Logic in Computer Science: Modelling and reasoning about systems M Huth, M Ryan Cambridge Univ Pr, 2004 | 2455 | 2004 |
Verifying properties of electronic voting protocols S Delaune in " Proceedings of the IAVoSS Workshop On Trustworthy Elections (WOTE’06, 2006 | 437* | 2006 |
Cloud computing security: The scientific challenge, and a survey of solutions MD Ryan Journal of Systems and Software 86 (9), 2263-2268, 2013 | 368 | 2013 |
Analysis of an electronic voting protocol in the applied pi calculus S Kremer, M Ryan European Symposium on Programming, 186-200, 2005 | 333 | 2005 |
Cloud computing privacy concerns on our doorstep MD Ryan Communications of the ACM 54 (1), 36-38, 2011 | 279 | 2011 |
Election verifiability in electronic voting protocols S Kremer, M Ryan, B Smyth Computer Security–ESORICS 2010: 15th European Symposium on Research in …, 2010 | 246 | 2010 |
Symbolic model checking for probabilistic processes C Baier, EM Clarke, V Hartonas-Garmhausen, M Kwiatkowska, M Ryan Automata, Languages and Programming: 24th International Colloquium, ICALP'97 …, 1997 | 245 | 1997 |
New privacy issues in mobile telephony: fix and verification M Arapinis, L Mancini, E Ritter, M Ryan, N Golde, K Redon, R Borgaonkar Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 239 | 2012 |
Enhanced certificate transparency and end-to-end encrypted mail MD Ryan Cryptology ePrint Archive, 2013 | 232 | 2013 |
Coercion-resistance and receipt-freeness in electronic voting S Delaune, S Kremer, M Ryan 19th IEEE Computer Security Foundations Workshop (CSFW'06), 12 pp.-42, 2006 | 224 | 2006 |
Analysing unlinkability and anonymity using the applied pi calculus M Arapinis, T Chothia, E Ritter, M Ryan 2010 23rd IEEE computer security foundations symposium, 107-121, 2010 | 185 | 2010 |
Feature integration using a feature construct M Plath, M Ryan Science of Computer Programming 41 (1), 53-84, 2001 | 181 | 2001 |
Operators and laws for combining preference relations H Andréka, M Ryan, PY Schobbens Journal of logic and computation 12 (1), 13-53, 2002 | 162 | 2002 |
Evaluating access control policies through model checking N Zhang, M Ryan, DP Guelev Information Security: 8th International Conference, ISC 2005, Singapore …, 2005 | 154 | 2005 |
Weather information delivery systems and methods providing planning functionality and navigational tools M Ryan, J Fennell, J Pearson US Patent 7,185,044, 2007 | 147 | 2007 |
Logic in Computer Science: Modelling and Reasoning about Systems. Texts in Theoretical Computer Science M Huth, M Ryan Cambridge University Press,, 2004 | 139 | 2004 |
Sharing actions and attributes in modal action logic M Ryan, J Fiadeiro, T Maibaum Theoretical Aspects of Computer Software: International Conference TACS'91 …, 1991 | 138 | 1991 |
Software package requirements and procurement A Finkelstein, G Spanoudakis, M Ryan Proceedings of the 8th international workshop on software specification and …, 1996 | 124 | 1996 |
Rehabilitation after hip femoroacetabular impingement arthroscopy. M Wahoff, M Ryan Clinics in sports medicine 30 (2), 463-482, 2011 | 122 | 2011 |
Formalisms for multi-agent systems M d'Inverno, M Fisher, A Lomuscio, M Luck, M De Rijke, M Ryan, ... The Knowledge Engineering Review 12 (3), 315-321, 1997 | 118 | 1997 |