


Остановите войну!
for scientists:


default search action
A. W. Roscoe 0001
Andrew William Roscoe – Bill Roscoe
Person information

- affiliation: University of Oxford, UK
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [c84]A. W. Roscoe
, Pedro Antonino
, Jonathan Lawrence:
The Consensus Machine: Formalising Consensus in the Presence of Malign Agents. Theories of Programming and Formal Methods 2023: 136-162 - 2022
- [j40]Pedro Antonino, Thomas Gibson-Robinson, A. W. Roscoe:
Approximate verification of concurrent systems using token structures and invariants. Int. J. Softw. Tools Technol. Transf. 24(4): 613-633 (2022) - [c83]Han Liu, Huafeng Zhang
, Bangdao Chen, A. W. Roscoe:
Committable: A Decentralised and Trustless Open-Source Protocol. ICBC 2022: 1-2 - [c82]Pedro Antonino, Juliandson Ferreira, Augusto Sampaio, A. W. Roscoe:
Specification is Law: Safe Creation and Upgrade of Ethereum Smart Contracts. SEFM 2022: 227-243 - [i16]Ivo Maffei, A. W. Roscoe:
Delay Encryption by Cubing. CoRR abs/2205.05594 (2022) - [i15]Pedro Antonino, Juliandson Ferreira, Augusto Sampaio, A. W. Roscoe:
Specification is Law: Safe Creation and Upgrade of Ethereum Smart Contracts. CoRR abs/2205.07529 (2022) - 2021
- [c81]Geoffroy Couteau, A. W. Roscoe, Peter Y. A. Ryan:
Partially-Fair Computation from Timed-Release Encryption and Oblivious Transfer. ACISP 2021: 330-349 - [c80]Pedro Antonino, Wojciech Aleksander Woloszyn, A. W. Roscoe:
Guardian: Symbolic Validation of Orderliness in SGX Enclaves. CCSW@CCS 2021: 111-123 - [c79]Pedro Antonino, A. W. Roscoe:
Solidifier: bounded model checking solidity using lazy contract deployment and precise memory modelling. SAC 2021: 1788-1797 - [p5]Stephen D. Brookes, A. W. Roscoe:
CSP: A Practical Process Algebra. Theories of Programming 2021: 187-222 - [i14]Pedro Antonino, Wojciech Aleksander Woloszyn, A. W. Roscoe:
Guardian: symbolic validation of orderliness in SGX enclaves. CoRR abs/2105.05962 (2021) - [i13]Han Liu, Pedro Antonino, Zhiqiang Yang, Chao Liu, A. W. Roscoe:
Trusted And Confidential Program Analysis. CoRR abs/2112.00346 (2021) - 2020
- [j39]David Mestel, A. W. Roscoe
:
Translating between models of concurrency. Acta Informatica 57(3-5): 403-438 (2020) - [c78]Linda Guiga, A. W. Roscoe:
Neural Network Security: Hiding CNN Parameters with Guided Grad-CAM. ICISSP 2020: 611-618 - [i12]Pedro Antonino, A. W. Roscoe:
Formalising and verifying smart contracts with Solidifier: a bounded model checker for Solidity. CoRR abs/2002.02710 (2020)
2010 – 2019
- 2019
- [j38]Pedro Antonino
, Thomas Gibson-Robinson, A. W. Roscoe:
Efficient verification of concurrent systems using local-analysis-based approximations and SAT solving. Formal Aspects Comput. 31(3): 375-409 (2019) - [j37]Márcio Cornélio, A. W. Roscoe:
Guest editorial for the special issue from the 18th Brazilian Symposium on Formal Methods (SBMF 2015). Sci. Comput. Program. 181: 82-83 (2019) - [j36]Pedro Antonino, Thomas Gibson-Robinson, A. W. Roscoe:
Efficient Verification of Concurrent Systems Using Synchronisation Analysis and SAT/SMT Solving. ACM Trans. Softw. Eng. Methodol. 28(3): 18:1-18:43 (2019) - [c77]Andrew William Roscoe, Lei Wang:
Key Agreement via Protocols. Foundations of Security, Protocols, and Equational Reasoning 2019: 156-166 - [i11]David Mestel, A. W. Roscoe:
Translating between models of concurrency. CoRR abs/1904.09875 (2019) - [i10]Geoffroy Couteau, Bill Roscoe, Peter Y. A. Ryan:
Partially-Fair Computation from Timed-Release Encryption and Oblivious Transfer. IACR Cryptol. ePrint Arch. 2019: 1281 (2019) - 2018
- [c76]Chao Liu, Han Liu, Zhao Cao, Zhong Chen, Bangdao Chen, Bill Roscoe:
ReGuard: finding reentrancy bugs in smart contracts. ICSE (Companion Volume) 2018: 65-68 - [p4]Rance Cleaveland, A. W. Roscoe, Scott A. Smolka:
Process Algebra and Model Checking. Handbook of Model Checking 2018: 1149-1195 - [e5]Klaus Havelund, Jan Peleska, Bill Roscoe, Erik P. de Vink:
Formal Methods - 22nd International Symposium, FM 2018, Held as Part of the Federated Logic Conference, FloC 2018, Oxford, UK, July 15-17, 2018, Proceedings. Lecture Notes in Computer Science 10951, Springer 2018, ISBN 978-3-319-95581-0 [contents] - [i9]Arash Atashpendar, Marc Beunardeau, Aisling Connolly, Rémi Géraud, David Mestel, A. W. Roscoe, Peter Y. A. Ryan:
From Clustering Supersequences to Entropy Minimizing Subsequences for Single and Double Deletions. CoRR abs/1802.00703 (2018) - [i8]Arash Atashpendar, David Mestel, A. W. Roscoe, Peter Y. A. Ryan:
A Proof of Entropy Minimization for Outputs in Deletion Channels via Hidden Word Statistics. CoRR abs/1807.11609 (2018) - 2017
- [c75]Jantje A. M. Silomon, A. W. Roscoe:
Software and Malware Capabilities: Opinions on (Inter)national Security. CW 2017: 96-102 - [c74]Pedro Antonino, Thomas Gibson-Robinson, A. W. Roscoe:
Checking Static Properties Using Conservative SAT Approximations for Reachability. SBMF 2017: 233-250 - [c73]A. W. Roscoe, Peter Y. A. Ryan
:
Auditable PAKEs: Approaching Fair Exchange Without a TTP. Security Protocols Workshop 2017: 278-297 - [c72]Pedro R. G. Antonino, Thomas Gibson-Robinson
, A. W. Roscoe:
The Automatic Detection of Token Structures and Invariants Using SAT Checking. TACAS (2) 2017: 249-265 - 2016
- [j35]Alexandre Boulgakov, Thomas Gibson-Robinson
, A. W. Roscoe:
Computing maximal weak and other bisimulations. Formal Aspects Comput. 28(3): 381-407 (2016) - [j34]Marcel Vinícius Medeiros Oliveira, Pedro Antonino, Rodrigo Ramos, Augusto Sampaio, Alexandre Cabral Mota, A. W. Roscoe:
Rigorous development of component-based systems using component metadata and patterns. Formal Aspects Comput. 28(6): 937-1004 (2016) - [j33]Thomas Gibson-Robinson, Philip J. Armstrong, Alexandre Boulgakov, A. W. Roscoe:
FDR3: a parallel refinement checker for CSP. Int. J. Softw. Tools Technol. Transf. 18(2): 149-167 (2016) - [c71]Pedro R. G. Antonino, Thomas Gibson-Robinson
, A. W. Roscoe:
Tighter Reachability Criteria for Deadlock-Freedom Analysis. FM 2016: 43-59 - [c70]Pedro Antonino, Thomas Gibson-Robinson
, A. W. Roscoe:
Efficient Deadlock-Freedom Checking Using Local Analysis and SAT Solving. IFM 2016: 345-360 - [c69]A. W. Roscoe:
Detecting Failed Attacks on Human-Interactive Security Protocols. Security Protocols Workshop 2016: 181-197 - [c68]A. W. Roscoe:
Detecting Failed Attacks on Human-Interactive Security Protocols (Transcript of Discussion). Security Protocols Workshop 2016: 198-205 - [c67]David Mestel, A. W. Roscoe:
Reducing Complex CSP Models to Traces via Priority. MFPS 2016: 237-252 - [e4]Márcio Cornélio, Bill Roscoe:
Formal Methods: Foundations and Applications - 18th Brazilian Symposium, SBMF 2015, Belo Horizonte, Brazil, September 21-22, 2015, Proceedings. Lecture Notes in Computer Science 9526, Springer 2016, ISBN 978-3-319-29472-8 [contents] - [i7]A. W. Roscoe:
Card games as pointer structures: case studies in mobile CSP modelling. CoRR abs/1611.08418 (2016) - 2015
- [c66]Thomas Gibson-Robinson
, Henri Hansen
, A. W. Roscoe, Xu Wang:
Practical Partial Order Reduction for CSP. NFM 2015: 188-203 - [c65]Arash Atashpendar, A. W. Roscoe, Peter Y. A. Ryan
:
Information Leakage Due to Revealing Randomly Selected Bits. Security Protocols Workshop 2015: 325-341 - [c64]A. W. Roscoe:
The Expressiveness of CSP With Priority. MFPS 2015: 387-401 - 2014
- [c63]Alexandre Boulgakov, Thomas Gibson-Robinson
, A. W. Roscoe:
Computing Maximal Bisimulations. ICFEM 2014: 11-26 - [c62]Thomas Gibson-Robinson
, Philip J. Armstrong, Alexandre Boulgakov, A. W. Roscoe:
FDR3 - A Modern Refinement Checker for CSP. TACAS 2014: 187-201 - [p3]Philip J. Armstrong, Gavin Lowe, Joël Ouaknine, Bill Roscoe:
Model checking Timed CSP. HOWARD-60 2014: 13-33 - 2013
- [j32]Joël Ouaknine
, Hristina Palikareva, A. W. Roscoe, James Worrell
:
A Static Analysis Framework for Livelock Freedom in CSP. Log. Methods Comput. Sci. 9(3) (2013) - [j31]A. W. Roscoe, Jian Huang:
Checking noninterference in Timed CSP. Formal Aspects Comput. 25(1): 3-35 (2013) - [j30]Xin Huang, Bangdao Chen, Andrew Markham
, Qinghua Wang
, Zheng Yan
, A. W. Roscoe:
Human interactive secure key and identity exchange protocols in body sensor networks. IET Inf. Secur. 7(1): 30-38 (2013) - [j29]Bangdao Chen, Long Hoang Nguyen, A. W. Roscoe:
Reverse Authentication in Financial Transactions and Identity Management. Mob. Networks Appl. 18(5): 712-727 (2013) - [c61]A. W. Roscoe, Philippa J. Hopcroft:
Slow Abstraction via Priority. Theories of Programming and Formal Methods 2013: 326-345 - 2012
- [j28]Xin Huang, Xiao Ma, Bangdao Chen, Andrew Markham
, Qinghua Wang
, Andrew William Roscoe:
Human Interactive Secure ID Management in Body Sensor Networks. J. Networks 7(9): 1400-1406 (2012) - [j27]Hristina Palikareva, Joël Ouaknine
, A. W. Roscoe:
SAT-solving in CSP trace refinement. Sci. Comput. Program. 77(10-11): 1178-1197 (2012) - [c60]Philip J. Armstrong, Michael Goldsmith, Gavin Lowe, Joël Ouaknine
, Hristina Palikareva, A. W. Roscoe, James Worrell
:
Recent Developments in FDR. CAV 2012: 699-704 - [c59]Long Hoang Nguyen, A. W. Roscoe:
Short-Output Universal Hash Functions and Their Use in Fast and Secure Data Authentication. FSE 2012: 326-345 - [c58]Xin Huang, Shangyuan Guo, Bangdao Chen, A. W. Roscoe:
Bootstrapping body sensor networks using human controlled LED-camera channels. ICITST 2012: 433-438 - [c57]Xin Huang, Rong Fu, Bangdao Chen, Tingting Zhang, A. W. Roscoe:
User interactive Internet of things privacy preserved access control. ICITST 2012: 597-602 - [c56]Bangdao Chen, A. W. Roscoe:
Social Networks for Importing and Exporting Security. Monterey Workshop 2012: 132-147 - [i6]Long Hoang Nguyen, Andrew William Roscoe:
Simple construction of epsilon-biased distribution. IACR Cryptol. ePrint Arch. 2012: 429 (2012) - 2011
- [j26]Long Hoang Nguyen, A. W. Roscoe:
Authentication protocols based on low-bandwidth unspoofable channels: A comparative survey. J. Comput. Secur. 19(1): 139-201 (2011) - [c55]Joël Ouaknine
, Hristina Palikareva, A. W. Roscoe, James Worrell
:
Static Livelock Analysis in CSP. CONCUR 2011: 389-403 - [c54]Xin Huang, Qinghua Wang
, Chen Bangdao, Andrew Markham
, Riku Jäntti
, A. W. Roscoe:
Body sensor network key distribution using human interactive channels. ISABEL 2011: 143:1-143:5 - [c53]Bangdao Chen, Long Hoang Nguyen, Andrew William Roscoe:
When Context Is Better Than Identity: Authentication by Context Using Empirical Channels. Security Protocols Workshop 2011: 115-125 - [c52]Chen Bangdao, A. W. Roscoe:
Mobile Electronic Identity: Securing Payment on Mobile Phones. WISTP 2011: 22-37 - [r1]A. W. Roscoe, Jim Davies:
CSP (Communicating Sequential Processes). Encyclopedia of Parallel Computing 2011: 478-482 - [i5]Long Hoang Nguyen, Andrew William Roscoe:
On the construction of digest functions for manual authentication protocols. IACR Cryptol. ePrint Arch. 2011: 116 (2011) - 2010
- [b2]A. W. Roscoe:
Understanding Concurrent Systems. Texts in Computer Science, Springer 2010, ISBN 978-1-84882-257-3, pp. I-XVIII, 1-527 - [c51]Ronald Kainda, Ivan Flechais, A. W. Roscoe:
Security and Usability: Analysis and Evaluation. ARES 2010: 275-282 - [c50]Chen Bangdao, A. W. Roscoe, Ronald Kainda, Long Hoang Nguyen:
The Missing Link: Human Interactive Security Protocols in Mobile Payment. IWSEC (Short Papers) 2010: 94-109 - [c49]Ronald Kainda, Ivan Flechais, A. W. Roscoe:
Two heads are better than one: security and usability of device associations in group scenarios. SOUPS 2010 - [c48]Ronald Kainda, Ivan Flechais, A. W. Roscoe:
Secure and Usable Out-Of-Band Channels for Ad Hoc Mobile Device Interactions. WISTP 2010: 308-315 - [p2]Clifford B. Jones
, A. W. Roscoe:
Insight, Inspiration and Collaboration. Reflections on the Work of C. A. R. Hoare 2010: 1-32 - [p1]A. W. Roscoe:
CSP is Expressive Enough for π. Reflections on the Work of C. A. R. Hoare 2010: 371-404 - [e3]A. W. Roscoe, Clifford B. Jones
, Kenneth R. Wood:
Reflections on the Work of C. A. R. Hoare. Springer 2010, ISBN 978-1-84882-911-4 [contents] - [i4]Long Hoang Nguyen, A. W. Roscoe:
Authentication protocols based on low-bandwidth unspoofable channels: a comparative survey. IACR Cryptol. ePrint Arch. 2010: 206 (2010)
2000 – 2009
- 2009
- [j25]Hristina Palikareva, Joël Ouaknine, Bill Roscoe:
Faster FDR Counterexample Generation Using SAT-Solving. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 23 (2009) - [j24]A. W. Roscoe:
Revivals, stuckness and the hierarchy of CSP models. J. Log. Algebraic Methods Program. 78(3): 163-190 (2009) - [c47]A. W. Roscoe, Philip J. Armstrong, Pragyesh:
Local Search in Model Checking. ATVA 2009: 22-38 - [c46]Ronald Kainda, Ivan Flechais, A. W. Roscoe:
Usability and security of out-of-band channels in secure device pairing protocols. SOUPS 2009 - [e2]Michael Goldsmith, Bill Roscoe:
Proceedings of the Seventh International Workshop on Automated Verification of Critical Systems, AVoCS 2007, Oxford, UK, September 10-12, 2007. Electronic Notes in Theoretical Computer Science 250(1), Elsevier 2009 [contents] - [i3]Long Hoang Nguyen, A. W. Roscoe:
Separating two roles of hashing in one-way message authentication. IACR Cryptol. ePrint Arch. 2009: 3 (2009) - [i2]Long Hoang Nguyen, A. W. Roscoe:
Efficient group authentication protocols based on human interaction. IACR Cryptol. ePrint Arch. 2009: 150 (2009) - [i1]Long Hoang Nguyen, A. W. Roscoe:
New combinatorial bounds for universal hash functions. IACR Cryptol. ePrint Arch. 2009: 153 (2009) - 2008
- [j23]Ranko Lazic, Thomas Christopher Newcomb, Joël Ouaknine, A. W. Roscoe, James Worrell:
Nets with Tokens which Carry Data. Fundam. Informaticae 88(3): 251-274 (2008) - [j22]Long Hoang Nguyen, A. W. Roscoe:
Authenticating ad hoc networks by comparison of short digests. Inf. Comput. 206(2-4): 250-271 (2008) - [c45]Nick Moffat, Michael Goldsmith, Bill Roscoe:
A Representative Function Approach to Symmetry Exploitation for CSP Refinement Checking. ICFEM 2008: 258-277 - [c44]A. W. Roscoe:
The Three Platonic Models of Divergence-Strict CSP. ICTAC 2008: 23-49 - 2007
- [j21]Joy N. Reed, A. W. Roscoe, Jane E. Sinclair:
Responsiveness and stable revivals. Formal Aspects Comput. 19(3): 303-319 (2007) - [c43]Ranko Lazic, Thomas Christopher Newcomb, Joël Ouaknine, A. W. Roscoe, James Worrell:
Nets with Tokens Which Carry Data. ICATPN 2007: 301-320 - [c42]Michael Goldsmith, Bill Roscoe:
Preface. AVoCS 2007: 1-2 - 2006
- [c41]A. W. Roscoe, Zhenzhong Wu:
Verifying Statemate Statecharts Using CSP and FDR. ICFEM 2006: 324-341 - [c40]Sadie Creese, Michael Goldsmith, Bill Roscoe, Ming Xiao:
Bootstrapping multi-party ad-hoc security. SAC 2006: 369-375 - [c39]Jian Huang, A. W. Roscoe:
Extending noninterference properties to the timed world. SAC 2006: 376-383 - 2005
- [j20]A. W. Roscoe:
On the expressive power of CSP refinement. Formal Aspects Comput. 17(2): 93-112 (2005) - [c38]Sadie Creese, Michael Goldsmith, Richard Harrison, Bill Roscoe, Paul Whittaker, Irfan Zakiuddin:
Exploiting Empirical Engagement in Authentication Protocol Design. SPC 2005: 119-133 - [c37]Lee Momtahan, Andrew P. Martin
, A. W. Roscoe:
A Taxonomy of Web Services Using CSP. WLFM@FM 2005: 71-87 - [c36]Joy N. Reed, A. W. Roscoe, Jane E. Sinclair:
Machine-Verifiable Responsiveness. AVoCS 2005: 185-200 - [c35]A. W. Roscoe:
Confluence Thanks to Extensional Determinism. APC 25 2005: 305-309 - [c34]E. Kleiner, A. W. Roscoe:
On the Relationship Between Web Services Security and Traditional Protocols. MFPS 2005: 583-603 - 2004
- [j19]Joy N. Reed, Jane E. Sinclair, A. W. Roscoe:
Responsiveness of interoperating components. Formal Aspects Comput. 16(4): 394-411 (2004) - [j18]Philippa J. Broadfoot, A. W. Roscoe:
Embedding agents within the intruder to detect parallel attacks. J. Comput. Secur. 12(3-4): 379-408 (2004) - [j17]Ranko Lazic, Thomas Christopher Newcomb, A. W. Roscoe:
On model checking data-independent systems with arrays without reset. Theory Pract. Log. Program. 4(5-6): 659-693 (2004) - [c33]A. W. Roscoe:
Seeing Beyond Divergence. 25 Years Communicating Sequential Processes 2004: 15-35 - [c32]Ranko Lazic, Thomas Christopher Newcomb, A. W. Roscoe:
On Model Checking Data-Independent Systems with Arrays with Whole-Array Operations. 25 Years Communicating Sequential Processes 2004: 275-291 - [c31]Xu Wang, A. W. Roscoe, Ranko Lazic:
Relating Data Independent Trace Checks in CSP with UNITY Reachability under a Normality Assumption. IFM 2004: 247-266 - [c30]Ranko Lazic, Thomas Christopher Newcomb, Bill Roscoe:
Polymorphic Systems with Arrays, 2-Counter Machines and Multiset Rewriting. INFINITY 2004: 61-86 - 2003
- [c29]Michael Goldsmith, Nick Moffat, Bill Roscoe, Tim Whitworth, Irfan Zakiuddin:
Watchdog Transformations for Property-Oriented Model-Checking. FME 2003: 600-616 - [c28]Sadie Creese, Michael Goldsmith, Bill Roscoe, Irfan Zakiuddin:
Authentication for Pervasive Computing. SPC 2003: 116-129 - 2002
- [c27]Philippa J. Broadfoot, A. W. Roscoe:
Capturing Parallel Attacks within the Data Independence Framework. CSFW 2002: 147-159 - 2000
- [c26]Philippa J. Broadfoot, Gavin Lowe, A. W. Roscoe:
Automating Data Independence. ESORICS 2000: 175-190 - [c25]S. J. Creese, A. W. Roscoe:
Data Independent Induction over Structured Networks. PDPTA 2000 - [c24]Philippa J. Broadfoot, A. W. Roscoe:
Tutorial on FDR and Its Applications. SPIN 2000: 322 - [c23]A. W. Roscoe, Philippa J. Broadfoot, Gavin Lowe:
Data independent verification of crypto-protocols. MFCSIT 2000: 359
1990 – 1999
- 1999
- [j16]A. W. Roscoe, Philippa J. Broadfoot:
Proving Security Protocols with Model Checkers by Data Independence Techniques. J. Comput. Secur. 7(1): 147-190 (1999) - [j15]George M. Reed, A. W. Roscoe:
The Timed Failures-Stability Model for CSP. Theor. Comput. Sci. 211(1-2): 85-127 (1999) - [c22]A. W. Roscoe, M. H. Goldsmith:
What Is Intransitive Noninterference? CSFW 1999: 228-238 - [c21]S. J. Creese, A. W. Roscoe:
Verifying an infinite family of inductions simultaneously using data independence and FDR. FORTE 1999: 437-452 - [c20]Ranko Lazic, Bill Roscoe:
Data Independence with Generalised Predicate Symbols. PDPTA 1999: 319-326 - [c19]S. J. Creese, A. W. Roscoe:
Formal Verification of Arbitrary Network Topologies. PDPTA 1999: 1033-1039 - 1998
- [c18]A. W. Roscoe:
Proving Security Protocols with Model Checkers by Data Independence Techniques. CSFW 1998: 84-95 - 1997
- [j14]Gavin Lowe, A. W. Roscoe:
Using CSP to Detect Errors in the TMN Protocol. IEEE Trans. Software Eng. 23(10): 659-669 (1997) - 1996
- [j13]A. W. Roscoe, Jim Woodcock
, Lars Wulf:
Non-interference through Determinism. J. Comput. Secur. 4(1): 27-54 (1996) - [c17]