BibTeX records: Mark Ryan 0001

download as .bib file

@inproceedings{DBLP:conf/eurosp/ChevalMR23,
  author       = {Vincent Cheval and
                  Jos{\'{e}} Moreira and
                  Mark Ryan},
  title        = {Automatic verification of transparency protocols},
  booktitle    = {8th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2023, Delft, Netherlands, July 3-7, 2023},
  pages        = {107--121},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/EuroSP57164.2023.00016},
  doi          = {10.1109/EUROSP57164.2023.00016},
  timestamp    = {Mon, 07 Aug 2023 15:56:23 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/ChevalMR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2303-04500,
  author       = {Vincent Cheval and
                  Jos{\'{e}} Moreira and
                  Mark Ryan},
  title        = {Automatic verification of transparency protocols (extended version)},
  journal      = {CoRR},
  volume       = {abs/2303.04500},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2303.04500},
  doi          = {10.48550/ARXIV.2303.04500},
  eprinttype    = {arXiv},
  eprint       = {2303.04500},
  timestamp    = {Wed, 15 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2303-04500.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2309-06359,
  author       = {Daniel Fentham and
                  David Parker and
                  Mark Ryan},
  title        = {Using Reed-Muller Codes for Classification with Rejection and Recovery},
  journal      = {CoRR},
  volume       = {abs/2309.06359},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2309.06359},
  doi          = {10.48550/ARXIV.2309.06359},
  eprinttype    = {arXiv},
  eprint       = {2309.06359},
  timestamp    = {Mon, 13 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2309-06359.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiLWDWR23,
  author       = {Rujia Li and
                  Yuanzhao Li and
                  Qin Wang and
                  Sisi Duan and
                  Qin Wang and
                  Mark Ryan},
  title        = {Accountable Decryption made Formal and Practical},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1519},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1519},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LiLWDWR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/LiWWGR22,
  author       = {Rujia Li and
                  Qin Wang and
                  Qi Wang and
                  David Galindo and
                  Mark Ryan},
  title        = {SoK: TEE-Assisted Confidential Smart Contract},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2022},
  number       = {3},
  pages        = {711--731},
  year         = {2022},
  url          = {https://doi.org/10.56553/popets-2022-0093},
  doi          = {10.56553/POPETS-2022-0093},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/LiWWGR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/desec/LaingMRSW22,
  author       = {Thalia Laing and
                  Eduard Marin and
                  Mark D. Ryan and
                  Joshua Schiffman and
                  Ga{\"{e}}tan Wattiau},
  title        = {Symbolon: Enabling Flexible Multi-device-based User Authentication},
  booktitle    = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2022,
                  Edinburgh, UK, June 22-24, 2022},
  pages        = {1--12},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/DSC54232.2022.9888854},
  doi          = {10.1109/DSC54232.2022.9888854},
  timestamp    = {Mon, 31 Oct 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/desec/LaingMRSW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/MoreiraRG22,
  author       = {Jos{\'{e}} Moreira and
                  Mark Ryan and
                  Flavio D. Garcia},
  editor       = {Vijayalakshmi Atluri and
                  Roberto Di Pietro and
                  Christian Damsgaard Jensen and
                  Weizhi Meng},
  title        = {Protocols for a Two-Tiered Trusted Computing Base},
  booktitle    = {Computer Security - {ESORICS} 2022 - 27th European Symposium on Research
                  in Computer Security, Copenhagen, Denmark, September 26-30, 2022,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13556},
  pages        = {229--249},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17143-7\_12},
  doi          = {10.1007/978-3-031-17143-7\_12},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/MoreiraRG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2203-08548,
  author       = {Rujia Li and
                  Qin Wang and
                  Qi Wang and
                  David Galindo and
                  Mark Ryan},
  title        = {SoK: TEE-assisted Confidential Smart Contract},
  journal      = {CoRR},
  volume       = {abs/2203.08548},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2203.08548},
  doi          = {10.48550/ARXIV.2203.08548},
  eprinttype    = {arXiv},
  eprint       = {2203.08548},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2203-08548.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2206-08821,
  author       = {Qin Wang and
                  Rujia Li and
                  Qi Wang and
                  Shiping Chen and
                  Mark Ryan and
                  Thomas Hardjono},
  title        = {Exploring Web3 From the View of Blockchain},
  journal      = {CoRR},
  volume       = {abs/2206.08821},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2206.08821},
  doi          = {10.48550/ARXIV.2206.08821},
  eprinttype    = {arXiv},
  eprint       = {2206.08821},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2206-08821.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/FotiadisMGCRRR21,
  author       = {Georgios Fotiadis and
                  Jos{\'{e}} Moreira and
                  Thanassis Giannetsos and
                  Liqun Chen and
                  Peter B. R{\o}nne and
                  Mark Ryan and
                  Peter Y. A. Ryan},
  editor       = {Rodrigo Roman and
                  Jianying Zhou},
  title        = {Root-of-Trust Abstractions for Symbolic Analysis: Application to Attestation
                  Protocols},
  booktitle    = {Security and Trust Management - 17th International Workshop, {STM}
                  2021, Darmstadt, Germany, October 8, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13075},
  pages        = {163--184},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-91859-0\_9},
  doi          = {10.1007/978-3-030-91859-0\_9},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stm/FotiadisMGCRRR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ispec/2021,
  editor       = {Robert H. Deng and
                  Feng Bao and
                  Guilin Wang and
                  Jian Shen and
                  Mark Ryan and
                  Weizhi Meng and
                  Ding Wang},
  title        = {Information Security Practice and Experience: 16th International Conference,
                  {ISPEC} 2021, Nanjing, China, December 17-19, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13107},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-93206-0},
  doi          = {10.1007/978-3-030-93206-0},
  isbn         = {978-3-030-93206-0},
  timestamp    = {Wed, 08 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/2021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/OxfordPR20,
  author       = {Michael Oxford and
                  David Parker and
                  Mark Ryan},
  title        = {Quantitative Verification of Certificate Transparency Gossip Protocols},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162197},
  doi          = {10.1109/CNS48642.2020.9162197},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/OxfordPR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/SinghMCR20,
  author       = {Rajiv Ranjan Singh and
                  Jos{\'{e}} Moreira and
                  Tom Chothia and
                  Mark Dermot Ryan},
  editor       = {Konstantinos Markantonakis and
                  Marinella Petrocchi},
  title        = {Modelling of 802.11 4-Way Handshake Attacks and Analysis of Security
                  Properties},
  booktitle    = {Security and Trust Management - 16th International Workshop, {STM}
                  2020, Guildford, UK, September 17-18, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12386},
  pages        = {3--21},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-59817-4\_1},
  doi          = {10.1007/978-3-030-59817-4\_1},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stm/SinghMCR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/Ordean0G19,
  author       = {Mihai Ordean and
                  Mark Ryan and
                  David Galindo},
  editor       = {Florian Kerschbaum and
                  Atefeh Mashatan and
                  Jianwei Niu and
                  Adam J. Lee},
  title        = {{CAOS:} Concurrent-Access Obfuscated Store},
  booktitle    = {Proceedings of the 24th {ACM} Symposium on Access Control Models and
                  Technologies, {SACMAT} 2019, Toronto, ON, Canada, June 03-06, 2019},
  pages        = {13--24},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3322431.3325101},
  doi          = {10.1145/3322431.3325101},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/Ordean0G19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YuRC18,
  author       = {Jiangshan Yu and
                  Mark Ryan and
                  Cas Cremers},
  title        = {{DECIM:} Detecting Endpoint Compromise In Messaging},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {1},
  pages        = {106--118},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2738609},
  doi          = {10.1109/TIFS.2017.2738609},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/YuRC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/DenzelR18,
  author       = {Michael Denzel and
                  Mark Dermot Ryan},
  editor       = {Jan Camenisch and
                  Panos Papadimitratos},
  title        = {Malware Tolerant (Mesh-)Networks},
  booktitle    = {Cryptology and Network Security - 17th International Conference, {CANS}
                  2018, Naples, Italy, September 30 - October 3, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11124},
  pages        = {133--153},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00434-7\_7},
  doi          = {10.1007/978-3-030-00434-7\_7},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cans/DenzelR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/ArapinisMRR17,
  author       = {Myrto Arapinis and
                  Loretta Ilaria Mancini and
                  Eike Ritter and
                  Mark Dermot Ryan},
  title        = {Analysis of privacy in mobile telephony systems},
  journal      = {Int. J. Inf. Sec.},
  volume       = {16},
  number       = {5},
  pages        = {491--523},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10207-016-0338-9},
  doi          = {10.1007/S10207-016-0338-9},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/ArapinisMRR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jlp/ArapinisLRR17,
  author       = {Myrto Arapinis and
                  Jia Liu and
                  Eike Ritter and
                  Mark Ryan},
  title        = {Stateful applied pi calculus: Observational equivalence and labelled
                  bisimilarity},
  journal      = {J. Log. Algebraic Methods Program.},
  volume       = {89},
  pages        = {95--149},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.jlamp.2017.03.001},
  doi          = {10.1016/J.JLAMP.2017.03.001},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jlp/ArapinisLRR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/MilnerCYR17,
  author       = {Kevin Milner and
                  Cas Cremers and
                  Jiangshan Yu and
                  Mark Ryan},
  title        = {Automatically Detecting the Misuse of Secrets: Foundations, Design
                  Principles, and Applications},
  booktitle    = {30th {IEEE} Computer Security Foundations Symposium, {CSF} 2017, Santa
                  Barbara, CA, USA, August 21-25, 2017},
  pages        = {203--216},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CSF.2017.21},
  doi          = {10.1109/CSF.2017.21},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/MilnerCYR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/DenzelRR17,
  author       = {Michael Denzel and
                  Mark Ryan and
                  Eike Ritter},
  editor       = {Sabrina De Capitani di Vimercati and
                  Fabio Martinelli},
  title        = {A Malware-Tolerant, Self-Healing Industrial Control System Framework},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 32nd {IFIP} {TC} 11
                  International Conference, {SEC} 2017, Rome, Italy, May 29-31, 2017,
                  Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {502},
  pages        = {46--60},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-58469-0\_4},
  doi          = {10.1007/978-3-319-58469-0\_4},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sec/DenzelRR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Ryan17,
  author       = {Mark Dermot Ryan},
  editor       = {Frank Stajano and
                  Jonathan Anderson and
                  Bruce Christianson and
                  Vashek Maty{\'{a}}s},
  title        = {Making Decryption Accountable},
  booktitle    = {Security Protocols {XXV} - 25th International Workshop, Cambridge,
                  UK, March 20-22, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10476},
  pages        = {93--98},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-71075-4\_11},
  doi          = {10.1007/978-3-319-71075-4\_11},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/Ryan17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Ryan17a,
