% csauthors.net - beta - BibTeX bibliography of A. W. Roscoe 001
@phdthesis{phd/ethos/Roscoe82,
title = {A mathematical theory of communicating processes.},
year = {1982},
author = {{Andrew William Roscoe}}
}
@inproceedings{conf/acs/Roscoe83,
title = {Specifying problem one using the failure sets model for CSP and deriving CSP processes which meett this specification.},
year = {1983},
booktitle = {The Analysis of Concurrent Systems},
author = {{A. W. Roscoe 001}},
publisher = {Springer},
booktitle = {The Analysis of Concurrent Systems, Cambridge, UK, September 12-16, 1983, Proceedings}
}
@inproceedings{conf/acs/Roscoe83a,
title = {A CSP solution to the "trains" problem.},
year = {1983},
booktitle = {The Analysis of Concurrent Systems},
author = {{A. W. Roscoe 001}},
publisher = {Springer},
booktitle = {The Analysis of Concurrent Systems, Cambridge, UK, September 12-16, 1983, Proceedings}
}
@inproceedings{conf/concur/BrookesR84,
title = {An Improved Failures Model for Communicating Processes.},
year = {1984},
booktitle = {Seminar on Concurrency},
author = {{Stephen D. Brookes} and {A. W. Roscoe 001}},
publisher = {Springer},
booktitle = {Seminar on Concurrency, Carnegie-Mellon University, Pittsburg, PA, USA, July 9-11, 1984}
}
@inproceedings{conf/concur/Roscoe84,
title = {Denotational Semantics for occam.},
year = {1984},
booktitle = {Seminar on Concurrency},
author = {{A. W. Roscoe 001}},
publisher = {Springer},
booktitle = {Seminar on Concurrency, Carnegie-Mellon University, Pittsburg, PA, USA, July 9-11, 1984}
}
@inproceedings{conf/fgcs/HoareR84,
title = {Programs as Executable Predicates.},
year = {1984},
booktitle = {FGCS},
author = {{C. A. R. Hoare} and {A. W. Roscoe 001}},
publisher = {OHMSHA Ltd. Tokyo and North-Holland},
booktitle = {Proceedings of the International Conference on Fifth Generation Computer Systems, FGCS 1984, Tokyo, Japan, November 6-9, 1984.}
}
@article{journals/jacm/BrookesHR84,
title = {A Theory of Communicating Sequential Processes.},
year = {1984},
journal = {J. ACM},
author = {{Stephen D. Brookes} and {C. A. R. Hoare} and {A. W. Roscoe 001}}
}
@article{journals/cvgip/KongR85,
title = {Continuous analogs of axiomatized digital surfaces.},
year = {1985},
journal = {Comput. Vis. Graph. Image Process.},
author = {{T. Yung Kong} and {A. W. Roscoe 001}}
}
@article{journals/cvgip/KongR85a,
title = {A theory of binary digital pictures.},
year = {1985},
journal = {Comput. Vis. Graph. Image Process.},
author = {{T. Yung Kong} and {A. W. Roscoe 001}}
}
@inproceedings{conf/mfps/ReedR87,
title = {Metric Spaces as Models for Real-Time Concurrency.},
year = {1987},
booktitle = {MFPS},
author = {{George M. Reed} and {A. W. Roscoe 001}},
publisher = {Springer},
booktitle = {Mathematical Foundations of Programming Language Semantics, 3rd Workshop, Tulane University, New Orleans, Louisiana, USA, April 8-10, 1987, Proceedings}
}
@article{journals/cacm/HoareHJMRSSSS87,
title = {Laws of Programming.},
year = {1987},
journal = {Commun. ACM},
author = {{C. A. R. Hoare} and {Ian J. Hayes} and {Jifeng He 001} and {Carroll Morgan} and {A. W. Roscoe 001} and {Jeff W. Sanders} and {Ib Holm Sørensen} and {J. Michael Spivey} and {Bernard Sufrin}}
}
@article{journals/iandc/RoscoeD87,
title = {The Pursuit of Deadlock freedom},
year = {1987},
month = {December},
journal = {Inf. Comput.},
author = {{A. W. Roscoe 001} and {Naiem Dathi}}
}
@article{journals/siamcomp/KongMR88,
title = {The Decomposition of a Rectangle into Rectangles of Minimal Perimeter.},
year = {1988},
journal = {SIAM J. Comput.},
author = {{T. Yung Kong} and {David M. Mount} and {A. W. Roscoe 001}}
}
@article{journals/tcs/ReedR88,
title = {A Timed Model for Communicating Sequential Processes.},
year = {1988},
journal = {Theor. Comput. Sci.},
author = {{George M. Reed} and {A. W. Roscoe 001}}
}
@article{journals/tcs/RoscoeH88,
title = {The Laws of Occam Programming.},
year = {1988},
journal = {Theor. Comput. Sci.},
author = {{A. W. Roscoe 001} and {C. A. R. Hoare}}
}
@inproceedings{conf/concur/ReedR89,
title = {Analysing TMFS: a Study of Nondeterminism in Real-Time Concurrency.},
year = {1989},
booktitle = {Concurrency: Theory, Language, And Architecture},
author = {{George M. Reed} and {A. W. Roscoe 001}},
publisher = {Springer},
booktitle = {Concurrency: Theory, Language, And Architecture, UK/Japan Workshop, Oxford, UK, September 25-27, 1989, Proceedings}
}
@inproceedings{conf/mfps/RoscoeB89,
title = {Unbounded Nondeterminism in CSP.},
year = {1989},
booktitle = {Mathematical Foundations of Programming Semantics},
author = {{A. W. Roscoe 001} and {Geoff Barrett}},
publisher = {Springer},
booktitle = {Mathematical Foundations of Programming Semantics, 5th International Conference, Tulane University, New Orleans, Louisiana, USA, March 29 - April 1, 1989, Proceedings}
}
@inproceedings{conf/rex/SchneiderDJRRR91,
title = {Timed CSP: Theory and Practice.},
year = {1991},
booktitle = {REX Workshop},
author = {{Steve A. Schneider} and {Jim Davies} and {D. M. Jackson} and {George M. Reed} and {Joy N. Reed} and {A. W. Roscoe 001}},
publisher = {Springer},
booktitle = {Real-Time: Theory in Practice, REX Workshop, Mook, The Netherlands, June 3-7, 1991, Proceedings}
}
@article{journals/dc/BrookesR91,
title = {Deadlock Analysis in Networks of Communicating Processes.},
year = {1991},
journal = {Distributed Comput.},
author = {{Stephen D. Brookes} and {A. W. Roscoe 001}}
}
@article{journals/logcom/Roscoe92,
title = {An Alternative Order for the Failures Model.},
year = {1992},
journal = {J. Log. Comput.},
author = {{A. W. Roscoe 001}}
}
@article{journals/logcom/Roscoe93,
title = {Unbounded Non-Determinism in CSP.},
year = {1993},
