Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Mark Ryan 0001
@inproceedings{DBLP:conf/eurosp/ChevalMR23, author = {Vincent Cheval and Jos{\'{e}} Moreira and Mark Ryan}, title = {Automatic verification of transparency protocols}, booktitle = {8th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2023, Delft, Netherlands, July 3-7, 2023}, pages = {107--121}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/EuroSP57164.2023.00016}, doi = {10.1109/EUROSP57164.2023.00016}, timestamp = {Mon, 07 Aug 2023 15:56:23 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/ChevalMR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2303-04500, author = {Vincent Cheval and Jos{\'{e}} Moreira and Mark Ryan}, title = {Automatic verification of transparency protocols (extended version)}, journal = {CoRR}, volume = {abs/2303.04500}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2303.04500}, doi = {10.48550/ARXIV.2303.04500}, eprinttype = {arXiv}, eprint = {2303.04500}, timestamp = {Wed, 15 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2303-04500.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2309-06359, author = {Daniel Fentham and David Parker and Mark Ryan}, title = {Using Reed-Muller Codes for Classification with Rejection and Recovery}, journal = {CoRR}, volume = {abs/2309.06359}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2309.06359}, doi = {10.48550/ARXIV.2309.06359}, eprinttype = {arXiv}, eprint = {2309.06359}, timestamp = {Mon, 13 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2309-06359.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiLWDWR23, author = {Rujia Li and Yuanzhao Li and Qin Wang and Sisi Duan and Qin Wang and Mark Ryan}, title = {Accountable Decryption made Formal and Practical}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1519}, year = {2023}, url = {https://eprint.iacr.org/2023/1519}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LiLWDWR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/LiWWGR22, author = {Rujia Li and Qin Wang and Qi Wang and David Galindo and Mark Ryan}, title = {SoK: TEE-Assisted Confidential Smart Contract}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2022}, number = {3}, pages = {711--731}, year = {2022}, url = {https://doi.org/10.56553/popets-2022-0093}, doi = {10.56553/POPETS-2022-0093}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/LiWWGR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/LaingMRSW22, author = {Thalia Laing and Eduard Marin and Mark D. Ryan and Joshua Schiffman and Ga{\"{e}}tan Wattiau}, title = {Symbolon: Enabling Flexible Multi-device-based User Authentication}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2022, Edinburgh, UK, June 22-24, 2022}, pages = {1--12}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/DSC54232.2022.9888854}, doi = {10.1109/DSC54232.2022.9888854}, timestamp = {Mon, 31 Oct 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/LaingMRSW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/MoreiraRG22, author = {Jos{\'{e}} Moreira and Mark Ryan and Flavio D. Garcia}, editor = {Vijayalakshmi Atluri and Roberto Di Pietro and Christian Damsgaard Jensen and Weizhi Meng}, title = {Protocols for a Two-Tiered Trusted Computing Base}, booktitle = {Computer Security - {ESORICS} 2022 - 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13556}, pages = {229--249}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17143-7\_12}, doi = {10.1007/978-3-031-17143-7\_12}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/MoreiraRG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2203-08548, author = {Rujia Li and Qin Wang and Qi Wang and David Galindo and Mark Ryan}, title = {SoK: TEE-assisted Confidential Smart Contract}, journal = {CoRR}, volume = {abs/2203.08548}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2203.08548}, doi = {10.48550/ARXIV.2203.08548}, eprinttype = {arXiv}, eprint = {2203.08548}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2203-08548.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2206-08821, author = {Qin Wang and Rujia Li and Qi Wang and Shiping Chen and Mark Ryan and Thomas Hardjono}, title = {Exploring Web3 From the View of Blockchain}, journal = {CoRR}, volume = {abs/2206.08821}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2206.08821}, doi = {10.48550/ARXIV.2206.08821}, eprinttype = {arXiv}, eprint = {2206.08821}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2206-08821.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/FotiadisMGCRRR21, author = {Georgios Fotiadis and Jos{\'{e}} Moreira and Thanassis Giannetsos and Liqun Chen and Peter B. R{\o}nne and Mark Ryan and Peter Y. A. Ryan}, editor = {Rodrigo Roman and Jianying Zhou}, title = {Root-of-Trust Abstractions for Symbolic Analysis: Application to Attestation Protocols}, booktitle = {Security and Trust Management - 17th International Workshop, {STM} 2021, Darmstadt, Germany, October 8, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13075}, pages = {163--184}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-91859-0\_9}, doi = {10.1007/978-3-030-91859-0\_9}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stm/FotiadisMGCRRR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ispec/2021, editor = {Robert H. Deng and Feng Bao and Guilin Wang and Jian Shen and Mark Ryan and Weizhi Meng and Ding Wang}, title = {Information Security Practice and Experience: 16th International Conference, {ISPEC} 2021, Nanjing, China, December 17-19, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13107}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-93206-0}, doi = {10.1007/978-3-030-93206-0}, isbn = {978-3-030-93206-0}, timestamp = {Wed, 08 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/OxfordPR20, author = {Michael Oxford and David Parker and Mark Ryan}, title = {Quantitative Verification of Certificate Transparency Gossip Protocols}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--9}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162197}, doi = {10.1109/CNS48642.2020.9162197}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/OxfordPR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/SinghMCR20, author = {Rajiv Ranjan Singh and Jos{\'{e}} Moreira and Tom Chothia and Mark Dermot Ryan}, editor = {Konstantinos Markantonakis and Marinella Petrocchi}, title = {Modelling of 802.11 4-Way Handshake Attacks and Analysis of Security Properties}, booktitle = {Security and Trust Management - 16th International Workshop, {STM} 2020, Guildford, UK, September 17-18, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12386}, pages = {3--21}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-59817-4\_1}, doi = {10.1007/978-3-030-59817-4\_1}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stm/SinghMCR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/Ordean0G19, author = {Mihai Ordean and Mark Ryan and David Galindo}, editor = {Florian Kerschbaum and Atefeh Mashatan and Jianwei Niu and Adam J. Lee}, title = {{CAOS:} Concurrent-Access Obfuscated Store}, booktitle = {Proceedings of the 24th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2019, Toronto, ON, Canada, June 03-06, 2019}, pages = {13--24}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3322431.3325101}, doi = {10.1145/3322431.3325101}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/Ordean0G19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YuRC18, author = {Jiangshan Yu and Mark Ryan and Cas Cremers}, title = {{DECIM:} Detecting Endpoint Compromise In Messaging}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {1}, pages = {106--118}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2738609}, doi = {10.1109/TIFS.2017.2738609}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/YuRC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/DenzelR18, author = {Michael Denzel and Mark Dermot Ryan}, editor = {Jan Camenisch and Panos Papadimitratos}, title = {Malware Tolerant (Mesh-)Networks}, booktitle = {Cryptology and Network Security - 17th International Conference, {CANS} 2018, Naples, Italy, September 30 - October 3, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11124}, pages = {133--153}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00434-7\_7}, doi = {10.1007/978-3-030-00434-7\_7}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cans/DenzelR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/ArapinisMRR17, author = {Myrto Arapinis and Loretta Ilaria Mancini and Eike Ritter and Mark Dermot Ryan}, title = {Analysis of privacy in mobile telephony systems}, journal = {Int. J. Inf. Sec.}, volume = {16}, number = {5}, pages = {491--523}, year = {2017}, url = {https://doi.org/10.1007/s10207-016-0338-9}, doi = {10.1007/S10207-016-0338-9}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/ArapinisMRR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jlp/ArapinisLRR17, author = {Myrto Arapinis and Jia Liu and Eike Ritter and Mark Ryan}, title = {Stateful applied pi calculus: Observational equivalence and labelled bisimilarity}, journal = {J. Log. Algebraic Methods Program.}, volume = {89}, pages = {95--149}, year = {2017}, url = {https://doi.org/10.1016/j.jlamp.2017.03.001}, doi = {10.1016/J.JLAMP.2017.03.001}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jlp/ArapinisLRR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/MilnerCYR17, author = {Kevin Milner and Cas Cremers and Jiangshan Yu and Mark Ryan}, title = {Automatically Detecting the Misuse of Secrets: Foundations, Design Principles, and Applications}, booktitle = {30th {IEEE} Computer Security Foundations Symposium, {CSF} 2017, Santa Barbara, CA, USA, August 21-25, 2017}, pages = {203--216}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/CSF.2017.21}, doi = {10.1109/CSF.2017.21}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/MilnerCYR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/DenzelRR17, author = {Michael Denzel and Mark Ryan and Eike Ritter}, editor = {Sabrina De Capitani di Vimercati and Fabio Martinelli}, title = {A Malware-Tolerant, Self-Healing Industrial Control System Framework}, booktitle = {{ICT} Systems Security and Privacy Protection - 32nd {IFIP} {TC} 11 International Conference, {SEC} 2017, Rome, Italy, May 29-31, 2017, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {502}, pages = {46--60}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-58469-0\_4}, doi = {10.1007/978-3-319-58469-0\_4}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sec/DenzelRR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Ryan17, author = {Mark Dermot Ryan}, editor = {Frank Stajano and Jonathan Anderson and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Making Decryption Accountable}, booktitle = {Security Protocols {XXV} - 25th International Workshop, Cambridge, UK, March 20-22, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10476}, pages = {93--98}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-71075-4\_11}, doi = {10.1007/978-3-319-71075-4\_11}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/Ryan17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Ryan17a, author = {Mark Dermot Ryan}, editor = {Frank Stajano and Jonathan Anderson and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Making