Follow
Bill Roscoe (A.W. Roscoe)
Bill Roscoe (A.W. Roscoe)
Professor of Computer Science, Oxford University
Verified email at cs.ox.ac.uk - Homepage
Title
Cited by
Cited by
Year
The Theory and Practice of Concurrency. international series in computer science
AW Roscoe
Prentice-Hall, 1997
2922*1997
A theory of communicating sequential processes
SD Brookes, CAR Hoare, AW Roscoe
Journal of the ACM (JACM) 31 (3), 560-599, 1984
18271984
Modelling and Analysis of Security Protocols: the CSP approach
P Ryan, S Schneider, M Goldsmith, G Lowe, AW Roscoe
Addison Wesley, 2001
8362001
A timed model for communicating sequential processes
GM Reed, AW Roscoe
International Colloquium on Automata, Languages, and Programming, 314-323, 1986
7741986
Laws of programming
CAR Hoare, IJ Hayes, H Jifeng, CC Morgan, AW Roscoe, JW Sanders, ...
Communications of the ACM 30 (8), 672-686, 1987
6001987
Understanding concurrent systems
AW Roscoe
Springer-Verlag New York Inc, 2010
4932010
Model− checking CSP
B Roscoe
A classical Mind, Essays in honour of C.A.R. Hoare, 1994
4601994
An improved failures model for communicating processes
SD Brookes, AW Roscoe
International Conference on Concurrency, 281-305, 1984
3811984
The laws of occam programming
AW Roscoe, CAR Hoare
Theoretical Computer Science 60 (2), 177-229, 1988
3551988
FDR3—A Modern Refinement Checker for CSP
T Gibson-Robinson, P Armstrong, A Boulgakov, AW Roscoe
TACAS, 2014
3402014
Reguard: finding reentrancy bugs in smart contracts
C Liu, H Liu, Z Cao, Z Chen, B Chen, B Roscoe
Proceedings of the 40th International Conference on Software Engineering …, 2018
3202018
Modelling and verifying key-exchange protocols using CSP and FDR
AW Roscoe
Proceedings The Eighth IEEE Computer Security Foundations Workshop, 98-107, 1995
3141995
Using CSP to detect errors in the TMN protocol
G Lowe, AW Roscoe
Software Engineering, IEEE Transactions on 23 (10), 659-669, 1997
3091997
CSP and determinism in security modelling
AW Roscoe
Proceedings 1995 IEEE Symposium on Security and Privacy, 114-127, 1995
2941995
Star covering properties
EK Van Douwen, GM Reed, AW Roscoe, IJ Tree
Topology and its Applications 39 (1), 71-103, 1991
2681991
Security and usability: Analysis and evaluation
R Kainda, I Flechais, AW Roscoe
2010 international conference on availability, reliability and security, 275-282, 2010
2052010
Concepts of digital topology
TY Kong, AW Roscoe, A Rosenfeld
Topology and its Applications 46, 1992
1891992
Hierarchical compression for model-checking CSP or how to check 10^20 dining philosophers for deadlock
AW Roscoe, PHB Gardiner, MH Goldsmith, JR Hulance, DM Jackson, ...
Tools and Algorithms for the Construction and Analysis of Systems, 133-152, 1995
1781995
Non-interference through determinism
AW Roscoe, JCP Woodcock, L Wulf
Computer Security—ESORICS 94: Third European Symposium on Research in …, 1994
1721994
Usability and security of out-of-band channels in secure device pairing protocols
R Kainda, I Flechais, AW Roscoe
Proceedings of the 5th Symposium on Usable Privacy and Security, 1-12, 2009
1682009
The system can't perform the operation now. Try again later.
Articles 1–20