Follow
Bill Roscoe (A.W. Roscoe)
Bill Roscoe (A.W. Roscoe)
Emeritus Professor of Computer Science, Oxford University
Verified email at cs.ox.ac.uk - Homepage
Title
Cited by
Cited by
Year
The Theory and Practice of Concurrency. international series in computer science
AW Roscoe
Prentice-Hall, 1997
2929*1997
A theory of communicating sequential processes
SD Brookes, CAR Hoare, AW Roscoe
Journal of the ACM (JACM) 31 (3), 560-599, 1984
18171984
Modelling and Analysis of Security Protocols: the CSP approach
P Ryan, S Schneider, M Goldsmith, G Lowe, AW Roscoe
Addison Wesley, 2001
8342001
A timed model for communicating sequential processes
GM Reed, AW Roscoe
International Colloquium on Automata, Languages, and Programming, 314-323, 1986
7821986
Laws of programming
CAR Hoare, IJ Hayes, H Jifeng, CC Morgan, AW Roscoe, JW Sanders, ...
Communications of the ACM 30 (8), 672-686, 1987
6021987
Understanding concurrent systems
AW Roscoe
Springer-Verlag New York Inc, 2010
4982010
Model− checking CSP
B Roscoe
A classical Mind, Essays in honour of C.A.R. Hoare, 1994
4651994
An improved failures model for communicating processes
SD Brookes, AW Roscoe
International Conference on Concurrency, 281-305, 1984
3771984
The laws of occam programming
AW Roscoe, CAR Hoare
Theoretical Computer Science 60 (2), 177-229, 1988
3561988
FDR3—A Modern Refinement Checker for CSP
T Gibson-Robinson, P Armstrong, A Boulgakov, AW Roscoe
TACAS, 2014
3412014
Reguard: finding reentrancy bugs in smart contracts
C Liu, H Liu, Z Cao, Z Chen, B Chen, B Roscoe
Proceedings of the 40th International Conference on Software Engineering …, 2018
3372018
Modelling and verifying key-exchange protocols using CSP and FDR
AW Roscoe
Proceedings The Eighth IEEE Computer Security Foundations Workshop, 98-107, 1995
3161995
Using CSP to detect errors in the TMN protocol
G Lowe, AW Roscoe
Software Engineering, IEEE Transactions on 23 (10), 659-669, 1997
3081997
CSP and determinism in security modelling
AW Roscoe
Proceedings 1995 IEEE Symposium on Security and Privacy, 114-127, 1995
2951995
Star covering properties
EK Van Douwen, GM Reed, AW Roscoe, IJ Tree
Topology and its Applications 39 (1), 71-103, 1991
2661991
Security and usability: Analysis and evaluation
R Kainda, I Flechais, AW Roscoe
2010 international conference on availability, reliability and security, 275-282, 2010
2072010
Concepts of digital topology
TY Kong, AW Roscoe, A Rosenfeld
Topology and its Applications 46, 1992
1891992
Hierarchical compression for model-checking CSP or how to check 10^20 dining philosophers for deadlock
AW Roscoe, PHB Gardiner, MH Goldsmith, JR Hulance, DM Jackson, ...
Tools and Algorithms for the Construction and Analysis of Systems, 133-152, 1995
1811995
Non-interference through determinism
AW Roscoe, JCP Woodcock, L Wulf
Computer Security—ESORICS 94: Third European Symposium on Research in …, 1994
1711994
Timed CSP: Theory and practice
S Schneider, J Davies, DM Jackson, GM Reed, JN Reed, AW Roscoe
Proceedings of the Real-Time: Theory in Practice, REX Workshop, 640-675, 1991
168*1991
The system can't perform the operation now. Try again later.
Articles 1–20