Follow
Bill Roscoe (A.W. Roscoe)
Bill Roscoe (A.W. Roscoe)
Professor of Computer Science, Oxford University
Verified email at cs.ox.ac.uk - Homepage
Title
Cited by
Cited by
Year
The Theory and Practice of Concurrency. international series in computer science
AW Roscoe
Prentice-Hall, 1997
2889*1997
A theory of communicating sequential processes
SD Brookes, CAR Hoare, AW Roscoe
Journal of the ACM (JACM) 31 (3), 560-599, 1984
18011984
Modelling and Analysis of Security Protocols: the CSP approach
P Ryan, S Schneider, M Goldsmith, G Lowe, AW Roscoe
Addison Wesley, 2001
8212001
Laws of programming
CAR Hoare, IJ Hayes, H Jifeng, CC Morgan, AW Roscoe, JW Sanders, ...
Communications of the ACM 30 (8), 672-686, 1987
5961987
Understanding concurrent systems
AW Roscoe
Springer-Verlag New York Inc, 2010
4722010
Model− checking CSP
B Roscoe
A classical Mind, Essays in honour of C.A.R. Hoare, 1994
4641994
A timed model for communicating sequential processes
AW Roscoe, GM Reed
Theoretical Computer Science 58, 1988
4231988
An improved failures model for communicating processes
SD Brookes, AW Roscoe
International Conference on Concurrency, 281-305, 1984
377*1984
A timed model for communicating sequential processes
GM Reed, AW Roscoe
Automata, Languages and Programming: 13th International Colloquium Rennes …, 1986
3561986
The laws of occam programming
AW Roscoe, CAR Hoare
Theoretical Computer Science 60 (2), 177-229, 1988
3341988
FDR3—A Modern Refinement Checker for CSP
T Gibson-Robinson, P Armstrong, A Boulgakov, AW Roscoe
TACAS, 2014
3112014
Using CSP to detect errors in the TMN protocol
G Lowe, AW Roscoe
Software Engineering, IEEE Transactions on 23 (10), 659-669, 1997
3041997
Modelling and verifying key-exchange protocols using CSP and FDR
AW Roscoe
Proceedings The Eighth IEEE Computer Security Foundations Workshop, 98-107, 1995
3041995
CSP and determinism in security modelling
AW Roscoe
Proceedings 1995 IEEE Symposium on Security and Privacy, 114-127, 1995
2911995
Star covering properties
EK Van Douwen, GM Reed, AW Roscoe, IJ Tree
Topology and its Applications 39 (1), 71-103, 1991
2441991
Reguard: finding reentrancy bugs in smart contracts
C Liu, H Liu, Z Cao, Z Chen, B Chen, B Roscoe
Proceedings of the 40th International Conference on Software Engineering …, 2018
2332018
Security and usability: Analysis and evaluation
R Kainda, I Flechais, AW Roscoe
2010 international conference on availability, reliability and security, 275-282, 2010
1962010
Concepts of digital topology
TY Kong, AW Roscoe, A Rosenfeld
Topology and its Applications 46, 1992
1871992
Hierarchical compression for model-checking CSP or how to check 10^20 dining philosophers for deadlock
AW Roscoe, PHB Gardiner, MH Goldsmith, JR Hulance, DM Jackson, ...
Tools and Algorithms for the Construction and Analysis of Systems, 133-152, 1995
1771995
Non-interference through determinism
AW Roscoe, JCP Woodcock, L Wulf
Computer Security—ESORICS 94: Third European Symposium on Research in …, 1994
1721994
The system can't perform the operation now. Try again later.
Articles 1–20