  author       = {Mark Dermot Ryan},
  editor       = {Frank Stajano and
                  Jonathan Anderson and
                  Bruce Christianson and
                  Vashek Maty{\'{a}}s},
  title        = {Making Decryption Accountable (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXV} - 25th International Workshop, Cambridge,
                  UK, March 20-22, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10476},
  pages        = {99--108},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-71075-4\_12},
  doi          = {10.1007/978-3-319-71075-4\_12},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/Ryan17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YuRC17,
  author       = {Jiangshan Yu and
                  Mark Ryan and
                  Liqun Chen},
  title        = {Authenticating Compromisable Storage Systems},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {25--32},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.216},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.216},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/YuRC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/post/2017,
  editor       = {Matteo Maffei and
                  Mark Ryan},
  title        = {Principles of Security and Trust - 6th International Conference, {POST}
                  2017, Held as Part of the European Joint Conferences on Theory and
                  Practice of Software, {ETAPS} 2017, Uppsala, Sweden, April 22-29,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10204},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-662-54455-6},
  doi          = {10.1007/978-3-662-54455-6},
  isbn         = {978-3-662-54454-9},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/post/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1709-10412,
  author       = {Mihai Ordean and
                  Mark Ryan and
                  David Galindo},
  title        = {{CAOS:} Concurrent-Access Obfuscated Store},
  journal      = {CoRR},
  volume       = {abs/1709.10412},
  year         = {2017},
  url          = {http://arxiv.org/abs/1709.10412},
  eprinttype    = {arXiv},
  eprint       = {1709.10412},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1709-10412.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MilnerCYR17,
  author       = {Kevin Milner and
                  Cas Cremers and
                  Jiangshan Yu and
                  Mark Ryan},
  title        = {Automatically Detecting the Misuse of Secrets: Foundations, Design
                  Principles, and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {234},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/234},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MilnerCYR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YuRC17,
  author       = {Jiangshan Yu and
                  Mark Ryan and
                  Liqun Chen},
  title        = {Authenticating compromisable storage systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {485},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/485},
  timestamp    = {Sun, 22 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/YuRC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YuR17,
  author       = {Jiangshan Yu and
                  Mark Ryan},
  title        = {Evaluating web PKIs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {526},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/526},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YuR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/YuCR16,
  author       = {Jiangshan Yu and
                  Vincent Cheval and
                  Mark Ryan},
  title        = {{DTKI:} {A} New Formalized {PKI} with Verifiable Trusted Parties},
  journal      = {Comput. J.},
  volume       = {59},
  number       = {11},
  pages        = {1695--1713},
  year         = {2016},
  url          = {https://doi.org/10.1093/comjnl/bxw039},
  doi          = {10.1093/COMJNL/BXW039},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/YuCR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uic/DenzelBR16,
  author       = {Michael Denzel and
                  Alessandro Bruni and
                  Mark Dermot Ryan},
  title        = {Smart-Guard: Defending User Input from Malware},
  booktitle    = {2016 Intl {IEEE} Conferences on Ubiquitous Intelligence {\&} Computing,
                  Advanced and Trusted Computing, Scalable Computing and Communications,
                  Cloud and Big Data Computing, Internet of People, and Smart World
                  Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld), Toulouse, France,
                  July 18-21, 2016},
  pages        = {502--509},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0089},
  doi          = {10.1109/UIC-ATC-SCALCOM-CBDCOM-IOP-SMARTWORLD.2016.0089},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uic/DenzelBR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dagstuhl-manifestos/PreneelRRR15,
  author       = {Bart Preneel and
                  Phillip Rogaway and
                  Mark Dermot Ryan and
                  Peter Y. A. Ryan},
  title        = {Privacy and Security in an Age of Surveillance (Dagstuhl Perspectives
                  Workshop 14401)},
  journal      = {Dagstuhl Manifestos},
  volume       = {5},
  number       = {1},
  pages        = {25--37},
  year         = {2015},
  url          = {https://doi.org/10.4230/DagMan.5.1.25},
  doi          = {10.4230/DAGMAN.5.1.25},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dagstuhl-manifestos/PreneelRRR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scp/SmythRC15,
  author       = {Ben Smyth and
                  Mark Dermot Ryan and
                  Liqun Chen},
  title        = {Formal analysis of privacy in Direct Anonymous Attestation schemes},
  journal      = {Sci. Comput. Program.},
  volume       = {111},
  pages        = {300--317},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.scico.2015.04.004},
  doi          = {10.1016/J.SCICO.2015.04.004},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scp/SmythRC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/GrewalRCC15,
  author       = {Gurchetan S. Grewal and
                  Mark Dermot Ryan and
                  Liqun Chen and
                  Michael R. Clarkson},
  editor       = {C{\'{e}}dric Fournet and
                  Michael W. Hicks and
                  Luca Vigan{\`{o}}},
  title        = {Du-Vote: Remote Electronic Voting with Untrusted Computers},
  booktitle    = {{IEEE} 28th Computer Security Foundations Symposium, {CSF} 2015, Verona,
                  Italy, 13-17 July, 2015},
  pages        = {155--169},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/CSF.2015.18},
  doi          = {10.1109/CSF.2015.18},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/GrewalRCC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/YuR15,
  author       = {Jiangshan Yu and
                  Mark Dermot Ryan},
  editor       = {Bruce Christianson and
                  Petr Svenda and
                  Vashek Maty{\'{a}}s and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Device Attacker Models: Fact and Fiction},
  booktitle    = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge,
                  UK, March 31 - April 2, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9379},
  pages        = {158--167},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26096-9\_17},
  doi          = {10.1007/978-3-319-26096-9\_17},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/YuR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Ryan15,
  author       = {Mark Ryan},
  editor       = {Bruce Christianson and
                  Petr Svenda and
                  Vashek Maty{\'{a}}s and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Device Attacker Models: Fact and Fiction (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge,
                  UK, March 31 - April 2, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9379},
  pages        = {168--177},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26096-9\_18},
  doi          = {10.1007/978-3-319-26096-9\_18},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/Ryan15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YuRC15,
  author       = {Jiangshan Yu and
                  Mark Ryan and
                  Cas Cremers},
  title        = {How to detect unauthorised usage of a key},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {486},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/486},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YuRC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/sbcysec/Stalla-BourdillonPR14,
  author       = {Sophie Stalla{-}Bourdillon and
                  Joshua Phillips and
                  Mark Dermot Ryan},
  title        = {Privacy vs. Security},
  series       = {Springer Briefs in Cybersecurity},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-1-4471-6530-9},
  doi          = {10.1007/978-1-4471-6530-9},
  isbn         = {978-1-4471-6529-3},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/sbcysec/Stalla-BourdillonPR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/ArapinisPRR14,
  author       = {Myrto Arapinis and
                  Joshua Phillips and
                  Eike Ritter and
                  Mark Dermot Ryan},
  title        = {StatVerif: Verification of stateful processes},
  journal      = {J. Comput. Secur.},
  volume       = {22},
  number       = {5},
  pages        = {743--821},
  year         = {2014},
  url          = {https://doi.org/10.3233/JCS-140501},
  doi          = {10.3233/JCS-140501},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/ArapinisPRR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apn/RyanGC14,
  author       = {Mark Ryan and
                  Gurchetan S. Grewal and
                  Liqun Chen},
  editor       = {V{\'{e}}ronique Cortier and
                  Riadh Robbana},
  title        = {Du-Vote: Remote Electronic Voting with Untrusted Computers},
  booktitle    = {Proceedings of the Formal Methods for Security Workshop co-located
                  with the PetriNets-2014 Conference , Tunis, Tunisia, June 23rd, 2014},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {1158},
  pages        = {4},
  publisher    = {CEUR-WS.org},
  year         = {2014},
  url          = {https://ceur-ws.org/Vol-1158/invited.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:22:38 +0100},
  biburl       = {https://dblp.org/rec/conf/apn/RyanGC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/LiuRC14,
  author       = {Jia Liu and
                  Mark Dermot Ryan and
                  Liqun Chen},
  title        = {Balancing Societal Security and Individual Privacy: Accountable Escrow
                  System},
  booktitle    = {{IEEE} 27th Computer Security Foundations Symposium, {CSF} 2014, Vienna,
                  Austria, 19-22 July, 2014},
  pages        = {427--440},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CSF.2014.37},
  doi          = {10.1109/CSF.2014.37},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/LiuRC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/ArapinisMRR14,
  author       = {Myrto Arapinis and
                  Loretta Ilaria Mancini and
                  Eike Ritter and
                  Mark Ryan},
  title        = {Privacy through Pseudonymity in Mobile Telephony Systems},
  booktitle    = {21st Annual Network and Distributed System Security Symposium, {NDSS}
                  2014, San Diego, California, USA, February 23-26, 2014},
  publisher    = {The Internet Society},
  year         = {2014},
  url          = {https://www.ndss-symposium.org/ndss2014/privacy-through-pseudonymity-mobile-telephony-systems},
  timestamp    = {Mon, 01 Feb 2021 08:42:18 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/ArapinisMRR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/Ryan14,
  author       = {Mark Dermot Ryan},
  title        = {Enhanced Certificate Transparency and End-to-End Encrypted Mail},
  booktitle    = {21st Annual Network and Distributed System Security Symposium, {NDSS}
                  2014, San Diego, California, USA, February 23-26, 2014},
  publisher    = {The Internet Society},
  year         = {2014},
  url          = {https://www.ndss-symposium.org/ndss2014/enhanced-certificate-transparency-and-end-end-encrypted-mail},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/Ryan14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/ArapinisLRR14,
  author       = {Myrto Arapinis and
                  Jia Liu and
                  Eike Ritter and
                  Mark Ryan},
  editor       = {Mart{\'{\i}}n Abadi and
                  Steve Kremer},
  title        = {Stateful Applied Pi Calculus},
  booktitle    = {Principles of Security and Trust - Third International Conference,
                  {POST} 2014, Held as Part of the European Joint Conferences on Theory
                  and Practice of Software, {ETAPS} 2014, Grenoble, France, April 5-13,
                  2014, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8414},
  pages        = {22--41},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54792-8\_2},
  doi          = {10.1007/978-3-642-54792-8\_2},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/post/ArapinisLRR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tgc/ChevalDR14,
  author       = {Vincent Cheval and
                  St{\'{e}}phanie Delaune and
                  Mark Ryan},
  editor       = {Matteo Maffei and
                  Emilio Tuosto},
  title        = {Tests for Establishing Security Properties},
  booktitle    = {Trustworthy Global Computing - 9th International Symposium, {TGC}
                  2014, Rome, Italy, September 5-6, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8902},
