Recent publications
Article
Arapinis, M, Mancini, LI, Ritter, E & Ryan, MD 2017, 'Analysis of privacy in mobile telephony systems', International Journal of Information Security, vol. 16, no. 5, pp. 491–523. https://doi.org/10.1007/s10207-016-0338-9
Conference article
Li, R, Wang, Q, Wang, Q, Galindo, D & Ryan, M 2022, 'SoK: TEE-assisted confidential smart contract', Proceedings on Privacy Enhancing Technologies, vol. 2022, no. 3, pp. 711-731. https://doi.org/10.56553/popets-2022-0093
Conference contribution
Zhang, M, Marin, E, Ryan, M, Kostakos, V, Murray, T, Tag, B & Oswald, D 2024, OOBKey: Key Exchange with Implantable Medical Devices Using Out-Of-Band Channels. in 2024 21st Annual International Conference on Privacy, Security and Trust (PST). Annual International Conference on Privacy, Security and Trust, IEEE.
Moreira-Sanchez, J, Ryan, M & Garcia, F 2022, Protocols for a two-tiered trusted computing base. in V Atluri, R Di Pietro, C D. Jensen & W Meng (eds), Computer Security – ESORICS 2022: 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26–30, 2022, Proceedings, Part III. 1 edn, Lecture Notes in Computer Science, vol. 13556, Springer, Cham, pp. 229–249, 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, 26/09/22. https://doi.org/10.1007/978-3-031-17143-7_12
Laing, T, Marin, E, Ryan, MD, Schiffman, J & Wattiau, G 2022, Symbolon: Enabling Flexible Multi-device-based User Authentication. in 2022 IEEE Conference on Dependable and Secure Computing (DSC)., 9888854, IEEE Conference on Dependable and Secure Computing, Institute of Electrical and Electronics Engineers (IEEE), 5th IEEE Conference on Dependable and Secure Computing, DSC 2022, Edinburgh, United Kingdom, 22/06/22. https://doi.org/10.1109/DSC54232.2022.9888854
Fotiadis, G, Moreira-Sanchez, J, Giannetsos, T, Chen, L, Ronne, PB, Ryan, M & Ryan, PYA 2021, Root-of-trust abstractions for symbolic analysis: application to attestation protocols. in R Roman & J Zhou (eds), Security and Trust Management: 17th International Workshop, STM 2021, Darmstadt, Germany, October 8, 2021, Proceedings. 1 edn, Lecture Notes in Computer Science, vol. 13075, Springer, Cham, pp. 163-184. https://doi.org/10.1007/978-3-030-91859-0_9
Singh, RR, Moreira-Sanchez, J, Chothia, T & Ryan, M 2020, Modelling of 802.11 4-Way Handshake Attacks and Analysis of Security Properties. in STM 2020: Security and Trust Management . Springer, pp. 3. https://doi.org/10.1007/978-3-030-59817-4_1
Oxford, M, Parker, D & Ryan, M 2020, Quantitative Verification of Certificate Transparency Gossip Protocols. in Proceedings of 6th International Workshop on Security and Privacy in the Cloud (SPC'20). IEEE Computer Society Press, 6th International Workshop on Security and Privacy in the Cloud (SPC'20), Virtual event, 29/06/20.
Ordean, M, Ryan, M & Galindo Chacon, D 2019, CAOS: Concurrent-Access Obfuscated Store. in Proceedings of the 24th ACM Symposium on Access Control Models and Technologies (SACMAT 2019). Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT, Association for Computing Machinery (ACM), pp. 13-24, 24th ACM Symposium on Access Control Models and Technologies, Toronto, Ontario, Canada, 4/06/19. https://doi.org/10.1145/3322431.3325101
Denzel, M, Ryan, M & Ritter, E 2018, A Malware-Tolerant, Self-Healing Industrial Control System Framework. in S De Capitani di Vimercati & F Martinelli (eds), ICT Systems Security and Privacy Protection: 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings. IFIP Advances in Information and Communication Technology , vol. 502, Springer, pp. 46-60, 32nd International Conference on ICT Systems Security and Privacy Protection (IFIP SEC 2017), Rome, Italy, 29/05/17. https://doi.org/10.1007/978-3-319-58469-0_4
Denzel, M & Ryan, M 2018, Malware Tolerant (Mesh-) Networks. in Proceedings of the 17th International Conference on Cryptology And Network Security (CANS 2018) . Lecture Notes in Computer Science, vol. 11124, Springer, pp. 133-153, 17th International Conference on Cryptology And Network Security (CANS 2018) , Naples, Italy, 30/09/18. https://doi.org/10.1007/978-3-030-00434-7_7
Yu, J, Ryan, M & Chen, L 2017, Authenticating compromisable storage systems. in Proceedings of 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-17). IEEE Computer Society Press, 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-17), Sydney, Australia, 1/08/17. https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.216
Milner, K, Cremers, C, Yu, J & Ryan, M 2017, Automatically Detecting the Misuse of Secrets: Foundations, Design Principles, and Applications. in Proceedings - IEEE 30th Computer Security Foundations Symposium, CSF 2017., 8049721, Proceedings - IEEE Computer Security Foundations Symposium, IEEE Computer Society Press, pp. 203-216, 30th IEEE Computer Security Foundations Symposium, CSF 2017, Santa Barbara, United States, 21/08/17. https://doi.org/10.1109/CSF.2017.21
Preprint
Zhang, C, Yang, X, Oswald, D, Ryan, M & Jovanovic, P 2024 'Eva: Efficient IVC-Based Authentication of Lossy-Encoded Videos' Cryptology ePrint Archive. <https://eprint.iacr.org/2024/1436>
Cheval, V, Moreira, J & Ryan, M 2023 'Automatic verification of transparency protocols (extended version)' arXiv. https://doi.org/10.48550/arXiv.2303.04500
View all publications in research portal