journal = {J. Log. Comput.},
author = {{A. W. Roscoe 001}}
}
@inproceedings{conf/csfw/Roscoe95,
title = {Modelling and verifying key-exchange protocols using CSP and FDR.},
year = {1995},
booktitle = {CSFW},
author = {{A. W. Roscoe 001}},
publisher = {IEEE Computer Society},
booktitle = {The Eighth IEEE Computer Security Foundations Workshop (CSFW '95), March 13-15, 1995, Kenmare, County Kerry, Ireland}
}
@inproceedings{conf/csfw/RoscoeW95,
title = {Composing and decomposing systems under security properties.},
year = {1995},
booktitle = {CSFW},
author = {{A. W. Roscoe 001} and {Lars Wulf}},
publisher = {IEEE Computer Society},
booktitle = {The Eighth IEEE Computer Security Foundations Workshop (CSFW '95), March 13-15, 1995, Kenmare, County Kerry, Ireland}
}
@inproceedings{conf/sp/Roscoe95,
title = {CSP and determinism in security modelling.},
year = {1995},
booktitle = {S&P},
author = {{A. W. Roscoe 001}},
publisher = {IEEE Computer Society},
booktitle = {Proceedings of the 1995 IEEE Symposium on Security and Privacy, Oakland, California, USA, May 8-10, 1995}
}
@inproceedings{conf/tacas/RoscoeGGHJS95,
title = {Hierarchical Compression for Model-Checking CSP or How to Check 1020 Dining Philosophers for Deadlock.},
year = {1995},
booktitle = {TACAS},
author = {{A. W. Roscoe 001} and {Paul H. B. Gardiner} and {Michael Goldsmith} and {J. R. Hulance} and {D. M. Jackson} and {J. Bryan Scattergood}},
publisher = {Springer},
booktitle = {Tools and Algorithms for Construction and Analysis of Systems, First International Workshop, TACAS '95, Aarhus, Denmark, May 19-20, 1995, Proceedings}
}
@article{journals/tcs/MisloveRS95,
title = {Fixed Points Without Completeness.},
year = {1995},
journal = {Theor. Comput. Sci.},
author = {{Michael W. Mislove} and {A. W. Roscoe 001} and {Steve A. Schneider}}
}
@inproceedings{conf/csfw/Roscoe96,
title = {Intensional specifications of security protocols.},
year = {1996},
booktitle = {CSFW},
author = {{A. W. Roscoe 001}},
publisher = {IEEE Computer Society},
booktitle = {Ninth IEEE Computer Security Foundations Workshop, March 10 - 12, 1996, Dromquinna Manor, Kenmare, County Kerry, Ireland}
}
@article{journals/jcs/RoscoeWW96,
title = {Non-interference through Determinism.},
year = {1996},
journal = {J. Comput. Secur.},
author = {{A. W. Roscoe 001} and {Jim Woodcock 001} and {Lars Wulf}}
}
@article{journals/tse/LoweR97,
title = {Using CSP to Detect Errors in the TMN Protocol.},
year = {1997},
journal = {IEEE Trans. Software Eng.},
author = {{Gavin Lowe} and {A. W. Roscoe 001}}
}
@inproceedings{conf/csfw/Roscoe98,
title = {Proving Security Protocols with Model Checkers by Data Independence Techniques.},
year = {1998},
booktitle = {CSFW},
author = {{A. W. Roscoe 001}},
publisher = {IEEE Computer Society},
booktitle = {Proceedings of the 11th IEEE Computer Security Foundations Workshop, Rockport, Massachusetts, USA, June 9-11, 1998}
}
@inproceedings{conf/csfw/RoscoeG99,
title = {What Is Intransitive Noninterference?},
year = {1999},
booktitle = {CSFW},
author = {{A. W. Roscoe 001} and {M. H. Goldsmith}},
publisher = {IEEE Computer Society},
booktitle = {Proceedings of the 12th IEEE Computer Security Foundations Workshop, CSFW 1999, Mordano, Italy, June 28-30, 1999}
}
@inproceedings{conf/forte/CreeseR99,
title = {Verifying an infinite family of inductions simultaneously using data independence and FDR.},
year = {1999},
booktitle = {FORTE},
author = {{S. J. Creese} and {A. W. Roscoe 001}},
publisher = {Kluwer},
booktitle = {Formal Methods for Protocol Engineering and Distributed Systems, FORTE XII / PSTV XIX'99, IFIP TC6 WG6.1 Joint International Conference on Formal Description Techniques for Distributed Systems and Communication Protocols (FORTE XII) and Protocol Specification, Testing and Verification (PSTV XIX), October 5-8, 1999, Beijing, China}
}
@inproceedings{conf/pdpta/CreeseR99,
title = {Formal Verification of Arbitrary Network Topologies.},
year = {1999},
booktitle = {PDPTA},
author = {{S. J. Creese} and {A. W. Roscoe 001}},
publisher = {CSREA Press},
booktitle = {Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, PDPTA 1999, June 28 - Junlly 1, 1999, Las Vegas, Nevada, USA}
}
@inproceedings{conf/pdpta/LazicR99,
title = {Data Independence with Generalised Predicate Symbols.},
year = {1999},
booktitle = {PDPTA},
author = {{Ranko Lazic 001} and {Bill Roscoe}},
publisher = {CSREA Press},
booktitle = {Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, PDPTA 1999, June 28 - Junlly 1, 1999, Las Vegas, Nevada, USA}
}
@article{journals/jcs/RoscoeB99,
title = {Proving Security Protocols with Model Checkers by Data Independence Techniques.},
year = {1999},
journal = {J. Comput. Secur.},
author = {{A. W. Roscoe 001} and {Philippa J. Broadfoot}}
}
@article{journals/tcs/ReedR99,
title = {The Timed Failures-Stability Model for CSP.},
year = {1999},
journal = {Theor. Comput. Sci.},
author = {{George M. Reed} and {A. W. Roscoe 001}}
}
@inproceedings{conf/esorics/BroadfootLR00,
title = {Automating Data Independence.},
year = {2000},
booktitle = {ESORICS},
author = {{Philippa J. Broadfoot} and {Gavin Lowe} and {A. W. Roscoe 001}},
publisher = {Springer},
booktitle = {Computer Security - ESORICS 2000, 6th European Symposium on Research in Computer Security, Toulouse, France, October 4-6, 2000, Proceedings}
}
@inproceedings{conf/pdpta/CreeseR00,
title = {Data Independent Induction over Structured Networks.},
year = {2000},
booktitle = {PDPTA},
author = {{S. J. Creese} and {A. W. Roscoe 001}},
publisher = {CSREA Press},
booktitle = {Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, PDPTA 2000, June 24-29, 2000, Las Vegas, Nevada, USA}
}
@inproceedings{conf/spin/BroadfootR00,