  pages        = {82--96},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-45917-1\_6},
  doi          = {10.1007/978-3-662-45917-1\_6},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tgc/ChevalDR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/KoleiniRR14,
  author       = {Masoud Koleini and
                  Eike Ritter and
                  Mark Ryan},
  title        = {Verification of agent knowledge in dynamic access control policies},
  journal      = {CoRR},
  volume       = {abs/1401.4730},
  year         = {2014},
  url          = {http://arxiv.org/abs/1401.4730},
  eprinttype    = {arXiv},
  eprint       = {1401.4730},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/KoleiniRR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/YuCR14,
  author       = {Jiangshan Yu and
                  Vincent Cheval and
                  Mark Ryan},
  title        = {{DTKI:} a new formalized {PKI} with no trusted parties},
  journal      = {CoRR},
  volume       = {abs/1408.1023},
  year         = {2014},
  url          = {http://arxiv.org/abs/1408.1023},
  eprinttype    = {arXiv},
  eprint       = {1408.1023},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/YuCR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dagstuhl-reports/PreneelRRR14,
  author       = {Bart Preneel and
                  Phillip Rogaway and
                  Mark Dermot Ryan and
                  Peter Y. A. Ryan},
  title        = {Privacy and Security in an Age of Surveillance (Dagstuhl Perspectives
                  Workshop 14401)},
  journal      = {Dagstuhl Reports},
  volume       = {4},
  number       = {9},
  pages        = {106--123},
  year         = {2014},
  url          = {https://doi.org/10.4230/DagRep.4.9.106},
  doi          = {10.4230/DAGREP.4.9.106},
  timestamp    = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dagstuhl-reports/PreneelRRR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fmsd/ChevalierDKR13,
  author       = {C{\'{e}}line Chevalier and
                  St{\'{e}}phanie Delaune and
                  Steve Kremer and
                  Mark Dermot Ryan},
  title        = {Composition of password-based protocols},
  journal      = {Formal Methods Syst. Des.},
  volume       = {43},
  number       = {3},
  pages        = {369--413},
  year         = {2013},
  url          = {https://doi.org/10.1007/s10703-013-0184-6},
  doi          = {10.1007/S10703-013-0184-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fmsd/ChevalierDKR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/ArapinisBR13,
  author       = {Myrto Arapinis and
                  Sergiu Bursuc and
                  Mark Ryan},
  title        = {Privacy-supporting cloud computing by in-browser key translation},
  journal      = {J. Comput. Secur.},
  volume       = {21},
  number       = {6},
  pages        = {847--880},
  year         = {2013},
  url          = {https://doi.org/10.3233/JCS-130489},
  doi          = {10.3233/JCS-130489},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/ArapinisBR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/Ryan13,
  author       = {Mark Dermot Ryan},
  title        = {Cloud computing security: The scientific challenge, and a survey of
                  solutions},
  journal      = {J. Syst. Softw.},
  volume       = {86},
  number       = {9},
  pages        = {2263--2268},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jss.2012.12.025},
  doi          = {10.1016/J.JSS.2012.12.025},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jss/Ryan13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/ArapinisCKR13,
  author       = {Myrto Arapinis and
                  V{\'{e}}ronique Cortier and
                  Steve Kremer and
                  Mark Ryan},
  editor       = {David A. Basin and
                  John C. Mitchell},
  title        = {Practical Everlasting Privacy},
  booktitle    = {Principles of Security and Trust - Second International Conference,
                  {POST} 2013, Held as Part of the European Joint Conferences on Theory
                  and Practice of Software, {ETAPS} 2013, Rome, Italy, March 16-24,
                  2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7796},
  pages        = {21--40},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36830-1\_2},
  doi          = {10.1007/978-3-642-36830-1\_2},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/post/ArapinisCKR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/GrewalRBR13,
  author       = {Gurchetan S. Grewal and
                  Mark Dermot Ryan and
                  Sergiu Bursuc and
                  Peter Y. A. Ryan},
  title        = {Caveat Coercitor: Coercion-Evidence in Electronic Voting},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley,
                  CA, USA, May 19-22, 2013},
  pages        = {367--381},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SP.2013.32},
  doi          = {10.1109/SP.2013.32},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/GrewalRBR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tacas/KoleiniRR13,
  author       = {Masoud Koleini and
                  Eike Ritter and
                  Mark Ryan},
  editor       = {Nir Piterman and
                  Scott A. Smolka},
  title        = {Model Checking Agent Knowledge in Dynamic Access Control Policies},
  booktitle    = {Tools and Algorithms for the Construction and Analysis of Systems
                  - 19th International Conference, {TACAS} 2013, Held as Part of the
                  European Joint Conferences on Theory and Practice of Software, {ETAPS}
                  2013, Rome, Italy, March 16-24, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7795},
  pages        = {448--462},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36742-7\_31},
  doi          = {10.1007/978-3-642-36742-7\_31},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tacas/KoleiniRR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tgc/XuBR13,
  author       = {Shiwei Xu and
                  Ian Batten and
                  Mark Ryan},
  editor       = {Mart{\'{\i}}n Abadi and
                  Alberto Lluch{-}Lafuente},
  title        = {Dynamic Measurement and Protected Execution: Model and Analysis},
  booktitle    = {Trustworthy Global Computing - 8th International Symposium, {TGC}
                  2013, Buenos Aires, Argentina, August 30-31, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8358},
  pages        = {45--63},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-05119-2\_4},
  doi          = {10.1007/978-3-319-05119-2\_4},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tgc/XuBR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/tgc/2012,
  editor       = {Catuscia Palamidessi and
                  Mark Dermot Ryan},
  title        = {Trustworthy Global Computing - 7th International Symposium, {TGC}
                  2012, Newcastle upon Tyne, UK, September 7-8, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8191},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41157-1},
  doi          = {10.1007/978-3-642-41157-1},
  isbn         = {978-3-642-41156-4},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tgc/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Ryan13,
  author       = {Mark Dermot Ryan},
  title        = {Enhanced certificate transparency (how Johnny could encrypt)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {595},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/595},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Ryan13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ArapinisMRRGRB12,
  author       = {Myrto Arapinis and
                  Loretta Ilaria Mancini and
                  Eike Ritter and
                  Mark Ryan and
                  Nico Golde and
                  Kevin Redon and
                  Ravishankar Borgaonkar},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {New privacy issues in mobile telephony: fix and verification},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {205--216},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382221},
  doi          = {10.1145/2382196.2382221},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ArapinisMRRGRB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/Ryan12,
  author       = {Mark Dermot Ryan},
  editor       = {Chris J. Mitchell and
                  Allan Tomlinson},
  title        = {Automatic Analysis of Security Properties of the {TPM}},
  booktitle    = {Trusted Systems, 4th International Conference, {INTRUST} 2012, London,
                  UK, December 17-18, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7711},
  pages        = {1--4},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35371-0\_1},
  doi          = {10.1007/978-3-642-35371-0\_1},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/intrust/Ryan12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/ArapinisBR12,
  author       = {Myrto Arapinis and
                  Sergiu Bursuc and
                  Mark Ryan},
  editor       = {Pierpaolo Degano and
                  Joshua D. Guttman},
  title        = {Privacy Supporting Cloud Computing: ConfiChair, a Case Study},
  booktitle    = {Principles of Security and Trust - First International Conference,
                  {POST} 2012, Held as Part of the European Joint Conferences on Theory
                  and Practice of Software, {ETAPS} 2012, Tallinn, Estonia, March 24
                  - April 1, 2012, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7215},
  pages        = {89--108},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28641-4\_6},
  doi          = {10.1007/978-3-642-28641-4\_6},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/post/ArapinisBR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/ArapinisBR12a,
  author       = {Myrto Arapinis and
                  Sergiu Bursuc and
                  Mark Dermot Ryan},
  editor       = {Pierpaolo Degano and
                  Joshua D. Guttman},
  title        = {Reduction of Equational Theories for Verification of Trace Equivalence:
                  Re-encryption, Associativity and Commutativity},
  booktitle    = {Principles of Security and Trust - First International Conference,
                  {POST} 2012, Held as Part of the European Joint Conferences on Theory
                  and Practice of Software, {ETAPS} 2012, Tallinn, Estonia, March 24
                  - April 1, 2012, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7215},
  pages        = {169--188},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28641-4\_10},
  doi          = {10.1007/978-3-642-28641-4\_10},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/post/ArapinisBR12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ispec/2012,
  editor       = {Mark Dermot Ryan and
                  Ben Smyth and
                  Guilin Wang},
  title        = {Information Security Practice and Experience - 8th International Conference,
                  {ISPEC} 2012, Hangzhou, China, April 9-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7232},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29101-2},
  doi          = {10.1007/978-3-642-29101-2},
  isbn         = {978-3-642-29100-5},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SmythRC12,
  author       = {Ben Smyth and
                  Mark Dermot Ryan and
                  Liqun Chen},
  title        = {Formal analysis of privacy in Direct Anonymous Attestation schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {650},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/650},
  timestamp    = {Sun, 22 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/SmythRC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/Ryan11,
  author       = {Mark Dermot Ryan},
  title        = {Cloud computing privacy concerns on our doorstep},
  journal      = {Commun. {ACM}},
  volume       = {54},
  number       = {1},
  pages        = {36--38},
  year         = {2011},
  url          = {https://doi.org/10.1145/1866739.1866751},
  doi          = {10.1145/1866739.1866751},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/Ryan11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/ArapinisRR11,
  author       = {Myrto Arapinis and
                  Eike Ritter and
                  Mark Dermot Ryan},
  title        = {StatVerif: Verification of Stateful Processes},
  booktitle    = {Proceedings of the 24th {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2011, Cernay-la-Ville, France, 27-29 June, 2011},
  pages        = {33--47},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/CSF.2011.10},
  doi          = {10.1109/CSF.2011.10},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/ArapinisRR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/DelauneKRS11,
  author       = {St{\'{e}}phanie Delaune and
                  Steve Kremer and
                  Mark Dermot Ryan and
                  Graham Steel},
  title        = {Formal Analysis of Protocols Based on {TPM} State Registers},
  booktitle    = {Proceedings of the 24th {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2011, Cernay-la-Ville, France, 27-29 June, 2011},
  pages        = {66--80},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/CSF.2011.12},
  doi          = {10.1109/CSF.2011.12},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/DelauneKRS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icfem/KoleiniR11,
  author       = {Masoud Koleini and
                  Mark Ryan},
  editor       = {Shengchao Qin and
                  Zongyan Qiu},
  title        = {A Knowledge-Based Verification Method for Dynamic Access Control Policies},
  booktitle    = {Formal Methods and Software Engineering - 13th International Conference
                  on Formal Engineering Methods, {ICFEM} 2011, Durham, UK, October 26-28,