Decryption Accountable (Transcript of Discussion)}, booktitle = {Security Protocols {XXV} - 25th International Workshop, Cambridge, UK, March 20-22, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10476}, pages = {99--108}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-71075-4\_12}, doi = {10.1007/978-3-319-71075-4\_12}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/Ryan17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YuRC17, author = {Jiangshan Yu and Mark Ryan and Liqun Chen}, title = {Authenticating Compromisable Storage Systems}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {25--32}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.216}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.216}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/YuRC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/post/2017, editor = {Matteo Maffei and Mark Ryan}, title = {Principles of Security and Trust - 6th International Conference, {POST} 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2017, Uppsala, Sweden, April 22-29, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10204}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-662-54455-6}, doi = {10.1007/978-3-662-54455-6}, isbn = {978-3-662-54454-9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/post/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1709-10412, author = {Mihai Ordean and Mark Ryan and David Galindo}, title = {{CAOS:} Concurrent-Access Obfuscated Store}, journal = {CoRR}, volume = {abs/1709.10412}, year = {2017}, url = {http://arxiv.org/abs/1709.10412}, eprinttype = {arXiv}, eprint = {1709.10412}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1709-10412.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MilnerCYR17, author = {Kevin Milner and Cas Cremers and Jiangshan Yu and Mark Ryan}, title = {Automatically Detecting the Misuse of Secrets: Foundations, Design Principles, and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {234}, year = {2017}, url = {http://eprint.iacr.org/2017/234}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MilnerCYR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YuRC17, author = {Jiangshan Yu and Mark Ryan and Liqun Chen}, title = {Authenticating compromisable storage systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {485}, year = {2017}, url = {http://eprint.iacr.org/2017/485}, timestamp = {Sun, 22 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/YuRC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YuR17, author = {Jiangshan Yu and Mark Ryan}, title = {Evaluating web PKIs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {526}, year = {2017}, url = {http://eprint.iacr.org/2017/526}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YuR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/YuCR16, author = {Jiangshan Yu and Vincent Cheval and Mark Ryan}, title = {{DTKI:} {A} New Formalized {PKI} with Verifiable Trusted Parties}, journal = {Comput. J.}, volume = {59}, number = {11}, pages = {1695--1713}, year = {2016}, url = {https://doi.org/10.1093/comjnl/bxw039}, doi = {10.1093/COMJNL/BXW039}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/YuCR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uic/DenzelBR16, author = {Michael Denzel and Alessandro Bruni and Mark Dermot Ryan}, title = {Smart-Guard: Defending User Input from Malware}, booktitle = {2016 Intl {IEEE} Conferences on Ubiquitous Intelligence {\&} Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld), Toulouse, France, July 18-21, 2016}, pages = {502--509}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0089}, doi = {10.1109/UIC-ATC-SCALCOM-CBDCOM-IOP-SMARTWORLD.2016.0089}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uic/DenzelBR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dagstuhl-manifestos/PreneelRRR15, author = {Bart Preneel and Phillip Rogaway and Mark Dermot Ryan and Peter Y. A. Ryan}, title = {Privacy and Security in an Age of Surveillance (Dagstuhl Perspectives Workshop 14401)}, journal = {Dagstuhl Manifestos}, volume = {5}, number = {1}, pages = {25--37}, year = {2015}, url = {https://doi.org/10.4230/DagMan.5.1.25}, doi = {10.4230/DAGMAN.5.1.25}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dagstuhl-manifestos/PreneelRRR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scp/SmythRC15, author = {Ben Smyth and Mark Dermot Ryan and Liqun Chen}, title = {Formal analysis of privacy in Direct Anonymous Attestation schemes}, journal = {Sci. Comput. Program.}, volume = {111}, pages = {300--317}, year = {2015}, url = {https://doi.org/10.1016/j.scico.2015.04.004}, doi = {10.1016/J.SCICO.2015.04.004}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scp/SmythRC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/GrewalRCC15, author = {Gurchetan S. Grewal and Mark Dermot Ryan and Liqun Chen and Michael R. Clarkson}, editor = {C{\'{e}}dric Fournet and Michael W. Hicks and Luca Vigan{\`{o}}}, title = {Du-Vote: Remote Electronic Voting with Untrusted Computers}, booktitle = {{IEEE} 28th Computer Security Foundations Symposium, {CSF} 2015, Verona, Italy, 13-17 July, 2015}, pages = {155--169}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/CSF.2015.18}, doi = {10.1109/CSF.2015.18}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/GrewalRCC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/YuR15, author = {Jiangshan Yu and Mark Dermot Ryan}, editor = {Bruce Christianson and Petr Svenda and Vashek Maty{\'{a}}s and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Device Attacker Models: Fact and Fiction}, booktitle = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9379}, pages = {158--167}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26096-9\_17}, doi = {10.1007/978-3-319-26096-9\_17}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/YuR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Ryan15, author = {Mark Ryan}, editor = {Bruce Christianson and Petr Svenda and Vashek Maty{\'{a}}s and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Device Attacker Models: Fact and Fiction (Transcript of Discussion)}, booktitle = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9379}, pages = {168--177}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26096-9\_18}, doi = {10.1007/978-3-319-26096-9\_18}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/Ryan15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YuRC15, author = {Jiangshan Yu and Mark Ryan and Cas Cremers}, title = {How to detect unauthorised usage of a key}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {486}, year = {2015}, url = {http://eprint.iacr.org/2015/486}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YuRC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/sbcysec/Stalla-BourdillonPR14, author = {Sophie Stalla{-}Bourdillon and Joshua Phillips and Mark Dermot Ryan}, title = {Privacy vs. Security}, series = {Springer Briefs in Cybersecurity}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-1-4471-6530-9}, doi = {10.1007/978-1-4471-6530-9}, isbn = {978-1-4471-6529-3}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/sbcysec/Stalla-BourdillonPR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/ArapinisPRR14, author = {Myrto Arapinis and Joshua Phillips and Eike Ritter and Mark Dermot Ryan}, title = {StatVerif: Verification of stateful processes}, journal = {J. Comput. Secur.}, volume = {22}, number = {5}, pages = {743--821}, year = {2014}, url = {https://doi.org/10.3233/JCS-140501}, doi = {10.3233/JCS-140501}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/ArapinisPRR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apn/RyanGC14, author = {Mark Ryan and Gurchetan S. Grewal and Liqun Chen}, editor = {V{\'{e}}ronique Cortier and Riadh Robbana}, title = {Du-Vote: Remote Electronic Voting with Untrusted Computers}, booktitle = {Proceedings of the Formal Methods for Security Workshop co-located with the PetriNets-2014 Conference , Tunis, Tunisia, June 23rd, 2014}, series = {{CEUR} Workshop Proceedings}, volume = {1158}, pages = {4}, publisher = {CEUR-WS.org}, year = {2014}, url = {https://ceur-ws.org/Vol-1158/invited.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:38 +0100}, biburl = {https://dblp.org/rec/conf/apn/RyanGC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/LiuRC14, author = {Jia Liu and Mark Dermot Ryan and Liqun Chen}, title = {Balancing Societal Security and Individual Privacy: Accountable Escrow System}, booktitle = {{IEEE} 27th Computer Security Foundations Symposium, {CSF} 2014, Vienna, Austria, 19-22 July, 2014}, pages = {427--440}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CSF.2014.37}, doi = {10.1109/CSF.2014.37}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/LiuRC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/ArapinisMRR14, author = {Myrto Arapinis and Loretta Ilaria Mancini and Eike Ritter and Mark Ryan}, title = {Privacy through Pseudonymity in Mobile Telephony Systems}, booktitle = {21st Annual Network and Distributed System Security Symposium, {NDSS} 2014, San Diego, California, USA, February 23-26, 2014}, publisher = {The Internet Society}, year = {2014}, url = {https://www.ndss-symposium.org/ndss2014/privacy-through-pseudonymity-mobile-telephony-systems}, timestamp = {Mon, 01 Feb 2021 08:42:18 +0100}, biburl = {https://dblp.org/rec/conf/ndss/ArapinisMRR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/Ryan14, author = {Mark Dermot Ryan}, title = {Enhanced Certificate Transparency and End-to-End Encrypted Mail}, booktitle = {21st Annual Network and Distributed System Security Symposium, {NDSS} 2014, San Diego, California, USA, February 23-26, 2014}, publisher = {The Internet Society}, year = {2014}, url = {https://www.ndss-symposium.org/ndss2014/enhanced-certificate-transparency-and-end-end-encrypted-mail}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/Ryan14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/ArapinisLRR14, author = {Myrto Arapinis and Jia Liu and Eike Ritter and Mark Ryan}, editor = {Mart{\'{\i}}n Abadi and Steve Kremer}, title = {Stateful Applied Pi Calculus}, booktitle = {Principles of Security and Trust - Third International Conference, {POST} 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2014, Grenoble, France, April 5-13, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8414}, pages = {22--41}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54792-8\_2}, doi = {10.1007/978-3-642-54792-8\_2}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/post/ArapinisLRR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tgc/ChevalDR14, author = {Vincent Cheval and St{\'{e}}phanie Delaune and Mark Ryan}, editor = {Matteo Maffei and Emilio Tuosto}, title = {Tests for Establishing Security Properties}, booktitle = {Trustworthy Global Computing - 9th International Symposium, {TGC} 2014, Rome, Italy, September 5-6, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8902}, pages = {82--96}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45917-1\_6}, doi = {10.1007/978-3-662-45917-1\_6}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tgc/ChevalDR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/KoleiniRR14, author = {Masoud Koleini and Eike Ritter and Mark Ryan}, title = {Verification of agent knowledge in dynamic access control policies}, journal = {CoRR}, volume = {abs/1401.4730}, year = {2014}, url = {http://arxiv.org/abs/1401.4730}, eprinttype = {arXiv}, eprint = {1401.4730}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/KoleiniRR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/YuCR14, author = {Jiangshan Yu and Vincent Cheval and Mark Ryan}, title = {{DTKI:} a new formalized {PKI} with no trusted parties}, journal = {CoRR}, volume = {abs/1408.1023}, year = {2014}, url = {http://arxiv.org/abs/1408.1023}, eprinttype = {arXiv}, eprint = {1408.1023}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/YuCR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dagstuhl-reports/PreneelRRR14, author = {Bart Preneel and Phillip Rogaway and Mark Dermot Ryan and Peter Y. A. Ryan}, title = {Privacy and Security in an Age of Surveillance (Dagstuhl Perspectives Workshop 14401)}, journal = {Dagstuhl Reports}, volume = {4}, number = {9}, pages = {106--123}, year = {2014}, url = {https://doi.org/10.4230/DagRep.4.9.106}, doi = {10.4230/DAGREP.4.9.106}, timestamp = {Wed, 07 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dagstuhl-reports/PreneelRRR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fmsd/ChevalierDKR13, author = {C{\'{e}}line Chevalier and St{\'{e}}phanie Delaune and Steve Kremer and Mark Dermot Ryan}, title = {Composition of password-based protocols}, journal = {Formal Methods Syst. Des.