A. W. Roscoe
Orcid: 0000-0001-7557-3901Affiliations:
- University of Oxford, UK
According to our database1,
A. W. Roscoe
authored at least 144 papers
between 1982 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on id.loc.gov
-
on d-nb.info
On csauthors.net:
Bibliography
2024
Softw. Syst. Model., June, 2024
Proceedings of the Formal Methods: Foundations and Applications - 27th Brazilian Symposium, 2024
Proceedings of the Formal Aspects of Component Software - 20th International Conference, 2024
2023
Proceedings of the Financial Cryptography and Data Security, 2023
Proceedings of the Computer Security - ESORICS 2023, 2023
Proceedings of the Theories of Programming and Formal Methods, 2023
2022
Approximate verification of concurrent systems using token structures and invariants.
Int. J. Softw. Tools Technol. Transf., 2022
Proceedings of the Software Engineering and Formal Methods - 20th International Conference, 2022
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2022
2021
Solidifier: bounded model checking solidity using lazy contract deployment and precise memory modelling.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021
Proceedings of the CCSW@CCS '21: Proceedings of the 2021 on Cloud Computing Security Workshop, 2021
Proceedings of the Theories of Programming: The Life and Works of Tony Hoare, 2021
2020
Formalising and verifying smart contracts with Solidifier: a bounded model checker for Solidity.
CoRR, 2020
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020
2019
Efficient Verification of Concurrent Systems Using Synchronisation Analysis and SAT/SMT Solving.
ACM Trans. Softw. Eng. Methodol., 2019
Guest editorial for the special issue from the 18th Brazilian Symposium on Formal Methods (SBMF 2015).
Sci. Comput. Program., 2019
IACR Cryptol. ePrint Arch., 2019
Efficient verification of concurrent systems using local-analysis-based approximations and SAT solving.
Formal Aspects Comput., 2019
Proceedings of the Foundations of Security, Protocols, and Equational Reasoning, 2019
2018
Proceedings of the Handbook of Model Checking., 2018
A Proof of Entropy Minimization for Outputs in Deletion Channels via Hidden Word Statistics.
CoRR, 2018
From Clustering Supersequences to Entropy Minimizing Subsequences for Single and Double Deletions.
CoRR, 2018
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018
2017
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2017
Proceedings of the Security Protocols XXV, 2017
Proceedings of the Formal Methods: Foundations and Applications - 20th Brazilian Symposium, 2017
Proceedings of the 2017 International Conference on Cyberworlds, 2017
2016
Int. J. Softw. Tools Technol. Transf., 2016
Rigorous development of component-based systems using component metadata and patterns.
Formal Aspects Comput., 2016
Proceedings of the Thirty-second Conference on the Mathematical Foundations of Programming Semantics, 2016
Detecting Failed Attacks on Human-Interactive Security Protocols (Transcript of Discussion).
Proceedings of the Security Protocols XXIV, 2016
Proceedings of the Security Protocols XXIV, 2016
Proceedings of the Integrated Formal Methods - 12th International Conference, 2016
Proceedings of the FM 2016: Formal Methods, 2016
2015
Proceedings of the 31st Conference on the Mathematical Foundations of Programming Semantics, 2015
Proceedings of the Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31, 2015
Proceedings of the NASA Formal Methods - 7th International Symposium, 2015
2014
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2014
Proceedings of the Formal Methods and Software Engineering, 2014
Proceedings of the HOWARD-60: A Festschrift on the Occasion of Howard Barringer's 60th Birthday, 2014
2013
Mob. Networks Appl., 2013
Human interactive secure key and identity exchange protocols in body sensor networks.
IET Inf. Secur., 2013
Log. Methods Comput. Sci., 2013
Proceedings of the Theories of Programming and Formal Methods, 2013
2012
Proceedings of the Large-Scale Complex IT Systems. Development, Operation and Management, 2012
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012
Short-Output Universal Hash Functions and Their Use in Fast and Secure Data Authentication.
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012
Proceedings of the Computer Aided Verification - 24th International Conference, 2012
2011
Proceedings of the Encyclopedia of Parallel Computing, 2011
Authentication protocols based on low-bandwidth unspoofable channels: A comparative survey.
J. Comput. Secur., 2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication, 2011
When Context Is Better Than Identity: Authentication by Context Using Empirical Channels.
Proceedings of the Security Protocols XIX, 2011
Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies, 2011
Proceedings of the CONCUR 2011 - Concurrency Theory - 22nd International Conference, 2011
2010
Texts in Computer Science, Springer, ISBN: 978-1-84882-258-0, 2010
Proceedings of the Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 2010
Two heads are better than one: security and usability of device associations in group scenarios.
Proceedings of the Sixth Symposium on Usable Privacy and Security, 2010
The Missing Link: Human Interactive Security Protocols in Mobile Payment.
Proceedings of the Advances in Information and Computer Security, 2010
Proceedings of the Reflections on the Work of C. A. R. Hoare., 2010
Proceedings of the Reflections on the Work of C. A. R. Hoare., 2010
2009
J. Log. Algebraic Methods Program., 2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2009
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009
Proceedings of the Automated Technology for Verification and Analysis, 2009
2008
Proceedings of the Theoretical Aspects of Computing, 2008
A Representative Function Approach to Symmetry Exploitation for CSP Refinement Checking.
Proceedings of the Formal Methods and Software Engineering, 2008
2007
Proceedings of the Seventh International Workshop on Automated Verification of Critical Systems, 2007
2006
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006
Proceedings of the Formal Methods and Software Engineering, 2006
2005
Proceedings of the Workshop "Essays on Algebraic Process Calculi", 2005
Proceedings of the 5th International Workshop on Automated Verification of Critical Systems, 2005
Proceedings of the International Workshop on Web Languages and Formal Methods, 2005
Proceedings of the 21st Annual Conference on Mathematical Foundations of Programming Semantics, 2005
Proceedings of the Security in Pervasive Computing, Second International Conference, 2005
2004
Theory Pract. Log. Program., 2004
J. Comput. Secur., 2004
Proceedings of the 6th International Workshop on Verification of Infinite-State Systems, 2004
Relating Data Independent Trace Checks in CSP with UNITY Reachability under a Normality Assumption.
Proceedings of the Integrated Formal Methods, 4th International Conference, 2004
Proceedings of the Communicating Sequential Processes: The First 25 Years, 2004
Proceedings of the Communicating Sequential Processes: The First 25 Years, 2004
2003
Proceedings of the Security in Pervasive Computing, 2003
Proceedings of the FME 2003: Formal Methods, 2003
2002
Proceedings of the 15th IEEE Computer Security Foundations Workshop (CSFW-15 2002), 2002
2000
Proceedings of the First Irish Conference on the Mathematical Foundations of Computer Science and Information Technology, 2000
Proceedings of the SPIN Model Checking and Software Verification, 7th International SPIN Workshop, Stanford, CA, USA, August 30, 2000
Data Independent Induction over Structured Networks.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2000
1999
J. Comput. Secur., 1999
Data Independence with Generalised Predicate Symbols.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1999
Formal Verification of Arbitrary Network Topologies.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1999
Verifying an infinite family of inductions simultaneously using data independence and FDR.
Proceedings of the Formal Methods for Protocol Engineering and Distributed Systems, 1999
Proceedings of the 12th IEEE Computer Security Foundations Workshop, 1999
1998
Proceedings of the 11th IEEE Computer Security Foundations Workshop, 1998
1997
1996
Proceedings of the Ninth IEEE Computer Security Foundations Workshop, March 10, 1996
1995
Hierarchical Compression for Model-Checking CSP or How to Check 10<sup>20</sup> Dining Philosophers for Deadlock.
Proceedings of the Tools and Algorithms for Construction and Analysis of Systems, 1995
Proceedings of the 1995 IEEE Symposium on Security and Privacy, 1995
Proceedings of the Eighth IEEE Computer Security Foundations Workshop (CSFW '95), 1995
Proceedings of the Eighth IEEE Computer Security Foundations Workshop (CSFW '95), 1995
1993
1992
1991
Proceedings of the Real-Time: Theory in Practice, 1991
1989
Proceedings of the Mathematical Foundations of Programming Semantics, 5th International Conference, Tulane University, New Orleans, Louisiana, USA, March 29, 1989
Analysing <i>TM<sub>FS</sub></i>: a Study of Nondeterminism in Real-Time Concurrency.
Proceedings of the Concurrency: Theory, 1989
1988
SIAM J. Comput., 1988
1987
Proceedings of the Mathematical Foundations of Programming Language Semantics, 1987
1985
Comput. Vis. Graph. Image Process., 1985
1984
Programs as Executable Predicates.
Proceedings of the International Conference on Fifth Generation Computer Systems, 1984
Proceedings of the Seminar on Concurrency, 1984
1983
Proceedings of the Analysis of Concurrent Systems, 1983
Specifying problem one using the failure sets model for CSP and deriving CSP processes which meett this specification.
Proceedings of the Analysis of Concurrent Systems, 1983
1982