                  2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6991},
  pages        = {243--258},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24559-6\_18},
  doi          = {10.1007/978-3-642-24559-6\_18},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icfem/KoleiniR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/SmythRC11,
  author       = {Ben Smyth and
                  Mark Ryan and
                  Liqun Chen},
  editor       = {Gilles Barthe and
                  Anupam Datta and
                  Sandro Etalle},
  title        = {Formal Analysis of Anonymity in ECC-Based Direct Anonymous Attestation
                  Schemes},
  booktitle    = {Formal Aspects of Security and Trust - 8th International Workshop,
                  {FAST} 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7140},
  pages        = {245--262},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29420-4\_16},
  doi          = {10.1007/978-3-642-29420-4\_16},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/SmythRC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/voteid/BursucGR11,
  author       = {Sergiu Bursuc and
                  Gurchetan S. Grewal and
                  Mark Dermot Ryan},
  editor       = {Aggelos Kiayias and
                  Helger Lipmaa},
  title        = {Trivitas: Voters Directly Verifying Votes},
  booktitle    = {E-Voting and Identity - Third International Conference, VoteID 2011,
                  Tallinn, Estonia, September 28-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7187},
  pages        = {190--207},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-32747-6\_12},
  doi          = {10.1007/978-3-642-32747-6\_12},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/voteid/BursucGR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/ios/11/RyanS11,
  author       = {Mark Dermot Ryan and
                  Ben Smyth},
  editor       = {V{\'{e}}ronique Cortier and
                  Steve Kremer},
  title        = {Applied pi calculus},
  booktitle    = {Formal Models and Techniques for Analyzing Security Protocols},
  series       = {Cryptology and Information Security Series},
  volume       = {5},
  pages        = {112--142},
  publisher    = {{IOS} Press},
  year         = {2011},
  url          = {https://doi.org/10.3233/978-1-60750-714-7-112},
  doi          = {10.3233/978-1-60750-714-7-112},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/ios/11/RyanS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1109-2066,
  author       = {Myrto Arapinis and
                  Loretta Ilaria Mancini and
                  Eike Ritter and
                  Mark Ryan},
  title        = {Formal Analysis of {UMTS} Privacy},
  journal      = {CoRR},
  volume       = {abs/1109.2066},
  year         = {2011},
  url          = {http://arxiv.org/abs/1109.2066},
  eprinttype    = {arXiv},
  eprint       = {1109.2066},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1109-2066.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/DelauneKR10,
  author       = {St{\'{e}}phanie Delaune and
                  Steve Kremer and
                  Mark Dermot Ryan},
  title        = {Symbolic bisimulation for the applied pi calculus},
  journal      = {J. Comput. Secur.},
  volume       = {18},
  number       = {2},
  pages        = {317--377},
  year         = {2010},
  url          = {https://doi.org/10.3233/JCS-2010-0363},
  doi          = {10.3233/JCS-2010-0363},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcs/DelauneKR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/MukhamedovR10,
  author       = {Aybek Mukhamedov and
                  Mark Dermot Ryan},
  title        = {Identity Escrow Protocol and Anonymity Analysis in the Applied Pi-Calculus},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {4},
  pages        = {41:1--41:29},
  year         = {2010},
  url          = {https://doi.org/10.1145/1880022.1880035},
  doi          = {10.1145/1880022.1880035},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/MukhamedovR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/ArapinisCRR10,
  author       = {Myrto Arapinis and
                  Tom Chothia and
                  Eike Ritter and
                  Mark Ryan},
  title        = {Analysing Unlinkability and Anonymity Using the Applied Pi Calculus},
  booktitle    = {Proceedings of the 23rd {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2010, Edinburgh, United Kingdom, July 17-19, 2010},
  pages        = {107--121},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CSF.2010.15},
  doi          = {10.1109/CSF.2010.15},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/ArapinisCRR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/QunooR10,
  author       = {Hasan Qunoo and
                  Mark Ryan},
  editor       = {Sara Foresti and
                  Sushil Jajodia},
  title        = {Modelling Dynamic Access Control Policies for Web-Based Collaborative
                  Systems},
  booktitle    = {Data and Applications Security and Privacy XXIV, 24th Annual {IFIP}
                  {WG} 11.3 Working Conference, Rome, Italy, June 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6166},
  pages        = {295--302},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13739-6\_20},
  doi          = {10.1007/978-3-642-13739-6\_20},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/QunooR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/DinhR10,
  author       = {Tien Tuan Anh Dinh and
                  Mark Ryan},
  editor       = {Dimitris Gritzalis and
                  Bart Preneel and
                  Marianthi Theoharidou},
  title        = {Verifying Security Property of Peer-to-Peer Systems Using {CSP}},
  booktitle    = {Computer Security - {ESORICS} 2010, 15th European Symposium on Research
                  in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6345},
  pages        = {319--339},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15497-3\_20},
  doi          = {10.1007/978-3-642-15497-3\_20},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/DinhR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/KremerRS10,
  author       = {Steve Kremer and
                  Mark Ryan and
                  Ben Smyth},
  editor       = {Dimitris Gritzalis and
                  Bart Preneel and
                  Marianthi Theoharidou},
  title        = {Election Verifiability in Electronic Voting Protocols},
  booktitle    = {Computer Security - {ESORICS} 2010, 15th European Symposium on Research
                  in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6345},
  pages        = {389--404},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15497-3\_24},
  doi          = {10.1007/978-3-642-15497-3\_24},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/KremerRS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/DelauneKRS10,
  author       = {St{\'{e}}phanie Delaune and
                  Steve Kremer and
                  Mark Dermot Ryan and
                  Graham Steel},
  editor       = {Pierpaolo Degano and
                  Sandro Etalle and
                  Joshua D. Guttman},
  title        = {A Formal Analysis of Authentication in the {TPM}},
  booktitle    = {Formal Aspects of Security and Trust - 7th International Workshop,
                  {FAST} 2010, Pisa, Italy, September 16-17, 2010. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6561},
  pages        = {111--125},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-19751-2\_8},
  doi          = {10.1007/978-3-642-19751-2\_8},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/DelauneKRS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/SmythRKK10,
  author       = {Ben Smyth and
                  Mark Ryan and
                  Steve Kremer and
                  Mounira Kourjieh},
  editor       = {Alessandro Armando and
                  Gavin Lowe},
  title        = {Towards Automatic Analysis of Election Verifiability Properties},
  booktitle    = {Automated Reasoning for Security Protocol Analysis and Issues in the
                  Theory of Security - Joint Workshop, {ARSPA-WITS} 2010, Paphos, Cyprus,
                  March 27-28, 2010. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6186},
  pages        = {146--163},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16074-5\_11},
  doi          = {10.1007/978-3-642-16074-5\_11},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/SmythRKK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/AblesR10,
  author       = {King Ables and
                  Mark Dermot Ryan},
  editor       = {Alessandro Acquisti and
                  Sean W. Smith and
                  Ahmad{-}Reza Sadeghi},
  title        = {Escrowed Data and the Digital Envelope},
  booktitle    = {Trust and Trustworthy Computing, Third International Conference, {TRUST}
                  2010, Berlin, Germany, June 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6101},
  pages        = {246--256},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13869-0\_16},
  doi          = {10.1007/978-3-642-13869-0\_16},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trust/AblesR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wote/DelauneKR10,
  author       = {St{\'{e}}phanie Delaune and
                  Steve Kremer and
                  Mark Ryan},
  editor       = {David Chaum and
                  Markus Jakobsson and
                  Ronald L. Rivest and
                  Peter Y. A. Ryan and
                  Josh Benaloh and
                  Miroslaw Kutylowski and
                  Ben Adida},
  title        = {Verifying Privacy-Type Properties of Electronic Voting Protocols:
                  {A} Taster},
  booktitle    = {Towards Trustworthy Elections, New Directions in Electronic Voting},
  series       = {Lecture Notes in Computer Science},
  volume       = {6000},
  pages        = {289--309},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12980-3\_18},
  doi          = {10.1007/978-3-642-12980-3\_18},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wote/DelauneKR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eceasst/ArapinisCDFGKMRRSUY09,
  author       = {Myrto Arapinis and
                  Muffy Calder and
                  Louise A. Dennis and
                  Michael Fisher and
                  Philip D. Gray and
                  Savas Konur and
                  Alice Miller and
                  Eike Ritter and
                  Mark Ryan and
                  Sven Schewe and
                  Chris Unsworth and
                  Rehana Yasmin},
  title        = {Towards the Verification of Pervasive Systems},
  journal      = {Electron. Commun. Eur. Assoc. Softw. Sci. Technol.},
  volume       = {22},
  year         = {2009},
  url          = {https://doi.org/10.14279/tuj.eceasst.22.315},
  doi          = {10.14279/TUJ.ECEASST.22.315},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eceasst/ArapinisCDFGKMRRSUY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/DelauneKR09,
  author       = {St{\'{e}}phanie Delaune and
                  Steve Kremer and
                  Mark Ryan},
  title        = {Verifying privacy-type properties of electronic voting protocols},
  journal      = {J. Comput. Secur.},
  volume       = {17},
  number       = {4},
  pages        = {435--487},
  year         = {2009},
  url          = {https://doi.org/10.3233/JCS-2009-0340},
  doi          = {10.3233/JCS-2009-0340},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcs/DelauneKR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ArapinisCRR09,
  author       = {Myrto Arapinis and
                  Tom Chothia and
                  Eike Ritter and
                  Mark Ryan},
  title        = {Untraceability in the applied pi-calculus},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402514},
  doi          = {10.1109/ICITST.2009.5402514},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/ArapinisCRR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/ChenR09,
  author       = {Liqun Chen and
                  Mark Ryan},
  editor       = {Pierpaolo Degano and
                  Joshua D. Guttman},
  title        = {Attack, Solution and Verification for Shared Authorisation Data in
                  {TCG} {TPM}},
  booktitle    = {Formal Aspects in Security and Trust, 6th International Workshop,
                  {FAST} 2009, Eindhoven, The Netherlands, November 5-6, 2009, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5983},
  pages        = {201--216},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-12459-4\_15},
  doi          = {10.1007/978-3-642-12459-4\_15},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/ChenR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/CabukCPR09,
  author       = {Serdar Cabuk and
                  Liqun Chen and
                  David Plaquin and
                  Mark Ryan},
  editor       = {Liqun Chen and
                  Moti Yung},
  title        = {Trusted Integrity Measurement and Reporting for Virtualized Platforms},
  booktitle    = {Trusted Systems, First International Conference, {INTRUST} 2009, Beijing,
                  China, December 17-19, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6163},
  pages        = {180--196},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-14597-1\_11},
  doi          = {10.1007/978-3-642-14597-1\_11},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/intrust/CabukCPR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobisec/BrownR09,
  author       = {Andrew Brown and
                  Mark Ryan},
  editor       = {Andreas U. Schmidt and
                  Shiguo Lian},
  title        = {Context-Aware Monitoring of Untrusted Mobile Applications},