title = {Tutorial on FDR and Its Applications.},
year = {2000},
booktitle = {SPIN},
author = {{Philippa J. Broadfoot} and {A. W. Roscoe 001}},
publisher = {Springer},
booktitle = {SPIN Model Checking and Software Verification, 7th International SPIN Workshop, Stanford, CA, USA, August 30 - September 1, 2000, Proceedings}
}
@inproceedings{journals/entcs/RoscoeBL00,
title = {Data independent verification of crypto-protocols.},
year = {2000},
booktitle = {MFCSIT},
author = {{A. W. Roscoe 001} and {Philippa J. Broadfoot} and {Gavin Lowe}},
publisher = {Elsevier},
booktitle = {First Irish Conference on the Mathematical Foundations of Computer Science and Information Technology, MFCSIT 2000, Cork, Ireland, July 20-21, 2000}
}
@inproceedings{conf/csfw/BroadfootR02,
title = {Capturing Parallel Attacks within the Data Independence Framework.},
year = {2002},
booktitle = {CSFW},
author = {{Philippa J. Broadfoot} and {A. W. Roscoe 001}},
publisher = {IEEE Computer Society},
booktitle = {15th IEEE Computer Security Foundations Workshop (CSFW-15 2002), 24-26 June 2002, Cape Breton, Nova Scotia, Canada}
}
@inproceedings{conf/fm/GoldsmithMRWZ03,
title = {Watchdog Transformations for Property-Oriented Model-Checking.},
year = {2003},
booktitle = {FME},
author = {{Michael Goldsmith} and {Nick Moffat} and {Bill Roscoe} and {Tim Whitworth} and {Irfan Zakiuddin}},
publisher = {Springer},
booktitle = {FME 2003: Formal Methods, International Symposium of Formal Methods Europe, Pisa, Italy, September 8-14, 2003, Proceedings}
}
@inproceedings{conf/spc/CreeseGRZ03,
title = {Authentication for Pervasive Computing.},
year = {2003},
booktitle = {SPC},
author = {{Sadie Creese} and {Michael Goldsmith} and {Bill Roscoe} and {Irfan Zakiuddin}},
publisher = {Springer},
booktitle = {Security in Pervasive Computing, First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers}
}
@inproceedings{conf/birthday/LazicNR04,
title = {On Model Checking Data-Independent Systems with Arrays with Whole-Array Operations.},
year = {2004},
booktitle = {25 Years Communicating Sequential Processes},
author = {{Ranko Lazic 001} and {Thomas Christopher Newcomb} and {A. W. Roscoe 001}},
publisher = {Springer},
booktitle = {Communicating Sequential Processes: The First 25 Years, Symposium on the Occasion of 25 Years of CSP, London, UK, July 7-8, 2004, Revised Invited Papers}
}
@inproceedings{conf/birthday/Roscoe04,
title = {Seeing Beyond Divergence.},
year = {2004},
booktitle = {25 Years Communicating Sequential Processes},
author = {{A. W. Roscoe 001}},
publisher = {Springer},
booktitle = {Communicating Sequential Processes: The First 25 Years, Symposium on the Occasion of 25 Years of CSP, London, UK, July 7-8, 2004, Revised Invited Papers}
}
@inproceedings{conf/ifm/WangRL04,
title = {Relating Data Independent Trace Checks in CSP with UNITY Reachability under a Normality Assumption.},
year = {2004},
booktitle = {IFM},
author = {{Xu Wang 001} and {A. W. Roscoe 001} and {Ranko Lazic 001}},
publisher = {Springer},
booktitle = {Integrated Formal Methods, 4th International Conference, IFM 2004, Canterbury, UK, April 4-7, 2004, Proceedings}
}
@inproceedings{journals/entcs/LazicNR05,
title = {Polymorphic Systems with Arrays, 2-Counter Machines and Multiset Rewriting.},
year = {2004},
booktitle = {INFINITY},
author = {{Ranko Lazic 001} and {Thomas Christopher Newcomb} and {Bill Roscoe}},
publisher = {Elsevier},
booktitle = {Proceedings of the 6th International Workshop on Verification of Infinite-State Systems, INFINITY 2004, London, UK, September 4, 2004}
}
@article{journals/fac/ReedSR04,
title = {Responsiveness of interoperating components.},
year = {2004},
journal = {Formal Aspects Comput.},
author = {{Joy N. Reed} and {Jane E. Sinclair} and {A. W. Roscoe 001}}
}
@article{journals/jcs/BroadfootR04,
title = {Embedding agents within the intruder to detect parallel attacks.},
year = {2004},
journal = {J. Comput. Secur.},
author = {{Philippa J. Broadfoot} and {A. W. Roscoe 001}}
}
@article{journals/tplp/LazicNR04,
title = {On model checking data-independent systems with arrays without reset.},
year = {2004},
journal = {Theory Pract. Log. Program.},
author = {{Ranko Lazic 001} and {Thomas Christopher Newcomb} and {A. W. Roscoe 001}}
}
@inproceedings{conf/spc/CreeseGHRWZ05,
title = {Exploiting Empirical Engagement in Authentication Protocol Design.},
year = {2005},
booktitle = {SPC},
author = {{Sadie Creese} and {Michael Goldsmith} and {Richard Harrison} and {Bill Roscoe} and {Paul Whittaker} and {Irfan Zakiuddin}},
publisher = {Springer},
booktitle = {Security in Pervasive Computing, Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings}
}
@inproceedings{journals/entcs/KleinerR06,
title = {On the Relationship Between Web Services Security and Traditional Protocols.},
year = {2005},
booktitle = {MFPS},
author = {{E. Kleiner} and {A. W. Roscoe 001}},
publisher = {Elsevier},
booktitle = {Proceedings of the 21st Annual Conference on Mathematical Foundations of Programming Semantics, MFPS 2005, Birmingham, UK, May 18-21, 2005}
}
@inproceedings{journals/entcs/MomtahanMR06,
title = {A Taxonomy of Web Services Using CSP.},
year = {2005},
booktitle = {WLFM@FM},
author = {{Lee Momtahan} and {Andrew P. Martin} and {A. W. Roscoe 001}},
publisher = {Elsevier},
booktitle = {Proceedings of the International Workshop on Web Languages and Formal Methods, WLFM@FM 2005, Newcastle upon Tyne, UK, July 19, 2005}
}
@inproceedings{journals/entcs/ReedRS06,
title = {Machine-Verifiable Responsiveness.},
year = {2005},
booktitle = {AVoCS},
author = {{Joy N. Reed} and {A. W. Roscoe 001} and {Jane E. Sinclair}},
publisher = {Elsevier},
booktitle = {Proceedings of the 5th International Workshop on Automated Verification of Critical Systems, AVoCS 2005, University of Warwick, UK, September 12-13, 2005}
}
@inproceedings{journals/entcs/Roscoe06,
title = {Confluence Thanks to Extensional Determinism.},
year = {2005},
booktitle = {APC 25},
author = {{A. W. Roscoe 001}},
publisher = {Elsevier},
booktitle = {Proceedings of the Workshop "Essays on Algebraic Process Calculi", APC 25, Bertinoro, Italy, August 1-5, 2005}
}
@article{journals/fac/Roscoe05,
title = {On the expressive power of CSP refinement.},
year = {2005},
journal = {Formal Aspects Comput.},
author = {{A. W. Roscoe 001}}
}
@inproceedings{conf/icfem/RoscoeW06,
title = {Verifying Statemate Statecharts Using CSP and FDR.},
year = {2006},
booktitle = {ICFEM},
author = {{A. W. Roscoe 001} and {Zhenzhong Wu}},
publisher = {Springer},
booktitle = {Formal Methods and Software Engineering, 8th International Conference on Formal Engineering Methods, ICFEM 2006, Macao, China, November 1-3, 2006, Proceedings}
}
@inproceedings{conf/sac/CreeseGRX06,
title = {Bootstrapping multi-party ad-hoc security.},
year = {2006},
booktitle = {SAC},
author = {{Sadie Creese} and {Michael Goldsmith} and {Bill Roscoe} and {Ming Xiao}},
publisher = {ACM},
booktitle = {Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), Dijon, France, April 23-27, 2006}
}
@inproceedings{conf/sac/HuangR06,
title = {Extending noninterference properties to the timed world.},
year = {2006},
booktitle = {SAC},
author = {{Jian Huang} and {A. W. Roscoe 001}},
publisher = {ACM},
booktitle = {Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), Dijon, France, April 23-27, 2006}
}
@inproceedings{journals/entcs/GoldsmithR09,
title = {Preface.},
year = {2007},
booktitle = {AVoCS},
author = {{Michael Goldsmith} and {Bill Roscoe}},
publisher = {Elsevier},
booktitle = {Proceedings of the Seventh International Workshop on Automated Verification of Critical Systems, AVoCS 2007, Oxford, UK, September 10-12, 2007}
}
@article{journals/fac/ReedRS07,
title = {Responsiveness and stable revivals.},
year = {2007},
journal = {Formal Aspects Comput.},
author = {{Joy N. Reed} and {A. W. Roscoe 001} and {Jane E. Sinclair}}
}
@inproceedings{conf/icfem/MoffatGR08,
title = {A Representative Function Approach to Symmetry Exploitation for CSP Refinement Checking.},
year = {2008},
booktitle = {ICFEM},
author = {{Nick Moffat} and {Michael Goldsmith} and {Bill Roscoe}},
publisher = {Springer},
booktitle = {Formal Methods and Software Engineering, 10th International Conference on Formal Engineering Methods, ICFEM 2008, Kitakyushu-City, Japan, October 27-31, 2008. Proceedings}
}
@inproceedings{conf/ictac/Roscoe08,
title = {The Three Platonic Models of Divergence-Strict CSP.},
year = {2008},
booktitle = {ICTAC},
author = {{A. W. Roscoe 001}},
publisher = {Springer},
booktitle = {Theoretical Aspects of Computing - ICTAC 2008, 5th International Colloquium, Istanbul, Turkey, September 1-3, 2008. Proceedings}
}
@article{journals/fuin/LazicNORW08,
title = {Nets with Tokens which Carry Data.},
year = {2008},
journal = {Fundam. Informaticae},
author = {{Ranko Lazic 001} and {Thomas Christopher Newcomb} and {Joël Ouaknine} and {A. W. Roscoe 001} and {James Worrell 001}}
}
@article{journals/iandc/NguyenR08,
title = {Authenticating ad hoc networks by comparison of short digests.},
year = {2008},
journal = {Inf. Comput.},
author = {{Long Hoang Nguyen 001} and {A. W. Roscoe 001}}
}
@inproceedings{conf/atva/RoscoeAP09,
title = {Local Search in Model Checking.},
year = {2009},
booktitle = {ATVA},
author = {{A. W. Roscoe 001} and {Philip J. Armstrong} and {Pragyesh}},
publisher = {Springer},
booktitle = {Automated Technology for Verification and Analysis, 7th International Symposium, ATVA 2009, Macao, China, October 14-16, 2009. Proceedings}
}
@inproceedings{conf/soups/KaindaFR09,
title = {Usability and security of out-of-band channels in secure device pairing protocols.},
year = {2009},
booktitle = {SOUPS},
author = {{Ronald Kainda} and {Ivan Flechais} and {A. W. Roscoe 001}},
publisher = {ACM},
booktitle = {Proceedings of the 5th Symposium on Usable Privacy and Security, SOUPS 2009, Mountain View, California, USA, July 15-17, 2009}
}
@article{journals/eceasst/PalikarevaOR09,
title = {Faster FDR Counterexample Generation Using SAT-Solving.},
year = {2009},
journal = {Electron. Commun. Eur. Assoc. Softw. Sci. Technol.},
author = {{Hristina Palikareva} and {Joël Ouaknine} and {Bill Roscoe}}
}
@article{journals/iacr/NguyenR09,
title = {Separating two roles of hashing in one-way message authentication.},
year = {2009},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Long Hoang Nguyen 001} and {A. W. Roscoe 001}}
}
@article{journals/iacr/NguyenR09a,
title = {Efficient group authentication protocols based on human interaction.},
year = {2009},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Long Hoang Nguyen 001} and {A. W. Roscoe 001}}
}
@article{journals/iacr/NguyenR09b,
title = {New combinatorial bounds for universal hash functions.},
year = {2009},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Long Hoang Nguyen 001} and {A. W. Roscoe 001}}
}
@article{journals/jlp/Roscoe09,
title = {Revivals, stuckness and the hierarchy of CSP models.},
year = {2009},
journal = {J. Log. Algebraic Methods Program.},
author = {{A. W. Roscoe 001}}
}
@incollection{books/daglib/p/JonesR10,
title = {Insight, Inspiration and Collaboration.},
year = {2010},
booktitle = {Reflections on the Work of C. A. R. Hoare},
author = {{Clifford B. Jones} and {A. W. Roscoe 001}},
publisher = {Springer},
booktitle = {Reflections on the Work of C. A. R. Hoare.}
}
@incollection{books/daglib/p/Roscoe10,
title = {CSP is Expressive Enough for π.},
year = {2010},
booktitle = {Reflections on the Work of C. A. R. Hoare},
author = {{A. W. Roscoe 001}},
publisher = {Springer},
booktitle = {Reflections on the Work of C. A. R. Hoare.}
}
@inproceedings{conf/IEEEares/KaindaFR10,
title = {Security and Usability: Analysis and Evaluation.},
year = {2010},
booktitle = {ARES},
author = {{Ronald Kainda} and {Ivan Flechais} and {A. W. Roscoe 001}},
publisher = {IEEE Computer Society},
booktitle = {ARES 2010, Fifth International Conference on Availability, Reliability and Security, 15-18 February 2010, Krakow, Poland}
}
@inproceedings{conf/iwsec/BangdaoRKN10,
title = {The Missing Link: Human Interactive Security Protocols in Mobile Payment.},
year = {2010},
booktitle = {IWSEC (Short Papers)},
author = {{Chen Bangdao} and {A. W. Roscoe 001} and {Ronald Kainda} and {Long Hoang Nguyen 001}},
publisher = {Information Processing Society of Japan (IPSJ)},
booktitle = {Advances in Information and Computer Security - 5th International Workshop on Security, IWSEC 2010, Kobe, Japan, November 22-24, 2010. Short Paper Proceedings}
}
@inproceedings{conf/soups/KaindaFR10,
title = {Two heads are better than one: security and usability of device associations in group scenarios.},
year = {2010},
booktitle = {SOUPS},
author = {{Ronald Kainda} and {Ivan Flechais} and {A. W. Roscoe 001}},
publisher = {ACM},
booktitle = {Proceedings of the Sixth Symposium on Usable Privacy and Security, SOUPS 2010, Redmond, Washington, USA, July 14-16, 2010}
}
@inproceedings{conf/wistp/KaindaFR10,
title = {Secure and Usable Out-Of-Band Channels for Ad Hoc Mobile Device Interactions.},
year = {2010},
booktitle = {WISTP},
author = {{Ronald Kainda} and {Ivan Flechais} and {A. W. Roscoe 001}},
publisher = {Springer},
booktitle = {Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010. Proceedings}
}
@article{journals/iacr/NguyenR10,
title = {Authentication protocols based on low-bandwidth unspoofable channels: a comparative survey.},
year = {2010},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Long Hoang Nguyen 001} and {A. W. Roscoe 001}}
}
@book{series/txcs/Roscoe10,
title = {Understanding Concurrent Systems.},
year = {2010},
isbn = {978-1-84882-258-0},
publisher = {Springer},
series = {Texts in Computer Science},
author = {{A. W. Roscoe 001}}
}
@inproceedings{conf/concur/OuakninePRW11,
title = {Static Livelock Analysis in CSP.},
year = {2011},
booktitle = {CONCUR},
author = {{Joël Ouaknine} and {Hristina Palikareva} and {A. W. Roscoe 001} and {James Worrell 001}},
publisher = {Springer},
booktitle = {CONCUR 2011 - Concurrency Theory - 22nd International Conference, CONCUR 2011, Aachen, Germany, September 6-9, 2011. Proceedings}
}
@inproceedings{conf/isabel/Huang0BMJR11,
title = {Body sensor network key distribution using human interactive channels.},
year = {2011},
booktitle = {ISABEL},
author = {{Xin Huang 005} and {Qinghua Wang 001} and {Chen Bangdao} and {Andrew Markham} and {Riku Jäntti} and {A. W. Roscoe 001}},
publisher = {ACM},
booktitle = {Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies, ISABEL '11, Barcelona, Spain, October 26-29, 2011}
}
@inproceedings{conf/spw/ChenNR11,
title = {When Context Is Better Than Identity: Authentication by Context Using Empirical Channels.},
year = {2011},
booktitle = {Security Protocols Workshop},
author = {{Bangdao Chen} and {Long Hoang Nguyen 001} and {Andrew William Roscoe}},
publisher = {Springer},
booktitle = {Security Protocols XIX - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers}
}
@inproceedings{conf/wistp/BangdaoR11,
title = {Mobile Electronic Identity: Securing Payment on Mobile Phones.},
year = {2011},
booktitle = {WISTP},
author = {{Chen Bangdao} and {A. W. Roscoe 001}},
publisher = {Springer},
booktitle = {Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication - 5th IFIP WG 11.2 International Workshop, WISTP 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings}
}
@article{journals/iacr/NguyenR11,
title = {On the construction of digest functions for manual authentication protocols.},
year = {2011},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Long Hoang Nguyen 001} and {Andrew William Roscoe}}
}
@incollection{reference/parallel/RoscoeD11,
title = {CSP (Communicating Sequential Processes).},
year = {2011},
booktitle = {Encyclopedia of Parallel Computing},
author = {{A. W. Roscoe 001} and {Jim Davies}},
publisher = {Springer},
booktitle = {Encyclopedia of Parallel Computing}
}
@inproceedings{conf/cav/ArmstrongGLOPRW12,
title = {Recent Developments in FDR.},
year = {2012},
booktitle = {CAV},
author = {{Philip J. Armstrong} and {Michael Goldsmith} and {Gavin Lowe} and {Joël Ouaknine} and {Hristina Palikareva} and {A. W. Roscoe 001} and {James Worrell 001}},
publisher = {Springer},
booktitle = {Computer Aided Verification - 24th International Conference, CAV 2012, Berkeley, CA, USA, July 7-13, 2012 Proceedings}
}
@inproceedings{conf/fse/NguyenR12,
title = {Short-Output Universal Hash Functions and Their Use in Fast and Secure Data Authentication.},
year = {2012},
booktitle = {FSE},
author = {{Long Hoang Nguyen 001} and {A. W. Roscoe 001}},
publisher = {Springer},
booktitle = {Fast Software Encryption - 19th International Workshop, FSE 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers}
}
@inproceedings{conf/icitst/HuangFCZR12,
title = {User interactive Internet of things privacy preserved access control.},
year = {2012},
booktitle = {ICITST},
author = {{Xin Huang 005} and {Rong Fu} and {Bangdao Chen} and {Tingting Zhang} and {A. W. Roscoe 001}},
publisher = {IEEE},
