A. W. Roscoe
According to our database^{1},
A. W. Roscoe
authored at least 132 papers
between 1982 and 2021.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis OtherLinks
Online presence:

on orcid.org
On csauthors.net:
Bibliography
2021
CoRR, 2021
Solidifier: bounded model checking solidity using lazy contract deployment and precise memory modelling.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021
2020
Formalising and verifying smart contracts with Solidifier: a bounded model checker for Solidity.
CoRR, 2020
Acta Informatica, 2020
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020
2019
Efficient Verification of Concurrent Systems Using Synchronisation Analysis and SAT/SMT Solving.
ACM Trans. Softw. Eng. Methodol., 2019
Guest editorial for the special issue from the 18th Brazilian Symposium on Formal Methods (SBMF 2015).
Sci. Comput. Program., 2019
IACR Cryptol. ePrint Arch., 2019
Efficient verification of concurrent systems using localanalysisbased approximations and SAT solving.
Formal Aspects Comput., 2019
Proceedings of the Foundations of Security, Protocols, and Equational Reasoning, 2019
2018
Proceedings of the Handbook of Model Checking., 2018
A Proof of Entropy Minimization for Outputs in Deletion Channels via Hidden Word Statistics.
CoRR, 2018
From Clustering Supersequences to Entropy Minimizing Subsequences for Single and Double Deletions.
CoRR, 2018
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018
2017
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2017
Proceedings of the Security Protocols XXV, 2017
Checking Static Properties Using Conservative SAT Approximations for Reachability.
Proceedings of the Formal Methods: Foundations and Applications  20th Brazilian Symposium, 2017
Proceedings of the 2017 International Conference on Cyberworlds, 2017
2016
Int. J. Softw. Tools Technol. Transf., 2016
Rigorous development of componentbased systems using component metadata and patterns.
Formal Aspects Comput., 2016
Formal Aspects Comput., 2016
Proceedings of the Thirtysecond Conference on the Mathematical Foundations of Programming Semantics, 2016
CoRR, 2016
Detecting Failed Attacks on HumanInteractive Security Protocols (Transcript of Discussion).
Proceedings of the Security Protocols XXIV, 2016
Proceedings of the Security Protocols XXIV, 2016
Proceedings of the Integrated Formal Methods  12th International Conference, 2016
Proceedings of the FM 2016: Formal Methods, 2016
2015
Proceedings of the 31st Conference on the Mathematical Foundations of Programming Semantics, 2015
Proceedings of the Security Protocols XXIII  23rd International Workshop, Cambridge, UK, March 31, 2015
Proceedings of the NASA Formal Methods  7th International Symposium, 2015
2014
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2014
Proceedings of the Formal Methods and Software Engineering, 2014
Proceedings of the HOWARD60: A Festschrift on the Occasion of Howard Barringer's 60th Birthday, 2014
2013
Mob. Networks Appl., 2013
Human interactive secure key and identity exchange protocols in body sensor networks.
IET Inf. Secur., 2013
Formal Aspects Comput., 2013
Log. Methods Comput. Sci., 2013
Proceedings of the Theories of Programming and Formal Methods, 2013
2012
Sci. Comput. Program., 2012
J. Networks, 2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the LargeScale Complex IT Systems. Development, Operation and Management, 2012
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012
ShortOutput Universal Hash Functions and Their Use in Fast and Secure Data Authentication.
Proceedings of the Fast Software Encryption  19th International Workshop, 2012
Proceedings of the Computer Aided Verification  24th International Conference, 2012
2011
Proceedings of the Encyclopedia of Parallel Computing, 2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication, 2011
When Context Is Better Than Identity: Authentication by Context Using Empirical Channels.
Proceedings of the Security Protocols XIX, 2011
Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies, 2011
Proceedings of the CONCUR 2011  Concurrency Theory  22nd International Conference, 2011
2010
Texts in Computer Science, Springer, ISBN: 9781848822580, 2010
Authentication protocols based on lowbandwidth unspoofable channels: a comparative survey.
IACR Cryptol. ePrint Arch., 2010
Secure and Usable OutOfBand Channels for <i>Ad Hoc</i> Mobile Device Interactions.
Proceedings of the Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 2010
Two heads are better than one: security and usability of device associations in group scenarios.
Proceedings of the Sixth Symposium on Usable Privacy and Security, 2010
The Missing Link: Human Interactive Security Protocols in Mobile Payment.
Proceedings of the Advances in Information and Computer Security, 2010
Proceedings of the ARES 2010, 2010
Proceedings of the Reflections on the Work of C. A. R. Hoare., 2010
Proceedings of the Reflections on the Work of C. A. R. Hoare., 2010
2009
J. Log. Algebraic Methods Program., 2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
Electron. Notes Theor. Comput. Sci., 2009
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2009
Usability and security of outofband channels in secure device pairing protocols.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009
Proceedings of the Automated Technology for Verification and Analysis, 2009
2008
Inf. Comput., 2008
Fundam. Informaticae, 2008
Proceedings of the Theoretical Aspects of Computing, 2008
A Representative Function Approach to Symmetry Exploitation for CSP Refinement Checking.
Proceedings of the Formal Methods and Software Engineering, 2008
2007
Formal Aspects Comput., 2007
2006
Electron. Notes Theor. Comput. Sci., 2006
Electron. Notes Theor. Comput. Sci., 2006
Electron. Notes Theor. Comput. Sci., 2006
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006
Proceedings of the Formal Methods and Software Engineering, 2006
2005
Formal Aspects Comput., 2005
Proceedings of the 21st Annual Conference on Mathematical Foundations of Programming Semantics, 2005
Proceedings of the Security in Pervasive Computing, Second International Conference, 2005
2004
Theory Pract. Log. Program., 2004
J. Comput. Secur., 2004
Formal Aspects Comput., 2004
Proceedings of the 6th International Workshop on Verification of InfiniteState Systems, 2004
Relating Data Independent Trace Checks in CSP with UNITY Reachability under a Normality Assumption.
Proceedings of the Integrated Formal Methods, 4th International Conference, 2004
Proceedings of the Communicating Sequential Processes: The First 25 Years, 2004
On Model Checking DataIndependent Systems with Arrays with WholeArray Operations.
Proceedings of the Communicating Sequential Processes: The First 25 Years, 2004
2003
Proceedings of the Security in Pervasive Computing, 2003
Proceedings of the FME 2003: Formal Methods, 2003
2002
Proceedings of the 15th IEEE Computer Security Foundations Workshop (CSFW15 2002), 2002
2000
Electron. Notes Theor. Comput. Sci., 2000
Proceedings of the SPIN Model Checking and Software Verification, 7th International SPIN Workshop, Stanford, CA, USA, August 30, 2000
Data Independent Induction over Structured Networks.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2000
Proceedings of the Computer Security, 2000
1999
Theor. Comput. Sci., 1999
J. Comput. Secur., 1999
Data Independence with Generalised Predicate Symbols.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1999
Formal Verification of Arbitrary Network Topologies.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1999
Verifying an infinite family of inductions simultaneously using data independence and FDR.
Proceedings of the Formal Methods for Protocol Engineering and Distributed Systems, 1999
Proceedings of the 12th IEEE Computer Security Foundations Workshop, 1999
1998
Proceedings of the 11th IEEE Computer Security Foundations Workshop, 1998
1997
IEEE Trans. Software Eng., 1997
1996
J. Comput. Secur., 1996
Proceedings of the Ninth IEEE Computer Security Foundations Workshop, March 10, 1996
1995
Theor. Comput. Sci., 1995
Hierarchical Compression for ModelChecking CSP or How to Check 10<sup>20</sup> Dining Philosophers for Deadlock.
Proceedings of the Tools and Algorithms for Construction and Analysis of Systems, 1995
Proceedings of the 1995 IEEE Symposium on Security and Privacy, 1995
Proceedings of the Eighth IEEE Computer Security Foundations Workshop (CSFW '95), 1995
Proceedings of the Eighth IEEE Computer Security Foundations Workshop (CSFW '95), 1995
1993
J. Log. Comput., 1993
1992
J. Log. Comput., 1992
1991
Distributed Comput., 1991
Proceedings of the RealTime: Theory in Practice, 1991
1989
Proceedings of the Mathematical Foundations of Programming Semantics, 5th International Conference, Tulane University, New Orleans, Louisiana, USA, March 29, 1989
Analysing <i>TM<sub>FS</sub></i>: a Study of Nondeterminism in RealTime Concurrency.
Proceedings of the Concurrency: Theory, 1989
1988
Theor. Comput. Sci., 1988
Theor. Comput. Sci., 1988
SIAM J. Comput., 1988
1987
Inf. Comput., December, 1987
Commun. ACM, 1987
Proceedings of the Mathematical Foundations of Programming Language Semantics, 1987
1985
Comput. Vis. Graph. Image Process., 1985
Comput. Vis. Graph. Image Process., 1985
1984
J. ACM, 1984
Programs as Executable Predicates.
Proceedings of the International Conference on Fifth Generation Computer Systems, 1984
Proceedings of the Seminar on Concurrency, 1984
Proceedings of the Seminar on Concurrency, 1984
1983
Proceedings of the Analysis of Concurrent Systems, 1983
Specifying problem one using the failure sets model for CSP and deriving CSP processes which meett this specification.
Proceedings of the Analysis of Concurrent Systems, 1983
1982
PhD thesis, 1982