  booktitle    = {Security and Privacy in Mobile Information and Communication Systems,
                  First International {ICST} Conference, MobiSec 2009, Turin, Italy,
                  June 3-5, 2009, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {17},
  pages        = {83--96},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04434-2\_8},
  doi          = {10.1007/978-3-642-04434-2\_8},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mobisec/BrownR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/p2p/DinhCR09,
  author       = {Tien Tuan Anh Dinh and
                  Tom Chothia and
                  Mark Ryan},
  editor       = {Henning Schulzrinne and
                  Karl Aberer and
                  Anwitaman Datta},
  title        = {A Trusted Infrastructure for P2P-based Marketplaces},
  booktitle    = {Proceedings {P2P} 2009, Ninth International Conference on Peer-to-Peer
                  Computing, 9-11 September 2009, Seattle, Washington, {USA}},
  pages        = {151--154},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/P2P.2009.5284522},
  doi          = {10.1109/P2P.2009.5284522},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/p2p/DinhCR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/MukhamedovGR09,
  author       = {Aybek Mukhamedov and
                  Andrew D. Gordon and
                  Mark Ryan},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {Towards a Verified Reference Implementation of a Trusted Platform
                  Module},
  booktitle    = {Security Protocols XVII, 17th International Workshop, Cambridge, UK,
                  April 1-3, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7028},
  pages        = {69--81},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-36213-2\_11},
  doi          = {10.1007/978-3-642-36213-2\_11},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/MukhamedovGR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/MukhamedovR08,
  author       = {Aybek Mukhamedov and
                  Mark Dermot Ryan},
  title        = {Fair multi-party contract signing using private contract signatures},
  journal      = {Inf. Comput.},
  volume       = {206},
  number       = {2-4},
  pages        = {272--290},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.ic.2007.07.007},
  doi          = {10.1016/J.IC.2007.07.007},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iandc/MukhamedovR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/ZhangRG08,
  author       = {Nan Zhang and
                  Mark Ryan and
                  Dimitar P. Guelev},
  title        = {Synthesising verified access control systems through model checking},
  journal      = {J. Comput. Secur.},
  volume       = {16},
  number       = {1},
  pages        = {1--61},
  year         = {2008},
  url          = {https://doi.org/10.3233/jcs-2008-16101},
  doi          = {10.3233/JCS-2008-16101},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/ZhangRG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/DelauneKR08,
  author       = {St{\'{e}}phanie Delaune and
                  Steve Kremer and
                  Mark Ryan},
  title        = {Composition of Password-Based Protocols},
  booktitle    = {Proceedings of the 21st {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2008, Pittsburgh, Pennsylvania, USA, 23-25 June 2008},
  pages        = {239--251},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CSF.2008.6},
  doi          = {10.1109/CSF.2008.6},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/DelauneKR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifiptm/DelauneRS08,
  author       = {St{\'{e}}phanie Delaune and
                  Mark Ryan and
                  Ben Smyth},
  editor       = {Y{\"{u}}cel Karabulut and
                  John Mitchell and
                  Peter Herrmann and
                  Christian Damsgaard Jensen},
  title        = {Automatic Verification of Privacy Properties in the Applied pi Calculus},
  booktitle    = {Trust Management {II} - Proceedings of {IFIPTM} 2008: Joint iTrust
                  and {PST} Conferences on Privacy, Trust Management and Security, June
                  18-20, 2008, Trondheim, Norway},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {263},
  pages        = {263--278},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-09428-1\_17},
  doi          = {10.1007/978-0-387-09428-1\_17},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ifiptm/DelauneRS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/SalaiwarakulR08,
  author       = {Anongporn Salaiwarakul and
                  Mark Dermot Ryan},
  editor       = {Liqun Chen and
                  Yi Mu and
                  Willy Susilo},
  title        = {Verification of Integrity and Secrecy Properties of a Biometric Authentication
                  Protocol},
  booktitle    = {Information Security Practice and Experience, 4th International Conference,
                  {ISPEC} 2008, Sydney, Australia, April 21-23, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4991},
  pages        = {1--13},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-79104-1\_1},
  doi          = {10.1007/978-3-540-79104-1\_1},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/SalaiwarakulR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/BrownR08,
  author       = {Andrew Brown and
                  Mark Ryan},
  editor       = {Liqun Chen and
                  Yi Mu and
                  Willy Susilo},
  title        = {Synthesising Monitors from High-Level Policies for the Safe Execution
                  of Untrusted Software},
  booktitle    = {Information Security Practice and Experience, 4th International Conference,
                  {ISPEC} 2008, Sydney, Australia, April 21-23, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4991},
  pages        = {233--247},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-79104-1\_17},
  doi          = {10.1007/978-3-540-79104-1\_17},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/BrownR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/SalaiwarakulR08,
  author       = {Anongporn Salaiwarakul and
                  Mark Ryan},
  editor       = {Kanta Matsuura and
                  Eiichiro Fujisaki},
  title        = {Analysis of a Biometric Authentication Protocol for Signature Creation
                  Application},
  booktitle    = {Advances in Information and Computer Security, Third International
                  Workshop on Security, {IWSEC} 2008, Kagawa, Japan, November 25-27,
                  2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5312},
  pages        = {231--245},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89598-5\_16},
  doi          = {10.1007/978-3-540-89598-5\_16},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwsec/SalaiwarakulR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/BrownR08,
  author       = {Andrew Brown and
                  Mark Ryan},
  editor       = {Richard Lippmann and
                  Engin Kirda and
                  Ari Trachtenberg},
  title        = {Monitoring the Execution of Third-Party Software on Mobile Devices},
  booktitle    = {Recent Advances in Intrusion Detection, 11th International Symposium,
                  {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5230},
  pages        = {410--411},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-87403-4\_31},
  doi          = {10.1007/978-3-540-87403-4\_31},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/BrownR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/saint/DinhR08,
  author       = {Tien Tuan Anh Dinh and
                  Mark Ryan},
  title        = {A Sybil-Resilient Reputation Metric for {P2P} Applications},
  booktitle    = {Proceedings of the 2008 International Symposium on Applications and
                  the Internet, {SAINT} 2008, 28 July - 1 August 2008, Turku, Finland},
  pages        = {193--196},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SAINT.2008.52},
  doi          = {10.1109/SAINT.2008.52},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/saint/DinhR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dagstuhl/2007P7421,
  editor       = {Liqun Chen and
                  Steve Kremer and
                  Mark Dermot Ryan},
  title        = {Formal Protocol Verification Applied, 14.10. - 19.10.2007},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {07421},
  publisher    = {Internationales Begegnungs- und Forschungszentrum fuer Informatik
                  (IBFI), Schloss Dagstuhl, Germany},
  year         = {2008},
  url          = {http://drops.dagstuhl.de/portals/07421/},
  timestamp    = {Sun, 22 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/2007P7421.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icics/2008,
  editor       = {Liqun Chen and
                  Mark Dermot Ryan and
                  Guilin Wang},
  title        = {Information and Communications Security, 10th International Conference,
                  {ICICS} 2008, Birmingham, UK, October 20-22, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5308},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88625-9},
  doi          = {10.1007/978-3-540-88625-9},
  isbn         = {978-3-540-88624-2},
  timestamp    = {Sun, 22 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/Reiff-MarganiecR07,
  author       = {Stephan Reiff{-}Marganiec and
                  Mark Ryan},
  title        = {Guest Editorial},
  journal      = {Comput. Networks},
  volume       = {51},
  number       = {2},
  pages        = {357--358},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.comnet.2006.08.014},
  doi          = {10.1016/J.COMNET.2006.08.014},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/Reiff-MarganiecR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fac/GorogiannisR07,
  author       = {Nikos Gorogiannis and
                  Mark Ryan},
  title        = {Minimal refinements of specifications in model and termporal logics},
  journal      = {Formal Aspects Comput.},
  volume       = {19},
  number       = {1},
  pages        = {35--62},
  year         = {2007},
  url          = {https://doi.org/10.1007/s00165-006-0014-3},
  doi          = {10.1007/S00165-006-0014-3},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fac/GorogiannisR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fac/GorogiannisR07a,
  author       = {Nikos Gorogiannis and
                  Mark Ryan},
  title        = {Minimal refinements of specifications in modal and temporal logics},
  journal      = {Formal Aspects Comput.},
  volume       = {19},
  number       = {2},
  pages        = {273},
  year         = {2007},
  url          = {https://doi.org/10.1007/s00165-007-0038-3},
  doi          = {10.1007/S00165-007-0038-3},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fac/GorogiannisR07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fac/GorogiannisR07b,
  author       = {Nikos Gorogiannis and
                  Mark Ryan},
  title        = {Minimal refinements of specifications in modal and temporal logics},
  journal      = {Formal Aspects Comput.},
  volume       = {19},
  number       = {4},
  pages        = {417--444},
  year         = {2007},
  url          = {https://doi.org/10.1007/s00165-007-0040-9},
  doi          = {10.1007/S00165-007-0040-9},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fac/GorogiannisR07b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sttt/GuelevRS07,
  author       = {Dimitar P. Guelev and
                  Mark Dermot Ryan and
                  Pierre{-}Yves Schobbens},
  title        = {Model-checking the preservation of temporal properties upon feature
                  integration},
  journal      = {Int. J. Softw. Tools Technol. Transf.},
  volume       = {9},
  number       = {1},
  pages        = {53--62},
  year         = {2007},
  url          = {https://doi.org/10.1007/s10009-006-0006-x},
  doi          = {10.1007/S10009-006-0006-X},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sttt/GuelevRS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esas/SmythRC07,
  author       = {Ben Smyth and
                  Mark Ryan and
                  Liqun Chen},
  editor       = {Frank Stajano and
                  Catherine Meadows and
                  Srdjan Capkun and
                  Tyler Moore},
  title        = {Direct Anonymous Attestation {(DAA):} Ensuring Privacy with Corrupt
                  Administrators},
  booktitle    = {Security and Privacy in Ad-hoc and Sensor Networks, 4th European Workshop,
                  {ESAS} 2007, Cambridge, UK, July 2-3, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4572},
  pages        = {218--231},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73275-4\_16},
  doi          = {10.1007/978-3-540-73275-4\_16},
  timestamp    = {Tue, 19 Sep 2023 14:44:32 +0200},
  biburl       = {https://dblp.org/rec/conf/esas/SmythRC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/MukhamedovR07,
  author       = {Aybek Mukhamedov and
                  Mark Ryan},
  editor       = {Sven Dietrich and
                  Rachna Dhamija},
  title        = {Improved Multi-party Contract Signing},
  booktitle    = {Financial Cryptography and Data Security, 11th International Conference,
                  {FC} 2007, and 1st International Workshop on Usable Security, {USEC}
                  2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4886},
  pages        = {179--191},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77366-5\_17},
  doi          = {10.1007/978-3-540-77366-5\_17},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/MukhamedovR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fsttcs/DelauneKR07,
  author       = {St{\'{e}}phanie Delaune and
                  Steve Kremer and
                  Mark Ryan},
  editor       = {Vikraman Arvind and