}, volume = {43}, number = {3}, pages = {369--413}, year = {2013}, url = {https://doi.org/10.1007/s10703-013-0184-6}, doi = {10.1007/S10703-013-0184-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fmsd/ChevalierDKR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/ArapinisBR13, author = {Myrto Arapinis and Sergiu Bursuc and Mark Ryan}, title = {Privacy-supporting cloud computing by in-browser key translation}, journal = {J. Comput. Secur.}, volume = {21}, number = {6}, pages = {847--880}, year = {2013}, url = {https://doi.org/10.3233/JCS-130489}, doi = {10.3233/JCS-130489}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/ArapinisBR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/Ryan13, author = {Mark Dermot Ryan}, title = {Cloud computing security: The scientific challenge, and a survey of solutions}, journal = {J. Syst. Softw.}, volume = {86}, number = {9}, pages = {2263--2268}, year = {2013}, url = {https://doi.org/10.1016/j.jss.2012.12.025}, doi = {10.1016/J.JSS.2012.12.025}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jss/Ryan13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/ArapinisCKR13, author = {Myrto Arapinis and V{\'{e}}ronique Cortier and Steve Kremer and Mark Ryan}, editor = {David A. Basin and John C. Mitchell}, title = {Practical Everlasting Privacy}, booktitle = {Principles of Security and Trust - Second International Conference, {POST} 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2013, Rome, Italy, March 16-24, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7796}, pages = {21--40}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36830-1\_2}, doi = {10.1007/978-3-642-36830-1\_2}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/post/ArapinisCKR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/GrewalRBR13, author = {Gurchetan S. Grewal and Mark Dermot Ryan and Sergiu Bursuc and Peter Y. A. Ryan}, title = {Caveat Coercitor: Coercion-Evidence in Electronic Voting}, booktitle = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley, CA, USA, May 19-22, 2013}, pages = {367--381}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SP.2013.32}, doi = {10.1109/SP.2013.32}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/GrewalRBR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tacas/KoleiniRR13, author = {Masoud Koleini and Eike Ritter and Mark Ryan}, editor = {Nir Piterman and Scott A. Smolka}, title = {Model Checking Agent Knowledge in Dynamic Access Control Policies}, booktitle = {Tools and Algorithms for the Construction and Analysis of Systems - 19th International Conference, {TACAS} 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2013, Rome, Italy, March 16-24, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7795}, pages = {448--462}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36742-7\_31}, doi = {10.1007/978-3-642-36742-7\_31}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tacas/KoleiniRR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tgc/XuBR13, author = {Shiwei Xu and Ian Batten and Mark Ryan}, editor = {Mart{\'{\i}}n Abadi and Alberto Lluch{-}Lafuente}, title = {Dynamic Measurement and Protected Execution: Model and Analysis}, booktitle = {Trustworthy Global Computing - 8th International Symposium, {TGC} 2013, Buenos Aires, Argentina, August 30-31, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8358}, pages = {45--63}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-05119-2\_4}, doi = {10.1007/978-3-319-05119-2\_4}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tgc/XuBR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/tgc/2012, editor = {Catuscia Palamidessi and Mark Dermot Ryan}, title = {Trustworthy Global Computing - 7th International Symposium, {TGC} 2012, Newcastle upon Tyne, UK, September 7-8, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8191}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41157-1}, doi = {10.1007/978-3-642-41157-1}, isbn = {978-3-642-41156-4}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tgc/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Ryan13, author = {Mark Dermot Ryan}, title = {Enhanced certificate transparency (how Johnny could encrypt)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {595}, year = {2013}, url = {http://eprint.iacr.org/2013/595}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Ryan13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ArapinisMRRGRB12, author = {Myrto Arapinis and Loretta Ilaria Mancini and Eike Ritter and Mark Ryan and Nico Golde and Kevin Redon and Ravishankar Borgaonkar}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {New privacy issues in mobile telephony: fix and verification}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {205--216}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382221}, doi = {10.1145/2382196.2382221}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ArapinisMRRGRB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/Ryan12, author = {Mark Dermot Ryan}, editor = {Chris J. Mitchell and Allan Tomlinson}, title = {Automatic Analysis of Security Properties of the {TPM}}, booktitle = {Trusted Systems, 4th International Conference, {INTRUST} 2012, London, UK, December 17-18, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7711}, pages = {1--4}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35371-0\_1}, doi = {10.1007/978-3-642-35371-0\_1}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/intrust/Ryan12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/ArapinisBR12, author = {Myrto Arapinis and Sergiu Bursuc and Mark Ryan}, editor = {Pierpaolo Degano and Joshua D. Guttman}, title = {Privacy Supporting Cloud Computing: ConfiChair, a Case Study}, booktitle = {Principles of Security and Trust - First International Conference, {POST} 2012, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2012, Tallinn, Estonia, March 24 - April 1, 2012, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7215}, pages = {89--108}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28641-4\_6}, doi = {10.1007/978-3-642-28641-4\_6}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/post/ArapinisBR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/ArapinisBR12a, author = {Myrto Arapinis and Sergiu Bursuc and Mark Dermot Ryan}, editor = {Pierpaolo Degano and Joshua D. Guttman}, title = {Reduction of Equational Theories for Verification of Trace Equivalence: Re-encryption, Associativity and Commutativity}, booktitle = {Principles of Security and Trust - First International Conference, {POST} 2012, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2012, Tallinn, Estonia, March 24 - April 1, 2012, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7215}, pages = {169--188}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28641-4\_10}, doi = {10.1007/978-3-642-28641-4\_10}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/post/ArapinisBR12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ispec/2012, editor = {Mark Dermot Ryan and Ben Smyth and Guilin Wang}, title = {Information Security Practice and Experience - 8th International Conference, {ISPEC} 2012, Hangzhou, China, April 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7232}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29101-2}, doi = {10.1007/978-3-642-29101-2}, isbn = {978-3-642-29100-5}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SmythRC12, author = {Ben Smyth and Mark Dermot Ryan and Liqun Chen}, title = {Formal analysis of privacy in Direct Anonymous Attestation schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {650}, year = {2012}, url = {http://eprint.iacr.org/2012/650}, timestamp = {Sun, 22 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/SmythRC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Ryan11, author = {Mark Dermot Ryan}, title = {Cloud computing privacy concerns on our doorstep}, journal = {Commun. {ACM}}, volume = {54}, number = {1}, pages = {36--38}, year = {2011}, url = {https://doi.org/10.1145/1866739.1866751}, doi = {10.1145/1866739.1866751}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/Ryan11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/ArapinisRR11, author = {Myrto Arapinis and Eike Ritter and Mark Dermot Ryan}, title = {StatVerif: Verification of Stateful Processes}, booktitle = {Proceedings of the 24th {IEEE} Computer Security Foundations Symposium, {CSF} 2011, Cernay-la-Ville, France, 27-29 June, 2011}, pages = {33--47}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/CSF.2011.10}, doi = {10.1109/CSF.2011.10}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/ArapinisRR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/DelauneKRS11, author = {St{\'{e}}phanie Delaune and Steve Kremer and Mark Dermot Ryan and Graham Steel}, title = {Formal Analysis of Protocols Based on {TPM} State Registers}, booktitle = {Proceedings of the 24th {IEEE} Computer Security Foundations Symposium, {CSF} 2011, Cernay-la-Ville, France, 27-29 June, 2011}, pages = {66--80}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/CSF.2011.12}, doi = {10.1109/CSF.2011.12}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/DelauneKRS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icfem/KoleiniR11, author = {Masoud Koleini and Mark Ryan}, editor = {Shengchao Qin and Zongyan Qiu}, title = {A Knowledge-Based Verification Method for Dynamic Access Control Policies}, booktitle = {Formal Methods and Software Engineering - 13th International Conference on Formal Engineering Methods, {ICFEM} 2011, Durham, UK, October 26-28, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6991}, pages = {243--258}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24559-6\_18}, doi = {10.1007/978-3-642-24559-6\_18}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icfem/KoleiniR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/SmythRC11, author = {Ben Smyth and Mark Ryan and Liqun Chen}, editor = {Gilles Barthe and Anupam Datta and Sandro Etalle}, title = {Formal Analysis of Anonymity in ECC-Based Direct Anonymous Attestation Schemes}, booktitle = {Formal Aspects of Security and Trust - 8th International Workshop, {FAST} 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7140}, pages = {245--262}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29420-4\_16}, doi = {10.1007/978-3-642-29420-4\_16}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ifip1-7/SmythRC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/voteid/BursucGR11, author = {Sergiu Bursuc and Gurchetan S. Grewal and Mark Dermot Ryan}, editor = {Aggelos Kiayias and Helger Lipmaa}, title = {Trivitas: Voters Directly Verifying Votes}, booktitle = {E-Voting and Identity - Third International Conference, VoteID 2011, Tallinn, Estonia, September 28-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7187}, pages = {190--207}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-32747-6\_12}, doi = {10.1007/978-3-642-32747-6\_12}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/voteid/BursucGR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/ios/11/RyanS11, author = {Mark Dermot Ryan and Ben Smyth}, editor = {V{\'{e}}ronique Cortier and Steve Kremer}, title = {Applied pi calculus}, booktitle = {Formal Models and Techniques for Analyzing Security Protocols}, series = {Cryptology and Information Security Series}, volume = {5}, pages = {112--142}, publisher = {{IOS} Press}, year = {2011}, url = {https://doi.org/10.3233/978-1-60750-714-7-112}, doi = {10.3233/978-1-60750-714-7-112}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/ios/11/RyanS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1109-2066, author = {Myrto Arapinis and Loretta Ilaria Mancini and Eike Ritter and Mark Ryan}, title = {Formal Analysis of {UMTS} Privacy}, journal = {CoRR}, volume = {abs/1109.2066}, year = {2011}, url = {http://arxiv.org/abs/1109.2066}, eprinttype = {arXiv}, eprint = {1109.2066}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1109-2066.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/DelauneKR10, author = {St{\'{e}}phanie Delaune and Steve Kremer and Mark Dermot Ryan}, title = {Symbolic bisimulation for the applied pi calculus}, journal = {J. Comput. Secur.}, volume = {18}, number = {2}, pages = {317--377}, year = {2010}, url = {https://doi.org/10.3233/JCS-2010-0363}, doi = {10.3233/JCS-2010-0363}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcs/DelauneKR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/MukhamedovR10, author = {Aybek Mukhamedov and Mark Dermot Ryan}, title = {Identity Escrow Protocol and Anonymity Analysis in the Applied Pi-Calculus}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {4}, pages = {41:1--41:29}, year = {2010}, url = {https://doi.org/10.1145/1880022.1880035}, doi = {10.1145/1880022.1880035}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/MukhamedovR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/ArapinisCRR10, author = {Myrto Arapinis and Tom Chothia and Eike Ritter and Mark Ryan}, title = {Analysing Unlinkability and Anonymity Using the Applied Pi Calculus}, booktitle = {Proceedings of the 23rd {IEEE} Computer Security Foundations Symposium, {CSF} 2010, Edinburgh, United Kingdom, July 17-19, 2010}, pages = {107--121}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/CSF.2010.15}, doi = {10.1109/CSF.2010.15}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/ArapinisCRR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/QunooR10, author = {Hasan Qunoo and Mark Ryan}, editor = {Sara Foresti and Sushil Jajodia}, title = {Modelling Dynamic Access Control Policies for Web-Based Collaborative Systems}, booktitle = {Data and Applications Security and Privacy XXIV, 24th Annual {IFIP} {WG} 11.3 Working Conference, Rome, Italy, June 21-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6166}, pages = {295--302}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13739-6\_20}, doi = {10.1007/978-3-642-13739-6\_20}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/QunooR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/DinhR10, author = {Tien Tuan Anh Dinh and Mark Ryan}, editor = {Dimitris Gritzalis and Bart Preneel and Marianthi Theoharidou}, title = {Verifying Security Property of Peer-to-Peer Systems Using {CSP}}, booktitle = {Computer Security - {ESORICS} 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6345}, pages = {319--339}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15497-3\_20}, doi = {10.1007/978-3-642-15497-3\_20}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/DinhR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/KremerRS10, author = {Steve Kremer and Mark Ryan and Ben Smyth}, editor = {Dimitris Gritzalis and Bart Preneel and Marianthi Theoharidou}, title = {Election Verifiability in Electronic Voting Protocols}, booktitle = {Computer Security - {ESORICS} 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6345}, pages = {389--404}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15497-3\_24}, doi = {10.1007/978-3-642-15497-3\_24}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/KremerRS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/DelauneKRS10, author = {St{\'{e}}phanie Delaune and Steve Kremer and Mark Dermot Ryan and Graham Steel}, editor = {Pierpaolo Degano and Sandro Etalle and Joshua D. Guttman}, title = {A Formal Analysis of Authentication in the {TPM}}, booktitle = {Formal Aspects of Security and Trust - 7th International Workshop, {FAST} 2010, Pisa, Italy, September 16-17, 2010. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6561}, pages = {111--125}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-19751-2\_8}, doi = {10.1007/978-3-642-19751-2\_8}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ifip1-7/DelauneKRS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/SmythRKK10, author = {Ben Smyth and Mark Ryan and Steve Kremer and Mounira Kourjieh}, editor = {Alessandro Armando and Gavin Lowe}, title = {Towards Automatic Analysis of Election Verifiability Properties}, booktitle = {Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security - Joint Workshop, {ARSPA-WITS} 2010, Paphos, Cyprus, March 27-28, 2010. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6186}, pages = {146--163}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16074-5\_11}, doi = {10.1007/978-3-642-16074-5\_11}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ifip1-7/SmythRKK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/AblesR10, author = {King Ables and Mark Dermot Ryan}, editor = {Alessandro Acquisti and Sean W. Smith and Ahmad{-}Reza Sadeghi}, title = {Escrowed Data and the Digital Envelope}, booktitle = {Trust and Trustworthy Computing, Third International Conference, {TRUST} 2010, Berlin, Germany, June 21-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6101}, pages = {246--256}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13869-0\_16}, doi = {10.1007/978-3-642-13869-0\_16}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trust/AblesR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wote/DelauneKR10, author = {St{\'{e}}phanie Delaune and Steve Kremer and Mark Ryan}, editor = {David Chaum and Markus Jakobsson and Ronald L. Rivest and Peter Y. A. Ryan and Josh Benaloh and Miroslaw Kutylowski and Ben Adida}, title = {Verifying Privacy-Type Properties of Electronic Voting Protocols: {A} Taster}, booktitle = {Towards Trustworthy Elections, New Directions in Electronic Voting}, series = {Lecture Notes in Computer Science}, volume = {6000}, pages = {289--309}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12980-3\_18}, doi = {10.1007/978-3-642-12980-3\_18}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wote/DelauneKR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eceasst/ArapinisCDFGKMRRSUY09, author = {Myrto Arapinis and Muffy Calder and Louise A. Dennis and Michael Fisher and Philip D. Gray and Savas Konur and Alice Miller and Eike Ritter and Mark Ryan and Sven Schewe and Chris Unsworth and Rehana Yasmin}, title = {Towards the Verification of Pervasive Systems}, journal = {Electron. Commun. Eur. Assoc. Softw. Sci. Technol.}, volume = {22}, year = {2009}, url = {https://doi.org/10.14279/tuj.eceasst.22.315}, doi = {10.14279/TUJ.ECEASST.22.315}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eceasst/ArapinisCDFGKMRRSUY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/DelauneKR09, author = {St{\'{e}}phanie Delaune and Steve Kremer and Mark Ryan}, title = {Verifying privacy-type properties of electronic voting protocols}, journal = {J. Comput. Secur.}, volume = {17}, number = {4}, pages = {435--487}, year = {2009}, url = {https://doi.org/10.3233/JCS-2009-0340}, doi = {10.3233/JCS-2009-0340}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcs/DelauneKR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ArapinisCRR09, author = {Myrto Arapinis and Tom Chothia and Eike Ritter and Mark Ryan}, title = {Untraceability in the applied pi-calculus}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402514}, doi = {10.1109/ICITST.2009.5402514}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/ArapinisCRR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/ChenR09, author = {Liqun Chen and Mark Ryan}, editor = {Pierpaolo Degano and Joshua D. Guttman}, title = {Attack, Solution and Verification for Shared Authorisation Data in {TCG} {TPM}}, booktitle = {Formal Aspects in Security and Trust, 6th International Workshop, {FAST} 2009, Eindhoven, The Netherlands, November 5-6, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5983}, pages = {201--216}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-12459-4\_15}, doi = {10.1007/978-3-642-12459-4\_15}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ifip1-7/ChenR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/CabukCPR09, author = {Serdar Cabuk and Liqun Chen and David Plaquin and Mark Ryan}, editor = {Liqun Chen and Moti Yung}, title = {Trusted Integrity Measurement and Reporting for Virtualized Platforms}, booktitle = {Trusted Systems, First International Conference, {INTRUST} 2009, Beijing, China, December 17-19, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6163}, pages = {180--196}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-14597-1\_11}, doi = {10.1007/978-3-642-14597-1\_11}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/intrust/CabukCPR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisec/BrownR09, author = {Andrew Brown and Mark Ryan}, editor = {Andreas U. Schmidt and Shiguo Lian}, title = {Context-Aware Monitoring of Untrusted Mobile Applications}, booktitle = {Security and Privacy in Mobile Information and Communication Systems, First International {ICST} Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {17}, pages = {83--96}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04434-2\_8}, doi = {10.1007/978-3-642-04434-2\_8}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mobisec/BrownR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/p2p/DinhCR09, author = {Tien Tuan Anh Dinh and Tom Chothia and Mark Ryan}, editor = {Henning Schulzrinne and Karl Aberer and Anwitaman Datta}, title = {A Trusted Infrastructure for P2P-based Marketplaces}, booktitle = {Proceedings {P2P} 2009, Ninth International Conference on Peer-to-Peer Computing, 9-11 September 2009, Seattle, Washington, {USA}}, pages = {151--154}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/P2P.2009.5284522}, doi = {10.1109/P2P.2009.5284522}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/p2p/DinhCR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/MukhamedovGR09, author = {Aybek Mukhamedov and Andrew D. Gordon and Mark Ryan}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {Towards a Verified Reference Implementation of a Trusted Platform Module}, booktitle = {Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7028}, pages = {69--81}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-36213-2\_11}, doi = {10.1007/978-3-642-36213-2\_11}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/MukhamedovGR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/MukhamedovR08, author = {Aybek Mukhamedov and Mark Dermot Ryan}, title = {Fair multi-party contract signing using private contract signatures}, journal = {Inf. Comput.}, volume = {206}, number = {2-4}, pages = {272--290}, year = {2008}, url = {https://doi.org/10.1016/j.ic.2007.07.007}, doi = {10.1016/J.IC.2007.07.007}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iandc/MukhamedovR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/ZhangRG08, author = {Nan Zhang and Mark Ryan and Dimitar P. Guelev}, title = {Synthesising verified access control systems through model checking}, journal = {J. Comput. Secur.}, volume = {16}, number = {1}, pages = {1--61}, year = {2008}, url = {https://doi.org/10.3233/jcs-2008-16101}, doi = {10.3233/JCS-2008-16101}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/ZhangRG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/DelauneKR08, author = {St{\'{e}}phanie Delaune and Steve Kremer and Mark Ryan}, title = {Composition of Password-Based Protocols}, booktitle = {Proceedings of the 21st {IEEE} Computer Security Foundations Symposium, {CSF} 2008, Pittsburgh, Pennsylvania, USA, 23-25 June 2008}, pages = {239--251}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CSF.2008.6}, doi = {10.1109/CSF.2008.6}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/DelauneKR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifiptm/DelauneRS08, author = {St{\'{e}}phanie Delaune and Mark Ryan and Ben Smyth}, editor = {Y{\"{u}}cel Karabulut and John Mitchell and Peter Herrmann and Christian Damsgaard Jensen}, title = {Automatic Verification of Privacy Properties in the Applied pi Calculus}, booktitle = {Trust Management {II} - Proceedings of {IFIPTM} 2008: Joint iTrust and {PST} Conferences on Privacy, Trust Management and Security, June 18-20, 2008, Trondheim, Norway}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {263}, pages = {263--278}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-09428-1\_17}, doi = {10.1007/978-0-387-09428-1\_17}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ifiptm/DelauneRS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/SalaiwarakulR08, author = {Anongporn Salaiwarakul and Mark Dermot Ryan}, editor = {Liqun Chen and Yi Mu and Willy Susilo}, title = {Verification of Integrity and Secrecy Properties of a Biometric Authentication Protocol}, booktitle = {Information Security Practice and Experience, 4th International Conference, {ISPEC} 2008, Sydney, Australia, April 21-23, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4991}, pages = {1--13}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-79104-1\_1}, doi = {10.1007/978-3-540-79104-1\_1}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/SalaiwarakulR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/BrownR08, author = {Andrew Brown and Mark Ryan}, editor = {Liqun Chen and Yi Mu and Willy Susilo}, title = {Synthesising Monitors from High-Level Policies for the Safe Execution of Untrusted Software}, booktitle = {Information Security Practice and Experience, 4th International Conference, {ISPEC} 2008, Sydney, Australia, April 21-23, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4991}, pages = {233--247}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-79104-1\_17}, doi = {10.1007/978-3-540-79104-1\_17}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/BrownR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/SalaiwarakulR08, author = {Anongporn Salaiwarakul and Mark Ryan}, editor = {Kanta Matsuura and Eiichiro Fujisaki}, title = {Analysis of a Biometric Authentication Protocol for Signature Creation Application}, booktitle = {Advances in Information and Computer Security, Third International Workshop on Security, {IWSEC} 2008, Kagawa, Japan, November 25-27, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5312}, pages = {231--245}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89598-5\_16}, doi = {10.1007/978-3-540-89598-5\_16}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwsec/SalaiwarakulR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/BrownR08, author = {Andrew Brown and Mark Ryan}, editor = {Richard Lippmann and Engin Kirda and Ari Trachtenberg}, title = {Monitoring the Execution of Third-Party Software on Mobile Devices}, booktitle = {Recent Advances in Intrusion Detection, 11th International Symposium, {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5230}, pages = {410--411}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-87403-4\_31}, doi = {10.1007/978-3-540-87403-4\_31}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/BrownR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/saint/DinhR08, author = {Tien Tuan Anh Dinh and Mark Ryan}, title = {A Sybil-Resilient Reputation Metric for {P2P} Applications}, booktitle = {Proceedings of the 2008 International Symposium on Applications and the Internet, {SAINT} 2008, 28 July - 1 August 2008, Turku, Finland}, pages = {193--196}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/SAINT.2008.52}, doi = {10.1109/SAINT.2008.52}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/saint/DinhR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/dagstuhl/2007P7421, editor = {Liqun Chen and Steve Kremer and Mark Dermot Ryan}, title = {Formal Protocol Verification Applied, 14.10. - 19.10.2007}, series = {Dagstuhl Seminar Proceedings}, volume = {07421}, publisher = {Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany}, year = {2008}, url = {http://drops.dagstuhl.de/portals/07421/}, timestamp = {Sun, 22 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dagstuhl/2007P7421.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icics/2008, editor = {Liqun Chen and Mark Dermot Ryan and Guilin Wang}, title = {Information and Communications Security, 10th International Conference, {ICICS} 2008, Birmingham, UK, October 20-22, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5308}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88625-9}, doi = {10.1007/978-3-540-88625-9}, isbn = {978-3-540-88624-2}, timestamp = {Sun, 22 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/Reiff-MarganiecR07, author = {Stephan Reiff{-}Marganiec and Mark Ryan}, title = {Guest Editorial}, journal = {Comput. Networks}, volume = {51}, number = {2}, pages = {357--358}, year = {2007}, url = {https://doi.org/10.1016/j.comnet.2006.08.014}, doi = {10.1016/J.COMNET.2006.08.014}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/Reiff-MarganiecR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fac/GorogiannisR07, author = {Nikos Gorogiannis and Mark Ryan}, title = {Minimal refinements of specifications in model and termporal logics}, journal = {Formal Aspects Comput.}, volume = {19}, number = {1}, pages = {35--62}, year = {2007}, url = {https://doi.org/10.1007/s00165-006-0014-3}, doi = {10.1007/S00165-006-0014-3}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fac/GorogiannisR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fac/GorogiannisR07a, author = {Nikos Gorogiannis and Mark Ryan}, title = {Minimal refinements of specifications in modal and temporal logics}, journal = {Formal Aspects Comput.}, volume = {19}, number = {2}, pages = {273}, year = {2007}, url = {https://doi.org/10.1007/s00165-007-0038-3}, doi = {10.1007/S00165-007-0038-3}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fac/GorogiannisR07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fac/GorogiannisR07b, author = {Nikos Gorogiannis and Mark Ryan}, title = {Minimal refinements of specifications in modal and temporal logics}, journal = {Formal Aspects Comput.}, volume = {19}, number = {4}, pages = {417--444}, year = {2007}, url = {https://doi.org/10.1007/s00165-007-0040-9}, doi = {10.1007/S00165-007-0040-9}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fac/GorogiannisR07b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sttt/GuelevRS07, author = {Dimitar P. Guelev and Mark Dermot Ryan and Pierre{-}Yves Schobbens}, title = {Model-checking the preservation of temporal properties upon feature integration}, journal = {Int. J. Softw. Tools Technol. Transf.}, volume = {9}, number = {1}, pages = {53--62}, year = {2007}, url = {https://doi.org/10.1007/s10009-006-0006-x}, doi = {10.1007/S10009-006-0006-X}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sttt/GuelevRS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/SmythRC07, author = {Ben Smyth and Mark Ryan and Liqun Chen}, editor = {Frank Stajano and Catherine Meadows and Srdjan Capkun and Tyler Moore}, title = {Direct Anonymous Attestation {(DAA):} Ensuring Privacy with Corrupt Administrators}, booktitle = {Security and Privacy in Ad-hoc and Sensor Networks, 4th European Workshop, {ESAS} 2007, Cambridge, UK, July 2-3, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4572}, pages = {218--231}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73275-4\_16}, doi = {10.1007/978-3-540-73275-4\_16}, timestamp = {Tue, 19 Sep 2023 14:44:32 +0200}, biburl = {https://dblp.org/rec/conf/esas/SmythRC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/MukhamedovR07, author = {Aybek Mukhamedov and Mark Ryan}, editor = {Sven Dietrich and Rachna Dhamija}, title = {Improved Multi-party Contract Signing}, booktitle = {Financial Cryptography and Data Security, 11th International Conference, {FC} 2007, and 1st International Workshop on Usable Security, {USEC} 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4886}, pages = {179--191}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77366-5\_17}, doi = {10.1007/978-3-540-77366-5\_17}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/MukhamedovR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fsttcs/DelauneKR07, author = {St{\'{e}}phanie Delaune and Steve Kremer and Mark Ryan}, editor = {Vikraman Arvind and Sanjiva Prasad}, title = {Symbolic Bisimulation for the Applied Pi Calculus}, booktitle = {{FSTTCS} 2007: Foundations of Software Technology and Theoretical Computer Science, 27th International Conference, New Delhi, India, December 12-14, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4855}, pages = {133--145}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77050-3\_11}, doi = {10.1007/978-3-540-77050-3\_11}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fsttcs/DelauneKR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tgc/MukhamedovR07, author = {Aybek Mukhamedov and Mark Dermot Ryan}, editor = {Gilles Barthe and C{\'{e}}dric Fournet}, title = {Anonymity Protocol with Identity Escrow and Analysis in the Applied n-Calculus}, booktitle = {Trustworthy Global Computing, Third Symposium, {TGC} 2007, Sophia-Antipolis, France, November 5-6, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4912}, pages = {330--346}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-78663-4\_22}, doi = {10.1007/978-3-540-78663-4\_22}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tgc/MukhamedovR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/ChenKR07, author = {Liqun Chen and Steve Kremer and Mark Dermot Ryan}, editor = {Liqun Chen and Steve Kremer and Mark Dermot Ryan}, title = {07421 Executive Summary -- Formal Protocol Verification Applied}, booktitle = {Formal Protocol Verification Applied, 14.10. - 19.10.2007}, series = {Dagstuhl Seminar Proceedings}, volume = {07421}, publisher = {Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany}, year = {2007}, url = {http://drops.dagstuhl.de/opus/volltexte/2008/1418}, timestamp = {Sun, 22 Jan 2023 01:36:25 +0100}, biburl = {https://dblp.org/rec/conf/dagstuhl/ChenKR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/ChenKR07a, author = {Liqun Chen and Steve Kremer and Mark Dermot Ryan}, editor = {Liqun Chen and Steve Kremer and Mark Dermot Ryan}, title = {07421 Abstracts Collection -- Formal Protocol Verification Applied}, booktitle = {Formal Protocol Verification Applied, 14.10. - 19.10.2007}, series = {Dagstuhl Seminar Proceedings}, volume = {07421}, publisher = {Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany}, year = {2007}, url = {http://drops.dagstuhl.de/opus/volltexte/2008/1419}, timestamp = {Sun, 22 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dagstuhl/ChenKR07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/DelauneKR06, author = {St{\'{e}}phanie Delaune and Steve Kremer and Mark Ryan}, title = {Coercion-Resistance and Receipt-Freeness in Electronic Voting}, booktitle = {19th {IEEE} Computer Security Foundations Workshop, {(CSFW-19} 2006), 5-7 July 2006, Venice, Italy}, pages = {28--42}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/CSFW.2006.8}, doi = {10.1109/CSFW.2006.8}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/DelauneKR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/MukhamedovR06, author = {Aybek Mukhamedov and Mark Dermot Ryan}, title = {Resolve-Impossibility for a Contract-Signing Protocol}, booktitle = {19th {IEEE} Computer Security Foundations Workshop, {(CSFW-19} 2006), 5-7 July 2006, Venice, Italy}, pages = {167--176}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/CSFW.2006.27}, doi = {10.1109/CSFW.2006.27}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/MukhamedovR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esop/KremerR05, author = {Steve Kremer and Mark Ryan}, editor = {Shmuel Sagiv}, title = {Analysis of an Electronic Voting Protocol in the Applied Pi Calculus}, booktitle = {Programming Languages and Systems, 14th European Symposium on Programming, {ESOP} 2005, Held as Part of the Joint European Conferences on Theory and Practice of Software, {ETAPS} 2005, Edinburgh, UK, April 4-8, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3444}, pages = {186--200}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-31987-0\_14}, doi = {10.1007/978-3-540-31987-0\_14}, timestamp = {Fri, 27 Jan 2023 15:04:25 +0100}, biburl = {https://dblp.org/rec/conf/esop/KremerR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/MukhamedovR05, author = {Aybek Mukhamedov and Mark Dermot Ryan}, editor = {Theodosis Dimitrakos and Fabio Martinelli and Peter Y. A. Ryan and Steve A. Schneider}, title = {On Anonymity with Identity Escrow}, booktitle = {Formal Aspects in Security and Trust, Third International Workshop, {FAST} 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3866}, pages = {235--243}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11679219\_17}, doi = {10.1007/11679219\_17}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ifip1-7/MukhamedovR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/ZhangRG05, author = {Nan Zhang and Mark Ryan and Dimitar P. Guelev}, editor = {Jianying Zhou and Javier L{\'{o}}pez and Robert H. Deng and Feng Bao}, title = {Evaluating Access Control Policies Through Model Checking}, booktitle = {Information Security, 8th International Conference, {ISC} 2005, Singapore, September 20-23, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3650}, pages = {446--460}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11556992\_32}, doi = {10.1007/11556992\_32}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isw/ZhangRG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tacas/HardingRS05, author = {Aidan Harding and Mark Ryan and Pierre{-}Yves Schobbens}, editor = {Nicolas Halbwachs and Lenore D. Zuck}, title = {A New Algorithm for Strategy Synthesis in {LTL} Games}, booktitle = {Tools and Algorithms for the Construction and Analysis of Systems, 11th International Conference, {TACAS} 2005, Held as Part of the Joint European Conferences on Theory and Practice of Software, {ETAPS} 2005, Edinburgh, UK, April 4-8, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3440}, pages = {477--492}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-31980-1\_31}, doi = {10.1007/978-3-540-31980-1\_31}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tacas/HardingRS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/GuelevRS06, author = {Dimitar P. Guelev and Mark Dermot Ryan and Pierre{-}Yves Schobbens}, editor = {Ranko Lazic and Rajagopal Nagarajan}, title = {Synthesising Features by Games}, booktitle = {Proceedings of the 5th International Workshop on Automated Verification of Critical Systems, AVoCS 2005, University of Warwick, UK, September 12-13, 2005}, series = {Electronic Notes in Theoretical Computer Science}, volume = {145}, pages = {79--93}, publisher = {Elsevier}, year = {2005}, url = {https://doi.org/10.1016/j.entcs.2005.10.006}, doi = {10.1016/J.ENTCS.2005.10.006}, timestamp = {Thu, 15 Dec 2022 14:59:29 +0100}, biburl = {https://dblp.org/rec/journals/entcs/GuelevRS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fiw/2005, editor = {Stephan Reiff{-}Marganiec and Mark Ryan}, title = {Feature Interactions in Telecommunications and Software Systems VIII, ICFI'05, 28-30 June 2005, Leicester, {UK}}, publisher = {{IOS} Press}, year = {2005}, isbn = {1-58603-524-X}, timestamp = {Mon, 06 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fiw/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/daglib/0017977, author = {Michael Huth and Mark Dermot Ryan}, title = {Logic in computer science - modelling and reasoning about systems {(2.} ed.)}, publisher = {Cambridge University Press}, year = {2004}, timestamp = {Mon, 11 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/daglib/0017977.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhangRG04, author = {Nan Zhang and Mark Ryan and Dimitar P. Guelev}, editor = {Vijayalakshmi Atluri and Michael Backes and David A. Basin and Michael Waidner}, title = {Synthesising verified access control systems in {XACML}}, booktitle = {Proceedings of the 2004 {ACM} Workshop on Formal Methods in Security Engineering, {FMSE} 2004, Washington, DC, USA, October 29, 2004}, pages = {56--65}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1029133.1029141}, doi = {10.1145/1029133.1029141}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhangRG04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/GuelevRS04, author = {Dimitar P. Guelev and Mark Ryan and Pierre{-}Yves Schobbens}, editor = {Kan Zhang and Yuliang Zheng}, title = {Model-Checking Access Control Policies}, booktitle = {Information Security, 7th International Conference, {ISC} 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3225}, pages = {219--230}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30144-8\_19}, doi = {10.1007/978-3-540-30144-8\_19}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isw/GuelevRS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/KremerR05, author = {Steve Kremer and Mark Ryan}, editor = {Riccardo Focardi and Gianluigi Zavattaro}, title = {Analysing the Vulnerability of Protocols to Produce Known-pair and Chosen-text Attacks}, booktitle = {Proceedings of the 2nd International Workshop on Security Issues in Coordination Models, Languages, and Systems, SecCo 2004, London, UK, August 30, 2004}, series = {Electronic Notes in Theoretical Computer Science}, volume = {128}, number = {5}, pages = {87--104}, publisher = {Elsevier}, year = {2004}, url = {https://doi.org/10.1016/j.entcs.2004.11.043}, doi = {10.1016/J.ENTCS.2004.11.043}, timestamp = {Mon, 12 Dec 2022 15:38:22 +0100}, biburl = {https://dblp.org/rec/journals/entcs/KremerR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/GuelevRS05, author = {Dimitar P. Guelev and Mark Dermot Ryan and Pierre{-}Yves Schobbens}, editor = {Michael Huth}, title = {Model-checking the Preservation of Temporal Properties upon Feature Integration}, booktitle = {Proceedings of the Fouth International Workshop on Automated Verification of Critical Systems, AVoCS 2004, London, UK, September 4, 2004}, series = {Electronic Notes in Theoretical Computer Science}, volume = {128}, number = {6}, pages = {311--324}, publisher = {Elsevier}, year = {2004}, url = {https://doi.org/10.1016/j.entcs.2005.04.019}, doi = {10.1016/J.ENTCS.2005.04.019}, timestamp = {Mon, 11 Sep 2023 15:43:49 +0200}, biburl = {https://dblp.org/rec/journals/entcs/GuelevRS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/dagstuhl/2003oaf, editor = {Mark Dermot Ryan and John{-}Jules Ch. Meyer and Hans{-}Dieter Ehrich}, title = {Objects, Agents, and Features, International Seminar, Dagstuhl Castle, Germany, February 2003, Revised and Invited Papers}, series = {Lecture Notes in Computer Science}, volume = {2975}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/b97772}, doi = {10.1007/B97772}, isbn = {3-540-21989-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/2003oaf.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/MeyerRE03, author = {John{-}Jules Ch. Meyer and Mark Dermot Ryan and Hans{-}Dieter Ehrich}, editor = {Mark Dermot Ryan and John{-}Jules Ch. Meyer and Hans{-}Dieter Ehrich}, title = {Objects, Agents, and Features: An Introduction}, booktitle = {Objects, Agents, and Features, International Seminar, Dagstuhl Castle, Germany, February 2003, Revised and Invited Papers}, series = {Lecture Notes in Computer Science}, volume = {2975}, pages = {1--7}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-25930-5\_1}, doi = {10.1007/978-3-540-25930-5\_1}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dagstuhl/MeyerRE03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fiw/GuelevRS03, author = {Dimitar P. Guelev and Mark Dermot Ryan and Pierre{-}Yves Schobbens}, editor = {Daniel Amyot and Luigi Logrippo}, title = {Feature Integration as Substitution}, booktitle = {Feature Interactions in Telecommunications and Software Systems VII, June 11-13, 2003, Ottawa, Canada}, pages = {275--294}, publisher = {{IOS} Press}, year = {2003}, timestamp = {Tue, 16 Nov 2004 09:12:37 +0100}, biburl = {https://dblp.org/rec/conf/fiw/GuelevRS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kbse/HarrisR03, author = {Hannah Harris and Mark Ryan}, title = {Theoretical Foundations of Updating Systems}, booktitle = {18th {IEEE} International Conference on Automated Software Engineering {(ASE} 2003), 6-10 October 2003, Montreal, Canada}, pages = {291--294}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/ASE.2003.1240323}, doi = {10.1109/ASE.2003.1240323}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/kbse/HarrisR03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/time/HardingRS03, author = {Aidan Harding and Mark Ryan and Pierre{-}Yves Schobbens}, title = {Towards Symbolic Strategy Synthesis for {\textbackslash}left{\textbackslash}langle \{{\textbackslash}left{\textbackslash}langle {A} {\textbackslash}right{\textbackslash}rangle \} {\textbackslash}right{\textbackslash}rangle-LTL}, booktitle = {10th International Symposium on Temporal Representation and Reasoning / 4th International Conference on Temporal Logic {(TIME-ICTL} 2003), 8-10 July 2003, Cairns, Queensland, Australia}, pages = {137--146}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/TIME.2003.1214889}, doi = {10.1109/TIME.2003.1214889}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/time/HardingRS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/logcom/AndrekaRS02, author = {Hajnal Andr{\'{e}}ka and Mark Ryan and Pierre{-}Yves Schobbens}, title = {Operators and Laws for Combining Preference Relations}, journal = {J. Log. Comput.}, volume = {12}, number = {1}, pages = {13--53}, year = {2002}, url = {https://doi.org/10.1093/logcom/12.1.13}, doi = {10.1093/LOGCOM/12.1.13}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/logcom/AndrekaRS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sLogica/GorogiannisR02, author = {Nikos Gorogiannis and Mark Ryan}, title = {Implementation of Belief Change Operators Using BDDs}, journal = {Stud Logica}, volume = {70}, number = {1}, pages = {131--156}, year = {2002}, url = {https://doi.org/10.1023/A:1014610426691}, doi = {10.1023/A:1014610426691}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sLogica/GorogiannisR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecai/HarrisR02, author = {Hannah Harris and Mark Ryan}, editor = {Frank van Harmelen}, title = {Feature Integration as an Operation of Theory Change}, booktitle = {Proceedings of the 15th European Conference on Artificial Intelligence, ECAI'2002, Lyon, France, July 2002}, pages = {546--550}, publisher = {{IOS} Press}, year = {2002}, timestamp = {Mon, 03 Jan 2022 07:50:19 +0100}, biburl = {https://dblp.org/rec/conf/ecai/HarrisR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vmcai/HardingRS02, author = {Aidan Harding and Mark Ryan and Pierre{-}Yves Schobbens}, editor = {Agostino Cortesi}, title = {Approximating ATL\({}^{\mbox{*}}\) in {ATL}}, booktitle = {Verification, Model Checking, and Abstract Interpretation, Third International Workshop, {VMCAI} 2002, Venice, Italy, January 21-22, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2294}, pages = {289--301}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-47813-2\_20}, doi = {10.1007/3-540-47813-2\_20}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vmcai/HardingRS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/GorogiannisR02, author = {Nikos Gorogiannis and Mark Ryan}, editor = {Ruy J. G. B. de Queiroz and Luiz Carlos Pereira and Edward Hermann Haeusler}, title = {Requirements, specifications, and minimal refinement}, booktitle = {9th Workhop on Logic, Language, Information and Computation, WoLLIC 2002, Rio de Janeiro, Brazil, July 30 - August 2, 2002}, series = {Electronic Notes in Theoretical Computer Science}, volume = {67}, pages = {218--232}, publisher = {Elsevier}, year = {2002}, url = {https://doi.org/10.1016/S1571-0661(04)80550-4}, doi = {10.1016/S1571-0661(04)80550-4}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/GorogiannisR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scp/PlathR01, author = {Malte Plath and Mark Ryan}, title = {Feature integration using a feature construct}, journal = {Sci. Comput. Program.}, volume = {41}, number = {1}, pages = {53--84}, year = {2001}, url = {https://doi.org/10.1016/S0167-6423(00)00018-6}, doi = {10.1016/S0167-6423(00)00018-6}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scp/PlathR01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atal/RyanS01, author = {Mark Ryan and Pierre{-}Yves Schobbens}, editor = {John{-}Jules Ch. Meyer and Milind Tambe}, title = {Agents and Roles: Refinement in Alternating-Time Temporal Logic}, booktitle = {Intelligent Agents VIII, 8th International Workshop, {ATAL} 2001 Seattle, WA, USA, August 1-3, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2333}, pages = {100--114}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45448-9\_8}, doi = {10.1007/3-540-45448-9\_8}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/atal/RyanS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fireworks/2000, editor = {Stephen Gilmore and Mark Ryan}, title = {Language Constructs for Describing Features, Proceedings of the FIREworks Workshop, Glasgow, UK, May 2000}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/978-1-4471-0287-8}, doi = {10.1007/978-1-4471-0287-8}, isbn = {978-1-85233-392-8}, timestamp = {Tue, 12 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fireworks/2000.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/movep/2000, editor = {Franck Cassez and Claude Jard and Brigitte Rozoy and Mark Dermot Ryan}, title = {Modeling and Verification of Parallel Processes, 4th Summer School, {MOVEP} 2000, Nantes, France, June 19-23, 2000}, series = {Lecture Notes in Computer Science}, volume = {2067}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45510-8}, doi = {10.1007/3-540-45510-8}, isbn = {3-540-42787-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/movep/2000.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/daglib/0000773, author = {Michael Huth and Mark Dermot Ryan}, title = {Logic in computer science - modelling and reasoning about systems}, publisher = {Cambridge University Press}, year = {2000}, isbn = {978-0-521-65602-3}, timestamp = {Mon, 11 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/daglib/0000773.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tocl/LomuscioMR00, author = {Alessio Lomuscio and Ron van der Meyden and Mark Ryan}, title = {Knowledge in multiagent systems: initial configurations and broadcast}, journal = {{ACM} Trans. Comput. Log.}, volume = {1}, number = {2}, pages = {247--284}, year = {2000}, url = {https://doi.org/10.1145/359496.359527}, doi = {10.1145/359496.359527}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tocl/LomuscioMR00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fireworks/CassezRS00, author = {Franck Cassez and Mark Dermot Ryan and Pierre{-}Yves Schobbens}, editor = {Stephen Gilmore and Mark Ryan}, title = {Proving feature non-interaction with Alternating-Time Temporal Logic}, booktitle = {Language Constructs for Describing Features, Proceedings of the FIREworks Workshop, Glasgow, UK, May 2000}, pages = {85--103}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/978-1-4471-0287-8\_6}, doi = {10.1007/978-1-4471-0287-8\_6}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fireworks/CassezRS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fireworks/PlathR00, author = {Malte Plath and Mark Dermot Ryan}, editor = {Stephen Gilmore and Mark Ryan}, title = {Defining Features for {CSP:} Reflections on the Feature Interaction Contest}, booktitle = {Language Constructs for Describing Features, Proceedings of the FIREworks Workshop, Glasgow, UK, May 2000}, pages = {163--175}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/978-1-4471-0287-8\_10}, doi = {10.1007/978-1-4471-0287-8\_10}, timestamp = {Tue, 12 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fireworks/PlathR00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fiw/PlathR00, author = {Malte Plath and Mark Dermot Ryan}, editor = {Muffy Calder and Evan H. Magill}, title = {The feature construct for {SMV:} Semantics}, booktitle = {Feature Interactions in Telecommunications and Software Systems VI, May 17-19, 2000, Glasgow, Scotland, {UK}}, pages = {129--144}, publisher = {{IOS} Press}, year = {2000}, timestamp = {Tue, 16 Nov 2004 09:12:33 +0100}, biburl = {https://dblp.org/rec/conf/fiw/PlathR00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/aiedam/LomuscioR99, author = {Alessio Lomuscio and Mark Ryan}, title = {An algorithmic approach to knowledge evolution}, journal = {Artif. Intell. Eng. Des. Anal. Manuf.}, volume = {13}, number = {2}, pages = {119--132}, year = {1999}, url = {http://journals.cambridge.org/action/displayAbstract?aid=38693}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/aiedam/LomuscioR99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atal/LomuscioR99, author = {Alessio Lomuscio and Mark Ryan}, editor = {Nicholas R. Jennings and Yves Lesp{\'{e}}rance}, title = {A Spectrum of Modes of Knowledge Sharing between Agents}, booktitle = {Intelligent Agents VI, Agent Theories, Architectures, and Languages (ATAL), 6th International Workshop, {ATAL} '99, Orlando, Florida, USA, July 15-17, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1757}, pages = {13--26}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/10719619\_2}, doi = {10.1007/10719619\_2}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/atal/LomuscioR99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/probmiv/1998, editor = {Christel Baier and Michael Huth and Marta Z. Kwiatkowska and Mark Ryan}, title = {First International Workshop on Probabilistic Methods in Verification, {PROBMIV} 1998, Indianapolis, Indiana, USA, June 19-20, 1998}, series = {Electronic Notes in Theoretical Computer Science}, volume = {22}, publisher = {Elsevier}, year = {1999}, url = {https://www.sciencedirect.com/journal/electronic-notes-in-theoretical-computer-science/vol/22/suppl/C}, timestamp = {Mon, 11 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/probmiv/1998.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/cs-LO-9909019, author = {Alessio Lomuscio and Ron van der Meyden and Mark Ryan}, title = {Knowledge in Multi-Agent Systems: Initial Configurations and Broadcast}, journal = {CoRR}, volume = {cs.LO/9909019}, year = {1999}, url = {https://arxiv.org/abs/cs/9909019}, timestamp = {Fri, 10 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/cs-LO-9909019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecai/LomuscioR98, author = {Alessio Lomuscio and Mark Ryan}, editor = {Henri Prade}, title = {Ideal Agents Sharing (some!) Knowledge}, booktitle = {13th European Conference on Artificial Intelligence, Brighton, UK, August 23-28 1998, Proceedings.