References of "Ryan, Mark"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailDECIM: Detecting Endpoint Compromise In Messaging
Yu, Jiangshan UL; Ryan, Mark; Cremers, Cas

in IEEE Transactions on Information Forensics and Security (2018)

Detailed reference viewed: 372 (63 UL)
Full Text
Peer Reviewed
See detailChapter 7: Evaluating web PKIs
Yu, Jiangshan UL; Ryan, Mark

in Software Architecture for Big Data and the Cloud, 1st Edition, Chapter 7, June 2017. (2017)

Detailed reference viewed: 64 (8 UL)
Full Text
Peer Reviewed
See detailAuthenticating compromisable storage systems
Yu, Jiangshan UL; Ryan, Mark; Chen, Liqun

in The 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (2017)

Detailed reference viewed: 109 (8 UL)
Full Text
Peer Reviewed
See detailAutomatically Detecting the Misuse of Secrets: Foundations, Design Principles, and Applications
Milner, Kevin; Cremers, Cas; Yu, Jiangshan UL et al

in 30th IEEE Computer Security Foundations Symposium (2017)

Detailed reference viewed: 139 (14 UL)
Full Text
Peer Reviewed
See detailDTKI: A New Formalized PKI with Verifiable Trusted Parties
Yu, Jiangshan UL; Cheval, Vincent; Ryan, Mark

in Computer Journal (2016), 59(11), 1695--1713

Detailed reference viewed: 127 (14 UL)