                  Sanjiva Prasad},
  title        = {Symbolic Bisimulation for the Applied Pi Calculus},
  booktitle    = {{FSTTCS} 2007: Foundations of Software Technology and Theoretical
                  Computer Science, 27th International Conference, New Delhi, India,
                  December 12-14, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4855},
  pages        = {133--145},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77050-3\_11},
  doi          = {10.1007/978-3-540-77050-3\_11},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fsttcs/DelauneKR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tgc/MukhamedovR07,
  author       = {Aybek Mukhamedov and
                  Mark Dermot Ryan},
  editor       = {Gilles Barthe and
                  C{\'{e}}dric Fournet},
  title        = {Anonymity Protocol with Identity Escrow and Analysis in the Applied
                  n-Calculus},
  booktitle    = {Trustworthy Global Computing, Third Symposium, {TGC} 2007, Sophia-Antipolis,
                  France, November 5-6, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4912},
  pages        = {330--346},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-78663-4\_22},
  doi          = {10.1007/978-3-540-78663-4\_22},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tgc/MukhamedovR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/ChenKR07,
  author       = {Liqun Chen and
                  Steve Kremer and
                  Mark Dermot Ryan},
  editor       = {Liqun Chen and
                  Steve Kremer and
                  Mark Dermot Ryan},
  title        = {07421 Executive Summary -- Formal Protocol Verification Applied},
  booktitle    = {Formal Protocol Verification Applied, 14.10. - 19.10.2007},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {07421},
  publisher    = {Internationales Begegnungs- und Forschungszentrum fuer Informatik
                  (IBFI), Schloss Dagstuhl, Germany},
  year         = {2007},
  url          = {http://drops.dagstuhl.de/opus/volltexte/2008/1418},
  timestamp    = {Sun, 22 Jan 2023 01:36:25 +0100},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/ChenKR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/ChenKR07a,
  author       = {Liqun Chen and
                  Steve Kremer and
                  Mark Dermot Ryan},
  editor       = {Liqun Chen and
                  Steve Kremer and
                  Mark Dermot Ryan},
  title        = {07421 Abstracts Collection -- Formal Protocol Verification Applied},
  booktitle    = {Formal Protocol Verification Applied, 14.10. - 19.10.2007},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {07421},
  publisher    = {Internationales Begegnungs- und Forschungszentrum fuer Informatik
                  (IBFI), Schloss Dagstuhl, Germany},
  year         = {2007},
  url          = {http://drops.dagstuhl.de/opus/volltexte/2008/1419},
  timestamp    = {Sun, 22 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/ChenKR07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/DelauneKR06,
  author       = {St{\'{e}}phanie Delaune and
                  Steve Kremer and
                  Mark Ryan},
  title        = {Coercion-Resistance and Receipt-Freeness in Electronic Voting},
  booktitle    = {19th {IEEE} Computer Security Foundations Workshop, {(CSFW-19} 2006),
                  5-7 July 2006, Venice, Italy},
  pages        = {28--42},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/CSFW.2006.8},
  doi          = {10.1109/CSFW.2006.8},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/DelauneKR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/MukhamedovR06,
  author       = {Aybek Mukhamedov and
                  Mark Dermot Ryan},
  title        = {Resolve-Impossibility for a Contract-Signing Protocol},
  booktitle    = {19th {IEEE} Computer Security Foundations Workshop, {(CSFW-19} 2006),
                  5-7 July 2006, Venice, Italy},
  pages        = {167--176},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/CSFW.2006.27},
  doi          = {10.1109/CSFW.2006.27},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/MukhamedovR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esop/KremerR05,
  author       = {Steve Kremer and
                  Mark Ryan},
  editor       = {Shmuel Sagiv},
  title        = {Analysis of an Electronic Voting Protocol in the Applied Pi Calculus},
  booktitle    = {Programming Languages and Systems, 14th European Symposium on Programming,
                  {ESOP} 2005, Held as Part of the Joint European Conferences on Theory
                  and Practice of Software, {ETAPS} 2005, Edinburgh, UK, April 4-8,
                  2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3444},
  pages        = {186--200},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-31987-0\_14},
  doi          = {10.1007/978-3-540-31987-0\_14},
  timestamp    = {Fri, 27 Jan 2023 15:04:25 +0100},
  biburl       = {https://dblp.org/rec/conf/esop/KremerR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/MukhamedovR05,
  author       = {Aybek Mukhamedov and
                  Mark Dermot Ryan},
  editor       = {Theodosis Dimitrakos and
                  Fabio Martinelli and
                  Peter Y. A. Ryan and
                  Steve A. Schneider},
  title        = {On Anonymity with Identity Escrow},
  booktitle    = {Formal Aspects in Security and Trust, Third International Workshop,
                  {FAST} 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3866},
  pages        = {235--243},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11679219\_17},
  doi          = {10.1007/11679219\_17},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/MukhamedovR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/ZhangRG05,
  author       = {Nan Zhang and
                  Mark Ryan and
                  Dimitar P. Guelev},
  editor       = {Jianying Zhou and
                  Javier L{\'{o}}pez and
                  Robert H. Deng and
                  Feng Bao},
  title        = {Evaluating Access Control Policies Through Model Checking},
  booktitle    = {Information Security, 8th International Conference, {ISC} 2005, Singapore,
                  September 20-23, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3650},
  pages        = {446--460},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11556992\_32},
  doi          = {10.1007/11556992\_32},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/ZhangRG05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tacas/HardingRS05,
  author       = {Aidan Harding and
                  Mark Ryan and
                  Pierre{-}Yves Schobbens},
  editor       = {Nicolas Halbwachs and
                  Lenore D. Zuck},
  title        = {A New Algorithm for Strategy Synthesis in {LTL} Games},
  booktitle    = {Tools and Algorithms for the Construction and Analysis of Systems,
                  11th International Conference, {TACAS} 2005, Held as Part of the Joint
                  European Conferences on Theory and Practice of Software, {ETAPS} 2005,
                  Edinburgh, UK, April 4-8, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3440},
  pages        = {477--492},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-31980-1\_31},
  doi          = {10.1007/978-3-540-31980-1\_31},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tacas/HardingRS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/GuelevRS06,
  author       = {Dimitar P. Guelev and
                  Mark Dermot Ryan and
                  Pierre{-}Yves Schobbens},
  editor       = {Ranko Lazic and
                  Rajagopal Nagarajan},
  title        = {Synthesising Features by Games},
  booktitle    = {Proceedings of the 5th International Workshop on Automated Verification
                  of Critical Systems, AVoCS 2005, University of Warwick, UK, September
                  12-13, 2005},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {145},
  pages        = {79--93},
  publisher    = {Elsevier},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.entcs.2005.10.006},
  doi          = {10.1016/J.ENTCS.2005.10.006},
  timestamp    = {Thu, 15 Dec 2022 14:59:29 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/GuelevRS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fiw/2005,
  editor       = {Stephan Reiff{-}Marganiec and
                  Mark Ryan},
  title        = {Feature Interactions in Telecommunications and Software Systems VIII,
                  ICFI'05, 28-30 June 2005, Leicester, {UK}},
  publisher    = {{IOS} Press},
  year         = {2005},
  isbn         = {1-58603-524-X},
  timestamp    = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fiw/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/daglib/0017977,
  author       = {Michael Huth and
                  Mark Dermot Ryan},
  title        = {Logic in computer science - modelling and reasoning about systems
                  {(2.} ed.)},
  publisher    = {Cambridge University Press},
  year         = {2004},
  timestamp    = {Mon, 11 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/daglib/0017977.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhangRG04,
  author       = {Nan Zhang and
                  Mark Ryan and
                  Dimitar P. Guelev},
  editor       = {Vijayalakshmi Atluri and
                  Michael Backes and
                  David A. Basin and
                  Michael Waidner},
  title        = {Synthesising verified access control systems in {XACML}},
  booktitle    = {Proceedings of the 2004 {ACM} Workshop on Formal Methods in Security
                  Engineering, {FMSE} 2004, Washington, DC, USA, October 29, 2004},
  pages        = {56--65},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1029133.1029141},
  doi          = {10.1145/1029133.1029141},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhangRG04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/GuelevRS04,
  author       = {Dimitar P. Guelev and
                  Mark Ryan and
                  Pierre{-}Yves Schobbens},
  editor       = {Kan Zhang and
                  Yuliang Zheng},
  title        = {Model-Checking Access Control Policies},
  booktitle    = {Information Security, 7th International Conference, {ISC} 2004, Palo
                  Alto, CA, USA, September 27-29, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3225},
  pages        = {219--230},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30144-8\_19},
  doi          = {10.1007/978-3-540-30144-8\_19},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/GuelevRS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/KremerR05,
  author       = {Steve Kremer and
                  Mark Ryan},
  editor       = {Riccardo Focardi and
                  Gianluigi Zavattaro},
  title        = {Analysing the Vulnerability of Protocols to Produce Known-pair and
                  Chosen-text Attacks},
  booktitle    = {Proceedings of the 2nd International Workshop on Security Issues in
                  Coordination Models, Languages, and Systems, SecCo 2004, London, UK,
                  August 30, 2004},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {128},
  number       = {5},
  pages        = {87--104},
  publisher    = {Elsevier},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.entcs.2004.11.043},
  doi          = {10.1016/J.ENTCS.2004.11.043},
  timestamp    = {Mon, 12 Dec 2022 15:38:22 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/KremerR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/GuelevRS05,
  author       = {Dimitar P. Guelev and
                  Mark Dermot Ryan and
                  Pierre{-}Yves Schobbens},
  editor       = {Michael Huth},
  title        = {Model-checking the Preservation of Temporal Properties upon Feature
                  Integration},
  booktitle    = {Proceedings of the Fouth International Workshop on Automated Verification
                  of Critical Systems, AVoCS 2004, London, UK, September 4, 2004},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {128},
  number       = {6},
  pages        = {311--324},
  publisher    = {Elsevier},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.entcs.2005.04.019},
  doi          = {10.1016/J.ENTCS.2005.04.019},
  timestamp    = {Mon, 11 Sep 2023 15:43:49 +0200},
  biburl       = {https://dblp.org/rec/journals/entcs/GuelevRS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dagstuhl/2003oaf,
  editor       = {Mark Dermot Ryan and
                  John{-}Jules Ch. Meyer and
                  Hans{-}Dieter Ehrich},
  title        = {Objects, Agents, and Features, International Seminar, Dagstuhl Castle,
                  Germany, February 2003, Revised and Invited Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2975},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/b97772},
  doi          = {10.1007/B97772},
  isbn         = {3-540-21989-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/2003oaf.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/MeyerRE03,
  author       = {John{-}Jules Ch. Meyer and
                  Mark Dermot Ryan and
                  Hans{-}Dieter Ehrich},
  editor       = {Mark Dermot Ryan and
                  John{-}Jules Ch. Meyer and
                  Hans{-}Dieter Ehrich},
  title        = {Objects, Agents, and Features: An Introduction},
  booktitle    = {Objects, Agents, and Features, International Seminar, Dagstuhl Castle,
                  Germany, February 2003, Revised and Invited Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2975},
  pages        = {1--7},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-25930-5\_1},
  doi          = {10.1007/978-3-540-25930-5\_1},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/MeyerRE03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fiw/GuelevRS03,
  author       = {Dimitar P. Guelev and
