Παρακολούθηση
Bill Roscoe (A.W. Roscoe)
Bill Roscoe (A.W. Roscoe)
Emeritus Professor of Computer Science, Oxford University
Η διεύθυνση ηλεκτρονικού ταχυδρομείου έχει επαληθευτεί στον τομέα cs.ox.ac.uk - Αρχική σελίδα
Τίτλος
Παρατίθεται από
Παρατίθεται από
Έτος
The Theory and Practice of Concurrency. international series in computer science
AW Roscoe
Prentice-Hall, 1997
2977*1997
A theory of communicating sequential processes
SD Brookes, CAR Hoare, AW Roscoe
Journal of the ACM (JACM) 31 (3), 560-599, 1984
18341984
Modelling and Analysis of Security Protocols: the CSP approach
P Ryan, S Schneider, M Goldsmith, G Lowe, AW Roscoe
Addison Wesley, 2001
8482001
A timed model for communicating sequential processes
GM Reed, AW Roscoe
International Colloquium on Automata, Languages, and Programming, 314-323, 1986
7861986
Laws of programming
CAR Hoare, IJ Hayes, H Jifeng, CC Morgan, AW Roscoe, JW Sanders, ...
Communications of the ACM 30 (8), 672-686, 1987
6161987
Understanding concurrent systems
AW Roscoe
Springer-Verlag New York Inc, 2010
5202010
Model− checking CSP
B Roscoe
A classical Mind, Essays in honour of C.A.R. Hoare, 1994
4671994
Reguard: finding reentrancy bugs in smart contracts
C Liu, H Liu, Z Cao, Z Chen, B Chen, B Roscoe
Proceedings of the 40th International Conference on Software Engineering …, 2018
4012018
An improved failures model for communicating processes
SD Brookes, AW Roscoe
International Conference on Concurrency, 281-305, 1984
3831984
FDR3—A Modern Refinement Checker for CSP
T Gibson-Robinson, P Armstrong, A Boulgakov, AW Roscoe
TACAS, 2014
3662014
The laws of occam programming
AW Roscoe, CAR Hoare
Theoretical Computer Science 60 (2), 177-229, 1988
3571988
Modelling and verifying key-exchange protocols using CSP and FDR
AW Roscoe
Proceedings The Eighth IEEE Computer Security Foundations Workshop, 98-107, 1995
3211995
Using CSP to detect errors in the TMN protocol
G Lowe, AW Roscoe
Software Engineering, IEEE Transactions on 23 (10), 659-669, 1997
3131997
CSP and determinism in security modelling
AW Roscoe
Proceedings 1995 IEEE Symposium on Security and Privacy, 114-127, 1995
3041995
Star covering properties
EK Van Douwen, GM Reed, AW Roscoe, IJ Tree
Topology and its Applications 39 (1), 71-103, 1991
2771991
Security and usability: Analysis and evaluation
R Kainda, I Flechais, AW Roscoe
2010 international conference on availability, reliability and security, 275-282, 2010
2212010
Concepts of digital topology
TY Kong, AW Roscoe, A Rosenfeld
Topology and its Applications 46, 1992
1921992
Hierarchical compression for model-checking CSP or how to check 10^20 dining philosophers for deadlock
AW Roscoe, PHB Gardiner, MH Goldsmith, JR Hulance, DM Jackson, ...
Tools and Algorithms for the Construction and Analysis of Systems, 133-152, 1995
1811995
Usability and security of out-of-band channels in secure device pairing protocols
R Kainda, I Flechais, AW Roscoe
Proceedings of the 5th Symposium on Usable Privacy and Security, 1-12, 2009
1722009
Non-interference through determinism
AW Roscoe, JCP Woodcock, L Wulf
Computer Security—ESORICS 94: Third European Symposium on Research in …, 1994
1711994
Δεν είναι δυνατή η εκτέλεση της ενέργειας από το σύστημα αυτή τη στιγμή. Προσπαθήστε ξανά αργότερα.
Άρθρα 1–20