His primary areas of study are Computer security, Theoretical computer science, Pi calculus, Context and Electronic voting. The study of Computer security is intertwined with the study of Cloud computing in a number of ways. Specifically, his work in Theoretical computer science is concerned with the study of Automated reasoning.
His Context study deals with Software intersecting with HeliOS, Bulletin board, Formalism, Homomorphic encryption and Feature. His Electronic voting study is related to the wider topic of Voting. The Access control study which covers Intrusion detection system that intersects with Model checking.
Mark Ryan mainly focuses on Computer security, Theoretical computer science, Internet privacy, Protocol and Artificial intelligence. Computer security connects with themes related to Electronic voting in his study. The concepts of his Electronic voting study are interwoven with issues in Pi calculus and Observational equivalence.
His studies deal with areas such as Programming language, Formal methods and State as well as Theoretical computer science. His work deals with themes such as Escrow and Certificate authority, which intersect with Internet privacy. His work is dedicated to discovering how Feature, Model checking are connected with Access control and other disciplines.
Mark Ryan focuses on Computer security, Protocol, Acute coronary syndrome, Computer network and Malware. His Computer security research is multidisciplinary, incorporating elements of Gas meter prover and Order. His Protocol research includes elements of Key, Secure messaging, Trusted hardware and Transparency.
As a part of the same scientific study, he usually deals with the Acute coronary syndrome, concentrating on Concordance and frequently concerns with Percutaneous coronary intervention, Heart failure and Stroke. His Malware research integrates issues from Key management, Industrial control system and Internet protocol suite. His biological study spans a wide range of topics, including Guard, Cryptovirology, Communication source, Electronic voting and Private network.
Mark Ryan mostly deals with Computer security, Protocol, Internet privacy, Certificate authority and Public-key cryptography. His Computer security research includes themes of Construct and Order. His work carried out in the field of Protocol brings together such families of science as Pseudonym, Countermeasure, Cryptography, Point and Encryption.
His Internet privacy research is multidisciplinary, incorporating perspectives in Root certificate, Public key certificate, Public key infrastructure, Self-signed certificate and Focus. The various areas that he examines in his Certificate authority study include Cryptographic protocol, Smart card, Threat model and Transport Layer Security. Mark Ryan combines subjects such as Secure messaging, Transparency, Malware and Key with his study of Public-key cryptography.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Logic in Computer Science: Modelling and Reasoning about Systems
Michael R. A. Huth;Mark Ryan.
Cloud computing security
Mark D. Ryan.
Journal of Systems and Software (2013)
Verifying privacy-type properties of electronic voting protocols
Stéphanie Delaune;Steve Kremer;Mark Ryan.
Journal of Computer Security (2009)
Analysis of an electronic voting protocol in the applied pi calculus
Steve Kremer;Mark Ryan.
european symposium on programming (2005)
Cloud computing privacy concerns on our doorstep
Mark D. Ryan.
Communications of The ACM (2011)
Election verifiability in electronic voting protocols
Steve Kremer;Mark Ryan;Ben Smyth.
european symposium on research in computer security (2010)
Symbolic Model Checking for Probabilistic Processes
Christel Baier;Edmund M. Clarke;Vassili Hartonas-Garmhausen;Marta Z. Kwiatkowska.
international colloquium on automata languages and programming (1997)
Coercion-resistance and receipt-freeness in electronic voting
S. Delaune;S. Kremer;M. Ryan.
ieee computer security foundations symposium (2006)
New privacy issues in mobile telephony: fix and verification
Myrto Arapinis;Loretta Mancini;Eike Ritter;Mark Ryan.
computer and communications security (2012)
Enhanced Certificate Transparency and End-to-End Encrypted Mail.
Mark Dermot Ryan.
network and distributed system security symposium (2014)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: