018) . Lecture Notes in Computer Science, vol. 11124, Springer, pp. 133-153, 17th International Conference on Cryptology And Network Security (CANS 2018) , Naples, Italy, 30/09/18. https://doi.org/10.1007/978-3-030-00434-7_7

Denzel, M, Ryan, M & Ritter, E 2018, A Malware-Tolerant, Self-Healing Industrial Control System Framework. in S De Capitani di Vimercati & F Martinelli (eds), ICT Systems Security and Privacy Protection: 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings. IFIP Advances in Information and Communication Technology , vol. 502, Springer, pp. 46-60, 32nd International Conference on ICT Systems Security and Privacy Protection (IFIP SEC 2017), Rome, Italy, 29/05/17. https://doi.org/10.1007/978-3-319-58469-0_4

Yu, J, Ryan, M & Chen, L 2017, Authenticating compromisable storage systems. in Proceedings of 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-17). IEEE Computer Society Press, 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-17), Sydney, Australia, 1/08/17. https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.216

Denzel, M, Bruni, A & Ryan, M 2017, Smart-Guard: defending user input from malware. in D El Baz & J Bourgeois (eds), 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld). Institute of Electrical and Electronics Engineers (IEEE), pp. 502-509, 13th IEEE International Conference on Advanced and Trusted Computing, Toulouse, France, 18/07/16. https://doi.org/10.1109/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0089

Ryan, MD 2017, Making Decryption Accountable. in J Anderson, B Christianson, V Matyas & F Stajano (eds), Security Protocols XXV: 25th International Workshop, Cambridge, UK, March 20-22, 2017, Revised Selected Papers. 1st edn, vol. XXV, Lecture Notes in Computer Science, vol. XXV (25), Springer, pp. 93-98, Twenty-fifth International Workshop on Security Protocols, Cambridge, United Kingdom, 20/03/17. https://doi.org/10.1007/978-3-319-71075-4

Grewal, GS, Ryan, MD, Chen, L & Clarkson, MR 2015, Du-Vote: Remote Electronic Voting with Untrusted Computers. in 2015 IEEE 28th Computer Security Foundations Symposium . IEEE Computer Society Press, pp. 155-169, 2015 IEEE 28th Computer Security Foundations Symposium (CSF), 13/07/15. https://doi.org/10.1109/CSF.2015.18

Liu, J, Ryan, MD & Chen, L 2014, Balancing societal security and individual privacy: Accountable escrow system . in Proceedings of the 27th Computer Security Foundations Workshop 2014. Institute of Electrical and Electronics Engineers (IEEE), pp. 427-440, 27th IEEE Computer Security Foundations Symposium, CSF 2014, Vienna, Austria, 19/07/14. https://doi.org/10.1109/CSF.2014.37

Xu, S, Batten, I & Ryan, M 2014, Dynamic Measurement and Protected Execution: Model and Analysis. in M Abadi & AL Lafuente (eds), Trustworthy Global Computing: 8th International Symposium TGC 2013; Buenos Aires; Argentina; 30-31 August, Revised Selected Papers. vol. 8358 LNCS, Chapter 4, Lecture Notes in Computer Science, vol. 8358, Springer, pp. 45-63, 8th International Symposium on Trustworthy Global Computing, TGC 2013, Buenos Aires, Argentina, 30/08/13. https://doi.org/10.1007/978-3-319-05119-2_4

View all publications in research portal

Expertise

Computer security, cloud computing, electronic voting, TPM, trusted computing, hardware-based security, Google, Linux, software security, privacy, mobile security, wireless communication, online privacy, privacy protection.

Expertise

Computer security; cloud computing, electronic voting; TPM, trusted computing; hardware-based security; Google; Linux; software security; privacy; mobile security; wireless communication; online privacy; privacy protection; and crypto-currencies in which there are several mutually-distrusting parties web-based systems.

Policy experience

Recent policy experience includes producing the technical report for the UK Government's Electronic balloting for industrial action: Knight review. The technical report constitutes an appendix of the review.