booktitle = {7th International Conference for Internet Technology and Secured Transactions, ICITST 2012, London, United Kingdom, December 10-12, 2012}
}
@inproceedings{conf/icitst/HuangGCR12,
title = {Bootstrapping body sensor networks using human controlled LED-camera channels.},
year = {2012},
booktitle = {ICITST},
author = {{Xin Huang 005} and {Shangyuan Guo} and {Bangdao Chen} and {A. W. Roscoe 001}},
publisher = {IEEE},
booktitle = {7th International Conference for Internet Technology and Secured Transactions, ICITST 2012, London, United Kingdom, December 10-12, 2012}
}
@inproceedings{conf/monterey/ChenR12,
title = {Social Networks for Importing and Exporting Security.},
year = {2012},
booktitle = {Monterey Workshop},
author = {{Bangdao Chen} and {A. W. Roscoe 001}},
publisher = {Springer},
booktitle = {Large-Scale Complex IT Systems. Development, Operation and Management - 17th Monterey Workshop 2012, Oxford, UK, March 19-21, 2012, Revised Selected Papers}
}
@article{journals/iacr/NguyenR12,
title = {Simple construction of epsilon-biased distribution.},
year = {2012},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Long Hoang Nguyen 001} and {Andrew William Roscoe}}
}
@article{journals/jnw/HuangMCMWR12,
title = {Human Interactive Secure ID Management in Body Sensor Networks.},
year = {2012},
journal = {J. Networks},
author = {{Xin Huang 005} and {Xiao Ma} and {Bangdao Chen} and {Andrew Markham} and {Qinghua Wang 001} and {Andrew William Roscoe}}
}
@article{journals/scp/PalikarevaOR12,
title = {SAT-solving in CSP trace refinement.},
year = {2012},
journal = {Sci. Comput. Program.},
author = {{Hristina Palikareva} and {Joël Ouaknine} and {A. W. Roscoe 001}}
}
@inproceedings{conf/birthday/RoscoeH13,
title = {Slow Abstraction via Priority.},
year = {2013},
booktitle = {Theories of Programming and Formal Methods},
author = {{A. W. Roscoe 001} and {Philippa J. Hopcroft}},
publisher = {Springer},
booktitle = {Theories of Programming and Formal Methods - Essays Dedicated to Jifeng He on the Occasion of His 70th Birthday}
}
@article{journals/corr/abs-1304-7394,
title = {A Static Analysis Framework for Livelock Freedom in CSP},
year = {2013},
journal = {Log. Methods Comput. Sci.},
author = {{Joël Ouaknine} and {Hristina Palikareva} and {A. W. Roscoe 001} and {James Worrell 001}}
}
@article{journals/fac/RoscoeH13,
title = {Checking noninterference in Timed CSP.},
year = {2013},
journal = {Formal Aspects Comput.},
author = {{A. W. Roscoe 001} and {Jian Huang}}
}
@article{journals/iet-ifs/HuangCMWYR13,
title = {Human interactive secure key and identity exchange protocols in body sensor networks.},
year = {2013},
journal = {IET Inf. Secur.},
author = {{Xin Huang 005} and {Bangdao Chen} and {Andrew Markham} and {Qinghua Wang 001} and {Zheng Yan 002} and {A. W. Roscoe 001}}
}
@article{journals/monet/ChenNR13,
title = {Reverse Authentication in Financial Transactions and Identity Management.},
year = {2013},
journal = {Mob. Networks Appl.},
author = {{Bangdao Chen} and {Long Hoang Nguyen 001} and {A. W. Roscoe 001}}
}
@incollection{conf/birthday/ArmstrongLOR14,
title = {Model checking Timed CSP.},
year = {2014},
booktitle = {HOWARD-60},
author = {{Philip J. Armstrong} and {Gavin Lowe} and {Joël Ouaknine} and {Bill Roscoe}},
publisher = {EasyChair},
booktitle = {HOWARD-60: A Festschrift on the Occasion of Howard Barringer's 60th Birthday}
}
@inproceedings{conf/icfem/BoulgakovGR14,
title = {Computing Maximal Bisimulations.},
year = {2014},
booktitle = {ICFEM},
author = {{Alexandre Boulgakov} and {Thomas Gibson-Robinson} and {A. W. Roscoe 001}},
publisher = {Springer},
booktitle = {Formal Methods and Software Engineering - 16th International Conference on Formal Engineering Methods, ICFEM 2014, Luxembourg, Luxembourg, November 3-5, 2014. Proceedings}
}
@inproceedings{conf/tacas/Gibson-RobinsonABR14,
title = {FDR3 - A Modern Refinement Checker for CSP.},
year = {2014},
booktitle = {TACAS},
author = {{Thomas Gibson-Robinson} and {Philip J. Armstrong} and {Alexandre Boulgakov} and {A. W. Roscoe 001}},
publisher = {Springer},
booktitle = {Tools and Algorithms for the Construction and Analysis of Systems - 20th International Conference, TACAS 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014. Proceedings}
}
@inproceedings{conf/nfm/Gibson-Robinson15,
title = {Practical Partial Order Reduction for CSP.},
year = {2015},
booktitle = {NFM},
author = {{Thomas Gibson-Robinson} and {Henri Hansen} and {A. W. Roscoe 001} and {Xu Wang 001}},
publisher = {Springer},
booktitle = {NASA Formal Methods - 7th International Symposium, NFM 2015, Pasadena, CA, USA, April 27-29, 2015, Proceedings}
}
@inproceedings{conf/spw/AtashpendarRR15,
title = {Information Leakage Due to Revealing Randomly Selected Bits.},
year = {2015},
booktitle = {Security Protocols Workshop},
author = {{Arash Atashpendar} and {A. W. Roscoe 001} and {Peter Y. A. Ryan}},
publisher = {Springer},
booktitle = {Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers}
}
@inproceedings{journals/entcs/Roscoe15,
title = {The Expressiveness of CSP With Priority.},
year = {2015},
booktitle = {MFPS},
author = {{A. W. Roscoe 001}},
publisher = {Elsevier},
booktitle = {The 31st Conference on the Mathematical Foundations of Programming Semantics, MFPS 2015, Nijmegen, The Netherlands, June 22-25, 2015}
}
@inproceedings{conf/fm/AntoninoGR16,
title = {Tighter Reachability Criteria for Deadlock-Freedom Analysis.},
year = {2016},
booktitle = {FM},
author = {{Pedro R. G. Antonino} and {Thomas Gibson-Robinson} and {A. W. Roscoe 001}},
booktitle = {FM 2016: Formal Methods - 21st International Symposium, Limassol, Cyprus, November 9-11, 2016, Proceedings}
}
@inproceedings{conf/ifm/AntoninoGR16,
title = {Efficient Deadlock-Freedom Checking Using Local Analysis and SAT Solving.},
year = {2016},
booktitle = {IFM},
author = {{Pedro Antonino} and {Thomas Gibson-Robinson} and {A. W. Roscoe 001}},
publisher = {Springer},
booktitle = {Integrated Formal Methods - 12th International Conference, IFM 2016, Reykjavik, Iceland, June 1-5, 2016, Proceedings}
}
@inproceedings{conf/spw/Roscoe16,
title = {Detecting Failed Attacks on Human-Interactive Security Protocols.},
year = {2016},
booktitle = {Security Protocols Workshop},
author = {{A. W. Roscoe 001}},
publisher = {Springer},
booktitle = {Security Protocols XXIV - 24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised Selected Papers}
}
@inproceedings{conf/spw/Roscoe16a,
title = {Detecting Failed Attacks on Human-Interactive Security Protocols (Transcript of Discussion).},
year = {2016},
booktitle = {Security Protocols Workshop},
author = {{A. W. Roscoe 001}},
publisher = {Springer},
booktitle = {Security Protocols XXIV - 24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised Selected Papers}
}
@article{journals/corr/Roscoe16,
title = {Card games as pointer structures: case studies in mobile CSP modelling.},
year = {2016},
journal = {CoRR},
author = {{A. W. Roscoe 001}}
}
@inproceedings{journals/entcs/MestelR16,
title = {Reducing Complex CSP Models to Traces via Priority.},
year = {2016},
booktitle = {MFPS},
author = {{David Mestel} and {A. W. Roscoe 001}},
publisher = {Elsevier},
booktitle = {The Thirty-second Conference on the Mathematical Foundations of Programming Semantics, MFPS 2016, Carnegie Mellon University, Pittsburgh, PA, USA, May 23-26, 2016}
}
@article{journals/fac/BoulgakovGR16,
title = {Computing maximal weak and other bisimulations.},
year = {2016},
journal = {Formal Aspects Comput.},
author = {{Alexandre Boulgakov} and {Thomas Gibson-Robinson} and {A. W. Roscoe 001}}
}
@article{journals/fac/OliveiraARSMR16,
title = {Rigorous development of component-based systems using component metadata and patterns.},
year = {2016},
journal = {Formal Aspects Comput.},
author = {{Marcel Vinícius Medeiros Oliveira} and {Pedro Antonino} and {Rodrigo Ramos} and {Augusto Sampaio} and {Alexandre Cabral Mota} and {A. W. Roscoe 001}}
}
@article{journals/sttt/Gibson-Robinson16,
title = {FDR3: a parallel refinement checker for CSP.},
year = {2016},
journal = {Int. J. Softw. Tools Technol. Transf.},
author = {{Thomas Gibson-Robinson} and {Philip J. Armstrong} and {Alexandre Boulgakov} and {A. W. Roscoe 001}}
}
@inproceedings{conf/cw/SilomonR17,
title = {Software and Malware Capabilities: Opinions on (Inter)national Security.},
year = {2017},
booktitle = {CW},
author = {{Jantje A. M. Silomon} and {A. W. Roscoe 001}},
publisher = {IEEE Computer Society},
booktitle = {2017 International Conference on Cyberworlds, CW 2017, Chester, United Kingdom, September 20-22, 2017}
}
@inproceedings{conf/sbmf/AntoninoGR17,
title = {Checking Static Properties Using Conservative SAT Approximations for Reachability.},
year = {2017},
booktitle = {SBMF},
author = {{Pedro Antonino} and {Thomas Gibson-Robinson} and {A. W. Roscoe 001}},
publisher = {Springer},
booktitle = {Formal Methods: Foundations and Applications - 20th Brazilian Symposium, SBMF 2017, Recife, Brazil, November 29 - December 1, 2017, Proceedings}
}
@inproceedings{conf/spw/RoscoeR17,
title = {Auditable PAKEs: Approaching Fair Exchange Without a TTP.},
year = {2017},
booktitle = {Security Protocols Workshop},
author = {{A. W. Roscoe 001} and {Peter Y. A. Ryan}},
publisher = {Springer},
booktitle = {Security Protocols XXV - 25th International Workshop, Cambridge, UK, March 20-22, 2017, Revised Selected Papers}
}
@inproceedings{conf/tacas/AntoninoGR17,
title = {The Automatic Detection of Token Structures and Invariants Using SAT Checking.},
year = {2017},
booktitle = {TACAS (2)},
author = {{Pedro R. G. Antonino} and {Thomas Gibson-Robinson} and {A. W. Roscoe 001}},
booktitle = {Tools and Algorithms for the Construction and Analysis of Systems - 23rd International Conference, TACAS 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22-29, 2017, Proceedings, Part II}
}
@inproceedings{conf/icse/LiuLCCCR18,
title = {ReGuard: finding reentrancy bugs in smart contracts.},
year = {2018},
booktitle = {ICSE (Companion Volume)},
author = {{Chao Liu 032} and {Han Liu 010} and {Zhao Cao} and {Zhong Chen 001} and {Bangdao Chen} and {Bill Roscoe}},
publisher = {ACM},
booktitle = {Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, ICSE 2018, Gothenburg, Sweden, May 27 - June 03, 2018}
}
@article{journals/corr/abs-1802-00703,
title = {From Clustering Supersequences to Entropy Minimizing Subsequences for Single and Double Deletions.},
year = {2018},
journal = {CoRR},
author = {{Arash Atashpendar} and {Marc Beunardeau} and {Aisling Connolly} and {Rémi Géraud} and {David Mestel} and {A. W. Roscoe 001} and {Peter Y. A. Ryan}}
}
@article{journals/corr/abs-1807-11609,
title = {A Proof of Entropy Minimization for Outputs in Deletion Channels via Hidden Word Statistics.},
year = {2018},
journal = {CoRR},
author = {{Arash Atashpendar} and {David Mestel} and {A. W. Roscoe 001} and {Peter Y. A. Ryan}}
}
@incollection{reference/mc/CleavelandRS18,
title = {Process Algebra and Model Checking.},
year = {2018},
booktitle = {Handbook of Model Checking},
author = {{Rance Cleaveland} and {A. W. Roscoe 001} and {Scott A. Smolka}},
publisher = {Springer},
booktitle = {Handbook of Model Checking.}
}
@inproceedings{conf/birthday/RoscoeW19,
title = {Key Agreement via Protocols.},
year = {2019},
booktitle = {Foundations of Security, Protocols, and Equational Reasoning},
author = {{Andrew William Roscoe} and {Lei Wang}},
publisher = {Springer},
booktitle = {Foundations of Security, Protocols, and Equational Reasoning - Essays Dedicated to Catherine A. Meadows}
}
@article{journals/fac/AntoninoGR19,
title = {Efficient verification of concurrent systems using local-analysis-based approximations and SAT solving.},
year = {2019},
journal = {Formal Aspects Comput.},
author = {{Pedro Antonino} and {Thomas Gibson-Robinson} and {A. W. Roscoe 001}}
}
@article{journals/iacr/CouteauRR19,
title = {Partially-Fair Computation from Timed-Release Encryption and Oblivious Transfer.},
year = {2019},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Geoffroy Couteau} and {Bill Roscoe} and {Peter Y. A. Ryan}}
}
@article{journals/scp/CornelioR19,
title = {Guest editorial for the special issue from the 18th Brazilian Symposium on Formal Methods (SBMF 2015).},
year = {2019},
journal = {Sci. Comput. Program.},
author = {{Márcio Cornélio} and {A. W. Roscoe 001}}
}
@article{journals/tosem/AntoninoGR19,
title = {Efficient Verification of Concurrent Systems Using Synchronisation Analysis and SAT/SMT Solving.},
year = {2019},
journal = {ACM Trans. Softw. Eng. Methodol.},
author = {{Pedro Antonino} and {Thomas Gibson-Robinson} and {A. W. Roscoe 001}}
}
@inproceedings{conf/icissp/GuigaR20,
title = {Neural Network Security: Hiding CNN Parameters with Guided Grad-CAM.},
year = {2020},
booktitle = {ICISSP},
author = {{Linda Guiga} and {A. W. Roscoe 001}},
publisher = {SCITEPRESS},
booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, ICISSP 2020, Valletta, Malta, February 25-27, 2020.}
}
@article{journals/acta/MestelR20,
title = {Translating between models of concurrency.},
year = {2020},
journal = {Acta Informatica},
author = {{David Mestel} and {A. W. Roscoe 001}}
}
@article{journals/corr/abs-2002-02710,
title = {Formalising and verifying smart contracts with Solidifier: a bounded model checker for Solidity.},
year = {2020},
journal = {CoRR},
author = {{Pedro Antonino} and {A. W. Roscoe 001}}
}
@incollection{books/mc/21/Brookes021,
title = {CSP: A Practical Process Algebra.},
year = {2021},
booktitle = {Theories of Programming},
author = {{Stephen D. Brookes} and {A. W. Roscoe 001}},
publisher = {ACM / Morgan & Claypool},
booktitle = {Theories of Programming: The Life and Works of Tony Hoare}
}
@inproceedings{conf/ccsw-ws/AntoninoW021,
title = {Guardian: Symbolic Validation of Orderliness in SGX Enclaves.},
year = {2021},
booktitle = {CCSW},
author = {{Pedro Antonino} and {Wojciech Aleksander Woloszyn} and {A. W. Roscoe 001}},
publisher = {ACM},
booktitle = {CCSW@CCS '21: Proceedings of the 2021 on Cloud Computing Security Workshop, Virtual Event, Republic of Korea, 15 November 2021}
}
@inproceedings{conf/sac/Antonino021,
title = {Solidifier: bounded model checking solidity using lazy contract deployment and precise memory modelling.},
year = {2021},
booktitle = {SAC},
author = {{Pedro Antonino} and {A. W. Roscoe 001}},
publisher = {ACM},
booktitle = {SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, Republic of Korea, March 22-26, 2021}
}
@article{journals/corr/abs-2112-00346,
title = {Trusted And Confidential Program Analysis.},
year = {2021},
journal = {CoRR},
author = {{Han Liu 010} and {Pedro Antonino} and {Zhiqiang Yang} and {Chao Liu 032} and {A. W. Roscoe 001}}
}
@inproceedings{conf/icbc2/LiuZCR22,
title = {Committable: A Decentralised and Trustless Open-Source Protocol.},
year = {2022},
booktitle = {ICBC},
author = {{Han Liu 010} and {Huafeng Zhang} and {Bangdao Chen} and {A. W. Roscoe 001}},
publisher = {IEEE},
booktitle = {IEEE International Conference on Blockchain and Cryptocurrency, ICBC 2022, Shanghai, China, May 2-5, 2022}
}
@inproceedings{conf/sefm/AntoninoFSR22,
title = {Specification is Law: Safe Creation and Upgrade of Ethereum Smart Contracts.},
year = {2022},
booktitle = {SEFM},
author = {{Pedro Antonino} and {Juliandson Ferreira} and {Augusto Sampaio} and {A. W. Roscoe 001}},
publisher = {Springer},
booktitle = {Software Engineering and Formal Methods - 20th International Conference, SEFM 2022, Berlin, Germany, September 26-30, 2022, Proceedings}
}
@article{journals/corr/abs-2205-05594,
title = {Delay Encryption by Cubing.},
year = {2022},
journal = {CoRR},
author = {{Ivo Maffei} and {A. W. Roscoe 001}}
}
@article{journals/sttt/AntoninoGR22,
title = {Approximate verification of concurrent systems using token structures and invariants.},
year = {2022},
journal = {Int. J. Softw. Tools Technol. Transf.},
author = {{Pedro Antonino} and {Thomas Gibson-Robinson} and {A. W. Roscoe 001}}
}
@inproceedings{conf/birthday/0001AL23,
title = {The Consensus Machine: Formalising Consensus in the Presence of Malign Agents.},
year = {2023},
booktitle = {Theories of Programming and Formal Methods},
author = {{A. W. Roscoe 001} and {Pedro Antonino} and {Jonathan Lawrence}},
publisher = {Springer},
booktitle = {Theories of Programming and Formal Methods - Essays Dedicated to Jifeng He on the Occasion of His 80th Birthday}
}
@inproceedings{conf/esorics/MaffeiR23,
title = {Optimally-Fair Multi-party Exchange Without Trusted Parties.},
year = {2023},
booktitle = {ESORICS (1)},
author = {{Ivo Maffei} and {A. W. Roscoe 001}},
publisher = {Springer},
booktitle = {Computer Security - ESORICS 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part I}
}
@inproceedings{conf/fc/MaffeiR23,
title = {Optimally-Fair Exchange of Secrets via Delay Encryption and Commutative Blinding.},
year = {2023},
booktitle = {FC (1)},
author = {{Ivo Maffei} and {Andrew William Roscoe}},
publisher = {Springer},
booktitle = {Financial Cryptography and Data Security - 27th International Conference, FC 2023, Bol, Brač, Croatia, May 1-5, 2023, Revised Selected Papers, Part I}
}