                  Mark Dermot Ryan and
                  Pierre{-}Yves Schobbens},
  editor       = {Daniel Amyot and
                  Luigi Logrippo},
  title        = {Feature Integration as Substitution},
  booktitle    = {Feature Interactions in Telecommunications and Software Systems VII,
                  June 11-13, 2003, Ottawa, Canada},
  pages        = {275--294},
  publisher    = {{IOS} Press},
  year         = {2003},
  timestamp    = {Tue, 16 Nov 2004 09:12:37 +0100},
  biburl       = {https://dblp.org/rec/conf/fiw/GuelevRS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kbse/HarrisR03,
  author       = {Hannah Harris and
                  Mark Ryan},
  title        = {Theoretical Foundations of Updating Systems},
  booktitle    = {18th {IEEE} International Conference on Automated Software Engineering
                  {(ASE} 2003), 6-10 October 2003, Montreal, Canada},
  pages        = {291--294},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/ASE.2003.1240323},
  doi          = {10.1109/ASE.2003.1240323},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/kbse/HarrisR03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/time/HardingRS03,
  author       = {Aidan Harding and
                  Mark Ryan and
                  Pierre{-}Yves Schobbens},
  title        = {Towards Symbolic Strategy Synthesis for {\textbackslash}left{\textbackslash}langle
                  \{{\textbackslash}left{\textbackslash}langle {A} {\textbackslash}right{\textbackslash}rangle
                  \} {\textbackslash}right{\textbackslash}rangle-LTL},
  booktitle    = {10th International Symposium on Temporal Representation and Reasoning
                  / 4th International Conference on Temporal Logic {(TIME-ICTL} 2003),
                  8-10 July 2003, Cairns, Queensland, Australia},
  pages        = {137--146},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/TIME.2003.1214889},
  doi          = {10.1109/TIME.2003.1214889},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/time/HardingRS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/logcom/AndrekaRS02,
  author       = {Hajnal Andr{\'{e}}ka and
                  Mark Ryan and
                  Pierre{-}Yves Schobbens},
  title        = {Operators and Laws for Combining Preference Relations},
  journal      = {J. Log. Comput.},
  volume       = {12},
  number       = {1},
  pages        = {13--53},
  year         = {2002},
  url          = {https://doi.org/10.1093/logcom/12.1.13},
  doi          = {10.1093/LOGCOM/12.1.13},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/logcom/AndrekaRS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sLogica/GorogiannisR02,
  author       = {Nikos Gorogiannis and
                  Mark Ryan},
  title        = {Implementation of Belief Change Operators Using BDDs},
  journal      = {Stud Logica},
  volume       = {70},
  number       = {1},
  pages        = {131--156},
  year         = {2002},
  url          = {https://doi.org/10.1023/A:1014610426691},
  doi          = {10.1023/A:1014610426691},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sLogica/GorogiannisR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecai/HarrisR02,
  author       = {Hannah Harris and
                  Mark Ryan},
  editor       = {Frank van Harmelen},
  title        = {Feature Integration as an Operation of Theory Change},
  booktitle    = {Proceedings of the 15th European Conference on Artificial Intelligence,
                  ECAI'2002, Lyon, France, July 2002},
  pages        = {546--550},
  publisher    = {{IOS} Press},
  year         = {2002},
  timestamp    = {Mon, 03 Jan 2022 07:50:19 +0100},
  biburl       = {https://dblp.org/rec/conf/ecai/HarrisR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vmcai/HardingRS02,
  author       = {Aidan Harding and
                  Mark Ryan and
                  Pierre{-}Yves Schobbens},
  editor       = {Agostino Cortesi},
  title        = {Approximating ATL\({}^{\mbox{*}}\) in {ATL}},
  booktitle    = {Verification, Model Checking, and Abstract Interpretation, Third International
                  Workshop, {VMCAI} 2002, Venice, Italy, January 21-22, 2002, Revised
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2294},
  pages        = {289--301},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-47813-2\_20},
  doi          = {10.1007/3-540-47813-2\_20},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vmcai/HardingRS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/GorogiannisR02,
  author       = {Nikos Gorogiannis and
                  Mark Ryan},
  editor       = {Ruy J. G. B. de Queiroz and
                  Luiz Carlos Pereira and
                  Edward Hermann Haeusler},
  title        = {Requirements, specifications, and minimal refinement},
  booktitle    = {9th Workhop on Logic, Language, Information and Computation, WoLLIC
                  2002, Rio de Janeiro, Brazil, July 30 - August 2, 2002},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {67},
  pages        = {218--232},
  publisher    = {Elsevier},
  year         = {2002},
  url          = {https://doi.org/10.1016/S1571-0661(04)80550-4},
  doi          = {10.1016/S1571-0661(04)80550-4},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/GorogiannisR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scp/PlathR01,
  author       = {Malte Plath and
                  Mark Ryan},
  title        = {Feature integration using a feature construct},
  journal      = {Sci. Comput. Program.},
  volume       = {41},
  number       = {1},
  pages        = {53--84},
  year         = {2001},
  url          = {https://doi.org/10.1016/S0167-6423(00)00018-6},
  doi          = {10.1016/S0167-6423(00)00018-6},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scp/PlathR01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atal/RyanS01,
  author       = {Mark Ryan and
                  Pierre{-}Yves Schobbens},
  editor       = {John{-}Jules Ch. Meyer and
                  Milind Tambe},
  title        = {Agents and Roles: Refinement in Alternating-Time Temporal Logic},
  booktitle    = {Intelligent Agents VIII, 8th International Workshop, {ATAL} 2001 Seattle,
                  WA, USA, August 1-3, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2333},
  pages        = {100--114},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45448-9\_8},
  doi          = {10.1007/3-540-45448-9\_8},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/atal/RyanS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fireworks/2000,
  editor       = {Stephen Gilmore and
                  Mark Ryan},
  title        = {Language Constructs for Describing Features, Proceedings of the FIREworks
                  Workshop, Glasgow, UK, May 2000},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/978-1-4471-0287-8},
  doi          = {10.1007/978-1-4471-0287-8},
  isbn         = {978-1-85233-392-8},
  timestamp    = {Tue, 12 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fireworks/2000.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/movep/2000,
  editor       = {Franck Cassez and
                  Claude Jard and
                  Brigitte Rozoy and
                  Mark Dermot Ryan},
  title        = {Modeling and Verification of Parallel Processes, 4th Summer School,
                  {MOVEP} 2000, Nantes, France, June 19-23, 2000},
  series       = {Lecture Notes in Computer Science},
  volume       = {2067},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45510-8},
  doi          = {10.1007/3-540-45510-8},
  isbn         = {3-540-42787-2},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/movep/2000.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/daglib/0000773,
  author       = {Michael Huth and
                  Mark Dermot Ryan},
  title        = {Logic in computer science - modelling and reasoning about systems},
  publisher    = {Cambridge University Press},
  year         = {2000},
  isbn         = {978-0-521-65602-3},
  timestamp    = {Mon, 11 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/daglib/0000773.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tocl/LomuscioMR00,
  author       = {Alessio Lomuscio and
                  Ron van der Meyden and
                  Mark Ryan},
  title        = {Knowledge in multiagent systems: initial configurations and broadcast},
  journal      = {{ACM} Trans. Comput. Log.},
  volume       = {1},
  number       = {2},
  pages        = {247--284},
  year         = {2000},
  url          = {https://doi.org/10.1145/359496.359527},
  doi          = {10.1145/359496.359527},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tocl/LomuscioMR00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fireworks/CassezRS00,
  author       = {Franck Cassez and
                  Mark Dermot Ryan and
                  Pierre{-}Yves Schobbens},
  editor       = {Stephen Gilmore and
                  Mark Ryan},
  title        = {Proving feature non-interaction with Alternating-Time Temporal Logic},
  booktitle    = {Language Constructs for Describing Features, Proceedings of the FIREworks
                  Workshop, Glasgow, UK, May 2000},
  pages        = {85--103},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/978-1-4471-0287-8\_6},
  doi          = {10.1007/978-1-4471-0287-8\_6},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fireworks/CassezRS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fireworks/PlathR00,
  author       = {Malte Plath and
                  Mark Dermot Ryan},
  editor       = {Stephen Gilmore and
                  Mark Ryan},
  title        = {Defining Features for {CSP:} Reflections on the Feature Interaction
                  Contest},
  booktitle    = {Language Constructs for Describing Features, Proceedings of the FIREworks
                  Workshop, Glasgow, UK, May 2000},
  pages        = {163--175},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/978-1-4471-0287-8\_10},
  doi          = {10.1007/978-1-4471-0287-8\_10},
  timestamp    = {Tue, 12 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fireworks/PlathR00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fiw/PlathR00,
  author       = {Malte Plath and
                  Mark Dermot Ryan},
  editor       = {Muffy Calder and
                  Evan H. Magill},
  title        = {The feature construct for {SMV:} Semantics},
  booktitle    = {Feature Interactions in Telecommunications and Software Systems VI,
                  May 17-19, 2000, Glasgow, Scotland, {UK}},
  pages        = {129--144},
  publisher    = {{IOS} Press},
  year         = {2000},
  timestamp    = {Tue, 16 Nov 2004 09:12:33 +0100},
  biburl       = {https://dblp.org/rec/conf/fiw/PlathR00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/aiedam/LomuscioR99,
  author       = {Alessio Lomuscio and
                  Mark Ryan},
  title        = {An algorithmic approach to knowledge evolution},
  journal      = {Artif. Intell. Eng. Des. Anal. Manuf.},
  volume       = {13},
  number       = {2},
  pages        = {119--132},
  year         = {1999},
  url          = {http://journals.cambridge.org/action/displayAbstract?aid=38693},
  timestamp    = {Thu, 24 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/aiedam/LomuscioR99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atal/LomuscioR99,
  author       = {Alessio Lomuscio and
                  Mark Ryan},
  editor       = {Nicholas R. Jennings and
                  Yves Lesp{\'{e}}rance},
  title        = {A Spectrum of Modes of Knowledge Sharing between Agents},
  booktitle    = {Intelligent Agents VI, Agent Theories, Architectures, and Languages
                  (ATAL), 6th International Workshop, {ATAL} '99, Orlando, Florida,
                  USA, July 15-17, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1757},
  pages        = {13--26},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/10719619\_2},
  doi          = {10.1007/10719619\_2},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/atal/LomuscioR99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/probmiv/1998,
  editor       = {Christel Baier and
                  Michael Huth and
                  Marta Z. Kwiatkowska and
                  Mark Ryan},
  title        = {First International Workshop on Probabilistic Methods in Verification,
                  {PROBMIV} 1998, Indianapolis, Indiana, USA, June 19-20, 1998},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {22},
  publisher    = {Elsevier},
  year         = {1999},
  url          = {https://www.sciencedirect.com/journal/electronic-notes-in-theoretical-computer-science/vol/22/suppl/C},
  timestamp    = {Mon, 11 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/probmiv/1998.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/cs-LO-9909019,
  author       = {Alessio Lomuscio and
                  Ron van der Meyden and
                  Mark Ryan},
  title        = {Knowledge in Multi-Agent Systems: Initial Configurations and Broadcast},
  journal      = {CoRR},
  volume       = {cs.LO/9909019},
  year         = {1999},
  url          = {https://arxiv.org/abs/cs/9909019},
  timestamp    = {Fri, 10 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/cs-LO-9909019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecai/LomuscioR98,
  author       = {Alessio Lomuscio and
                  Mark Ryan},
  editor       = {Henri Prade},
  title        = {Ideal Agents Sharing (some!) Knowledge},
  booktitle    = {13th European Conference on Artificial Intelligence, Brighton, UK,
                  August 23-28 1998, Proceedings.},
  pages        = {557--561},
  publisher    = {John Wiley and Sons},
  year         = {1998},
  timestamp    = {Wed, 31 Jul 2019 08:45:03 +0200},
  biburl       = {https://dblp.org/rec/conf/ecai/LomuscioR98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fiw/PlathR98,