}, pages = {557--561}, publisher = {John Wiley and Sons}, year = {1998}, timestamp = {Wed, 31 Jul 2019 08:45:03 +0200}, biburl = {https://dblp.org/rec/conf/ecai/LomuscioR98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fiw/PlathR98, author = {Malte Plath and Mark Dermot Ryan}, editor = {Kristofer Kimbler and Wiet Bouma}, title = {Plug-and-play Features}, booktitle = {Feature Interactions in Telecommunications and Software Systems V, September 29 - October 1, 1998, Malm{\"{o}}, Sweden}, pages = {150--164}, publisher = {{IOS} Press}, year = {1998}, timestamp = {Tue, 16 Nov 2004 09:41:16 +0100}, biburl = {https://dblp.org/rec/conf/fiw/PlathR98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tssdv/Plath098, author = {Malte Plath and Mark Ryan}, editor = {Rudolf Berghammer and Yassine Lakhnech}, title = {{SFI:} a Feature Integration Tool}, booktitle = {Proceedings of the International Workshop Tool Support for System Specification, Development and Verification, Malente, Germany, June 1-4, 1998}, series = {Advances in computing science}, pages = {201--216}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/978-3-7091-6355-9\_15}, doi = {10.1007/978-3-7091-6355-9\_15}, timestamp = {Mon, 04 May 2020 10:40:23 +0200}, biburl = {https://dblp.org/rec/conf/tssdv/Plath098.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/BaierHKR99, author = {Christel Baier and Michael Huth and Marta Z. Kwiatkowska and Mark Ryan}, editor = {Christel Baier and Michael Huth and Marta Z. Kwiatkowska and Mark Ryan}, title = {Preface}, booktitle = {First International Workshop on Probabilistic Methods in Verification, {PROBMIV} 1998, Indianapolis, Indiana, USA, June 19-20, 1998}, series = {Electronic Notes in Theoretical Computer Science}, volume = {22}, pages = {1--2}, publisher = {Elsevier}, year = {1998}, url = {https://doi.org/10.1016/S1571-0661(05)80593-6}, doi = {10.1016/S1571-0661(05)80593-6}, timestamp = {Mon, 11 Sep 2023 15:43:49 +0200}, biburl = {https://dblp.org/rec/journals/entcs/BaierHKR99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jolli/RyanS97, author = {Mark Ryan and Pierre{-}Yves Schobbens}, title = {Counterfactuals and Updates as Inverse Modalities}, journal = {J. Log. Lang. Inf.}, volume = {6}, number = {2}, pages = {123--146}, year = {1997}, url = {https://doi.org/10.1023/A:1008218502162}, doi = {10.1023/A:1008218502162}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jolli/RyanS97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ker/dInvernoFLLRRW97, author = {Mark d'Inverno and Michael Fisher and Alessio Lomuscio and Michael Luck and Maarten de Rijke and Mark Ryan and Michael J. Wooldridge}, title = {Formalisms for multi-agent systems}, journal = {Knowl. Eng. Rev.}, volume = {12}, number = {3}, pages = {315--321}, year = {1997}, url = {https://doi.org/10.1017/S0269888997003068}, doi = {10.1017/S0269888997003068}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ker/dInvernoFLLRRW97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausai/LomuscioR97, author = {Alessio Lomuscio and Mark Ryan}, editor = {Wayne Wobcke and Maurice Pagnucco and Chengqi Zhang}, title = {On the Relation between Interpreted Systems and Kripke Models}, booktitle = {Agents and Multi-Agent Systems Formalisms, Methodologies, and Applications, Based on the AI'97 Workshops on Commonsense Reasoning, Intelligent Agents, and Distributed Artificial Intelligence, Perth, Australia, December 1, 1997}, series = {Lecture Notes in Computer Science}, volume = {1441}, pages = {46--59}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0055019}, doi = {10.1007/BFB0055019}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ausai/LomuscioR97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/BaierCHKR97, author = {Christel Baier and Edmund M. Clarke and Vasiliki Hartonas{-}Garmhausen and Marta Z. Kwiatkowska and Mark Ryan}, editor = {Pierpaolo Degano and Roberto Gorrieri and Alberto Marchetti{-}Spaccamela}, title = {Symbolic Model Checking for Probabilistic Processes}, booktitle = {Automata, Languages and Programming, 24th International Colloquium, ICALP'97, Bologna, Italy, 7-11 July 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1256}, pages = {430--440}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/3-540-63165-8\_199}, doi = {10.1007/3-540-63165-8\_199}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icalp/BaierCHKR97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecai/RyanS96, author = {Mark Ryan and Pierre{-}Yves Schobbens}, editor = {Wolfgang Wahlster}, title = {Intertranslating Counterfactuals and Updates}, booktitle = {12th European Conference on Artificial Intelligence, Budapest, Hungary, August 11-16, 1996, Proceedings}, pages = {100--104}, publisher = {John Wiley and Sons, Chichester}, year = {1996}, timestamp = {Mon, 06 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecai/RyanS96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwssd/FinkelsteiinS096, author = {Anthony Finkelsteiin and George Spanoudakis and Mark Ryan}, title = {Software Package Requirements and Procurement}, booktitle = {Proceedings of the 8th International Workshop on Software Specification and Design, {IWSSD} 1996, USA, March 22-23, 1996}, pages = {141--145}, publisher = {{IEEE} Computer Society}, year = {1996}, url = {https://dl.acm.org/doi/10.5555/857204.858284}, doi = {10.5555/857204.858284}, timestamp = {Wed, 18 May 2022 15:05:33 +0200}, biburl = {https://dblp.org/rec/conf/iwssd/FinkelsteiinS096.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tark/RyanSR96, author = {Mark Ryan and Pierre{-}Yves Schobbens and Odinaldo Rodrigues}, editor = {Yoav Shoham}, title = {Counterfactuals and Updates as Inverse Modalities}, booktitle = {Proceedings of the Sixth Conference on Theoretical Aspects of Rationality and Knowledge, De Zeeuwse Stromen, The Netherlands, March 17-20 1996}, pages = {163--173}, publisher = {Morgan Kaufmann}, year = {1996}, timestamp = {Mon, 06 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tark/RyanSR96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:conf/lai/Ryan96, author = {Mark Ryan}, editor = {Andr{\'{e}} Fuhrmann and Hans Rott}, title = {Belief Revision and Ordered Theory Presentations}, booktitle = {Logic, Action, and Information - Essays on Logic in Philosophy and Artificial Intelligence. Walter de Gruyter, Berlin, New York, 1996 (Based on a meeting held in autumn 1992 in Konstanz, Germany)}, pages = {129--151}, publisher = {De Gruyter}, year = {1996}, timestamp = {Mon, 05 Oct 2020 12:53:08 +0200}, biburl = {https://dblp.org/rec/conf/lai/Ryan96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ndjfl/RyanS95, author = {Mark Ryan and Pierre{-}Yves Schobbens}, title = {Belief Revision and Verisimilitude}, journal = {Notre Dame J. Formal Log.}, volume = {36}, number = {1}, pages = {15--29}, year = {1995}, url = {https://doi.org/10.1305/ndjfl/1040308826}, doi = {10.1305/NDJFL/1040308826}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ndjfl/RyanS95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/epia/PoliRS95, author = {Riccardo Poli and Mark Ryan and Aaron Sloman}, editor = {Carlos A. Pinto{-}Ferreira and Nuno J. Mamede}, title = {A New Continuous Propositional Logic}, booktitle = {Progress in Artificial Intelligence, 7th Portuguese Conference on Artificial Intelligence, {EPIA} '95, Funchal, Madeira Island, Portugal, October 3-6, 1995, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {990}, pages = {17--28}, publisher = {Springer}, year = {1995}, url = {https://doi.org/10.1007/3-540-60428-6\_2}, doi = {10.1007/3-540-60428-6\_2}, timestamp = {Tue, 14 May 2019 10:00:41 +0200}, biburl = {https://dblp.org/rec/conf/epia/PoliRS95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amai/Ryan93, author = {Mark Ryan}, title = {Towards Specifying Norms}, journal = {Ann. Math. Artif. Intell.}, volume = {9}, number = {1-2}, pages = {49--68}, year = {1993}, url = {https://doi.org/10.1007/BF01531261}, doi = {10.1007/BF01531261}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/amai/Ryan93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imperial/Ryan93, author = {Mark Ryan}, editor = {Geoffrey Livingston Burn and Simon J. Gay and Mark Ryan}, title = {Prioritising Preference Relations}, booktitle = {Theory and Formal Methods 1993, Proceedings of the First Imperial College Department of Computing Workshop on Theory and Formal Methods, Isle of Thorns Conference Centre, Chelwood Gate, Sussex, UK, 29-31 March 1993}, series = {Workshops in Computing}, pages = {265--275}, publisher = {Springer}, year = {1993}, timestamp = {Mon, 31 Oct 2022 11:04:42 +0100}, biburl = {https://dblp.org/rec/conf/imperial/Ryan93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/re/Ryan93, author = {Mark Ryan}, title = {Defaults in specifications}, booktitle = {Proceedings of {IEEE} International Symposium on Requirements Engineering, {RE} 1993, San Diego, California, USA, January 4-6, 1993}, pages = {142--149}, publisher = {{IEEE} Computer Society}, year = {1993}, url = {https://doi.org/10.1109/ISRE.1993.324823}, doi = {10.1109/ISRE.1993.324823}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/re/Ryan93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/imperial/1993, editor = {Geoffrey Livingston Burn and Simon J. Gay and Mark Ryan}, title = {Theory and Formal Methods 1993, Proceedings of the First Imperial College Department of Computing Workshop on Theory and Formal Methods, Isle of Thorns Conference Centre, Chelwood Gate, Sussex, UK, 29-31 March 1993}, series = {Workshops in Computing}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/978-1-4471-3503-6}, doi = {10.1007/978-1-4471-3503-6}, isbn = {3-540-19842-3}, timestamp = {Mon, 31 Oct 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imperial/1993.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kr/Ryan92, author = {Mark Ryan}, editor = {Bernhard Nebel and Charles Rich and William R. Swartout}, title = {Representing Defaults as Sentences with Reduced Priority}, booktitle = {Proceedings of the 3rd International Conference on Principles of Knowledge Representation and Reasoning (KR'92). Cambridge, MA, USA, October 25-29, 1992}, pages = {649--660}, publisher = {Morgan Kaufmann}, year = {1992}, timestamp = {Wed, 09 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/kr/Ryan92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lics/Ryan91, author = {Mark Ryan}, title = {Defaults and Revision in Structured Theories}, booktitle = {Proceedings of the Sixth Annual Symposium on Logic in Computer Science {(LICS} '91), Amsterdam, The Netherlands, July 15-18, 1991}, pages = {362--373}, publisher = {{IEEE} Computer Society}, year = {1991}, url = {https://doi.org/10.1109/LICS.1991.151660}, doi = {10.1109/LICS.1991.151660}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lics/Ryan91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tacs/RyanFM91, author = {Mark Ryan and Jos{\'{e}} Luiz Fiadeiro and T. S. E. Maibaum}, editor = {Takayasu Ito and Albert R. Meyer}, title = {Sharing Actions and Attributes in Modal Action Logic}, booktitle = {Theoretical Aspects of Computer Software, International Conference {TACS} '91, Sendai, Japan, September 24-27, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {526}, pages = {569--593}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-54415-1\_65}, doi = {10.1007/3-540-54415-1\_65}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tacs/RyanFM91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.