  author       = {Malte Plath and
                  Mark Dermot Ryan},
  editor       = {Kristofer Kimbler and
                  Wiet Bouma},
  title        = {Plug-and-play Features},
  booktitle    = {Feature Interactions in Telecommunications and Software Systems V,
                  September 29 - October 1, 1998, Malm{\"{o}}, Sweden},
  pages        = {150--164},
  publisher    = {{IOS} Press},
  year         = {1998},
  timestamp    = {Tue, 16 Nov 2004 09:41:16 +0100},
  biburl       = {https://dblp.org/rec/conf/fiw/PlathR98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tssdv/Plath098,
  author       = {Malte Plath and
                  Mark Ryan},
  editor       = {Rudolf Berghammer and
                  Yassine Lakhnech},
  title        = {{SFI:} a Feature Integration Tool},
  booktitle    = {Proceedings of the International Workshop Tool Support for System
                  Specification, Development and Verification, Malente, Germany, June
                  1-4, 1998},
  series       = {Advances in computing science},
  pages        = {201--216},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/978-3-7091-6355-9\_15},
  doi          = {10.1007/978-3-7091-6355-9\_15},
  timestamp    = {Mon, 04 May 2020 10:40:23 +0200},
  biburl       = {https://dblp.org/rec/conf/tssdv/Plath098.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/BaierHKR99,
  author       = {Christel Baier and
                  Michael Huth and
                  Marta Z. Kwiatkowska and
                  Mark Ryan},
  editor       = {Christel Baier and
                  Michael Huth and
                  Marta Z. Kwiatkowska and
                  Mark Ryan},
  title        = {Preface},
  booktitle    = {First International Workshop on Probabilistic Methods in Verification,
                  {PROBMIV} 1998, Indianapolis, Indiana, USA, June 19-20, 1998},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {22},
  pages        = {1--2},
  publisher    = {Elsevier},
  year         = {1998},
  url          = {https://doi.org/10.1016/S1571-0661(05)80593-6},
  doi          = {10.1016/S1571-0661(05)80593-6},
  timestamp    = {Mon, 11 Sep 2023 15:43:49 +0200},
  biburl       = {https://dblp.org/rec/journals/entcs/BaierHKR99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jolli/RyanS97,
  author       = {Mark Ryan and
                  Pierre{-}Yves Schobbens},
  title        = {Counterfactuals and Updates as Inverse Modalities},
  journal      = {J. Log. Lang. Inf.},
  volume       = {6},
  number       = {2},
  pages        = {123--146},
  year         = {1997},
  url          = {https://doi.org/10.1023/A:1008218502162},
  doi          = {10.1023/A:1008218502162},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jolli/RyanS97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ker/dInvernoFLLRRW97,
  author       = {Mark d'Inverno and
                  Michael Fisher and
                  Alessio Lomuscio and
                  Michael Luck and
                  Maarten de Rijke and
                  Mark Ryan and
                  Michael J. Wooldridge},
  title        = {Formalisms for multi-agent systems},
  journal      = {Knowl. Eng. Rev.},
  volume       = {12},
  number       = {3},
  pages        = {315--321},
  year         = {1997},
  url          = {https://doi.org/10.1017/S0269888997003068},
  doi          = {10.1017/S0269888997003068},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ker/dInvernoFLLRRW97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ausai/LomuscioR97,
  author       = {Alessio Lomuscio and
                  Mark Ryan},
  editor       = {Wayne Wobcke and
                  Maurice Pagnucco and
                  Chengqi Zhang},
  title        = {On the Relation between Interpreted Systems and Kripke Models},
  booktitle    = {Agents and Multi-Agent Systems Formalisms, Methodologies, and Applications,
                  Based on the AI'97 Workshops on Commonsense Reasoning, Intelligent
                  Agents, and Distributed Artificial Intelligence, Perth, Australia,
                  December 1, 1997},
  series       = {Lecture Notes in Computer Science},
  volume       = {1441},
  pages        = {46--59},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0055019},
  doi          = {10.1007/BFB0055019},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ausai/LomuscioR97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/BaierCHKR97,
  author       = {Christel Baier and
                  Edmund M. Clarke and
                  Vasiliki Hartonas{-}Garmhausen and
                  Marta Z. Kwiatkowska and
                  Mark Ryan},
  editor       = {Pierpaolo Degano and
                  Roberto Gorrieri and
                  Alberto Marchetti{-}Spaccamela},
  title        = {Symbolic Model Checking for Probabilistic Processes},
  booktitle    = {Automata, Languages and Programming, 24th International Colloquium,
                  ICALP'97, Bologna, Italy, 7-11 July 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1256},
  pages        = {430--440},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/3-540-63165-8\_199},
  doi          = {10.1007/3-540-63165-8\_199},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icalp/BaierCHKR97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecai/RyanS96,
  author       = {Mark Ryan and
                  Pierre{-}Yves Schobbens},
  editor       = {Wolfgang Wahlster},
  title        = {Intertranslating Counterfactuals and Updates},
  booktitle    = {12th European Conference on Artificial Intelligence, Budapest, Hungary,
                  August 11-16, 1996, Proceedings},
  pages        = {100--104},
  publisher    = {John Wiley and Sons, Chichester},
  year         = {1996},
  timestamp    = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecai/RyanS96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwssd/FinkelsteiinS096,
  author       = {Anthony Finkelsteiin and
                  George Spanoudakis and
                  Mark Ryan},
  title        = {Software Package Requirements and Procurement},
  booktitle    = {Proceedings of the 8th International Workshop on Software Specification
                  and Design, {IWSSD} 1996, USA, March 22-23, 1996},
  pages        = {141--145},
  publisher    = {{IEEE} Computer Society},
  year         = {1996},
  url          = {https://dl.acm.org/doi/10.5555/857204.858284},
  doi          = {10.5555/857204.858284},
  timestamp    = {Wed, 18 May 2022 15:05:33 +0200},
  biburl       = {https://dblp.org/rec/conf/iwssd/FinkelsteiinS096.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tark/RyanSR96,
  author       = {Mark Ryan and
                  Pierre{-}Yves Schobbens and
                  Odinaldo Rodrigues},
  editor       = {Yoav Shoham},
  title        = {Counterfactuals and Updates as Inverse Modalities},
  booktitle    = {Proceedings of the Sixth Conference on Theoretical Aspects of Rationality
                  and Knowledge, De Zeeuwse Stromen, The Netherlands, March 17-20 1996},
  pages        = {163--173},
  publisher    = {Morgan Kaufmann},
  year         = {1996},
  timestamp    = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tark/RyanSR96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:conf/lai/Ryan96,
  author       = {Mark Ryan},
  editor       = {Andr{\'{e}} Fuhrmann and
                  Hans Rott},
  title        = {Belief Revision and Ordered Theory Presentations},
  booktitle    = {Logic, Action, and Information - Essays on Logic in Philosophy and
                  Artificial Intelligence. Walter de Gruyter, Berlin, New York, 1996
                  (Based on a meeting held in autumn 1992 in Konstanz, Germany)},
  pages        = {129--151},
  publisher    = {De Gruyter},
  year         = {1996},
  timestamp    = {Mon, 05 Oct 2020 12:53:08 +0200},
  biburl       = {https://dblp.org/rec/conf/lai/Ryan96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ndjfl/RyanS95,
  author       = {Mark Ryan and
                  Pierre{-}Yves Schobbens},
  title        = {Belief Revision and Verisimilitude},
  journal      = {Notre Dame J. Formal Log.},
  volume       = {36},
  number       = {1},
  pages        = {15--29},
  year         = {1995},
  url          = {https://doi.org/10.1305/ndjfl/1040308826},
  doi          = {10.1305/NDJFL/1040308826},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ndjfl/RyanS95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/epia/PoliRS95,
  author       = {Riccardo Poli and
                  Mark Ryan and
                  Aaron Sloman},
  editor       = {Carlos A. Pinto{-}Ferreira and
                  Nuno J. Mamede},
  title        = {A New Continuous Propositional Logic},
  booktitle    = {Progress in Artificial Intelligence, 7th Portuguese Conference on
                  Artificial Intelligence, {EPIA} '95, Funchal, Madeira Island, Portugal,
                  October 3-6, 1995, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {990},
  pages        = {17--28},
  publisher    = {Springer},
  year         = {1995},
  url          = {https://doi.org/10.1007/3-540-60428-6\_2},
  doi          = {10.1007/3-540-60428-6\_2},
  timestamp    = {Tue, 14 May 2019 10:00:41 +0200},
  biburl       = {https://dblp.org/rec/conf/epia/PoliRS95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amai/Ryan93,
  author       = {Mark Ryan},
  title        = {Towards Specifying Norms},
  journal      = {Ann. Math. Artif. Intell.},
  volume       = {9},
  number       = {1-2},
  pages        = {49--68},
  year         = {1993},
  url          = {https://doi.org/10.1007/BF01531261},
  doi          = {10.1007/BF01531261},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/amai/Ryan93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imperial/Ryan93,
  author       = {Mark Ryan},
  editor       = {Geoffrey Livingston Burn and
                  Simon J. Gay and
                  Mark Ryan},
  title        = {Prioritising Preference Relations},
  booktitle    = {Theory and Formal Methods 1993, Proceedings of the First Imperial
                  College Department of Computing Workshop on Theory and Formal Methods,
                  Isle of Thorns Conference Centre, Chelwood Gate, Sussex, UK, 29-31
                  March 1993},
  series       = {Workshops in Computing},
  pages        = {265--275},
  publisher    = {Springer},
  year         = {1993},
  timestamp    = {Mon, 31 Oct 2022 11:04:42 +0100},
  biburl       = {https://dblp.org/rec/conf/imperial/Ryan93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/re/Ryan93,
  author       = {Mark Ryan},
  title        = {Defaults in specifications},
  booktitle    = {Proceedings of {IEEE} International Symposium on Requirements Engineering,
                  {RE} 1993, San Diego, California, USA, January 4-6, 1993},
  pages        = {142--149},
  publisher    = {{IEEE} Computer Society},
  year         = {1993},
  url          = {https://doi.org/10.1109/ISRE.1993.324823},
  doi          = {10.1109/ISRE.1993.324823},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/re/Ryan93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/imperial/1993,
  editor       = {Geoffrey Livingston Burn and
                  Simon J. Gay and
                  Mark Ryan},
  title        = {Theory and Formal Methods 1993, Proceedings of the First Imperial
                  College Department of Computing Workshop on Theory and Formal Methods,
                  Isle of Thorns Conference Centre, Chelwood Gate, Sussex, UK, 29-31
                  March 1993},
  series       = {Workshops in Computing},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/978-1-4471-3503-6},
  doi          = {10.1007/978-1-4471-3503-6},
  isbn         = {3-540-19842-3},
  timestamp    = {Mon, 31 Oct 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/imperial/1993.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kr/Ryan92,
  author       = {Mark Ryan},
  editor       = {Bernhard Nebel and
                  Charles Rich and
                  William R. Swartout},
  title        = {Representing Defaults as Sentences with Reduced Priority},
  booktitle    = {Proceedings of the 3rd International Conference on Principles of Knowledge
                  Representation and Reasoning (KR'92). Cambridge, MA, USA, October
                  25-29, 1992},
  pages        = {649--660},
  publisher    = {Morgan Kaufmann},
  year         = {1992},
  timestamp    = {Wed, 09 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/kr/Ryan92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lics/Ryan91,
  author       = {Mark Ryan},
  title        = {Defaults and Revision in Structured Theories},
  booktitle    = {Proceedings of the Sixth Annual Symposium on Logic in Computer Science
                  {(LICS} '91), Amsterdam, The Netherlands, July 15-18, 1991},
  pages        = {362--373},
  publisher    = {{IEEE} Computer Society},
  year         = {1991},
  url          = {https://doi.org/10.1109/LICS.1991.151660},
  doi          = {10.1109/LICS.1991.151660},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lics/Ryan91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tacs/RyanFM91,
  author       = {Mark Ryan and
                  Jos{\'{e}} Luiz Fiadeiro and
                  T. S. E. Maibaum},
  editor       = {Takayasu Ito and
                  Albert R. Meyer},
  title        = {Sharing Actions and Attributes in Modal Action Logic},
  booktitle    = {Theoretical Aspects of Computer Software, International Conference
                  {TACS} '91, Sendai, Japan, September 24-27, 1991, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {526},
  pages        = {569--593},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/3-540-54415-1\_65},
  doi          = {10.1007/3-540-54415-1\_65},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tacs/RyanFM91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics