Ross Horne
Ross Horne
Geverifieerd e-mailadres voor strath.ac.uk - Homepage
Geciteerd door
Geciteerd door
Semantics for specialising attack trees based on linear logic
R Horne, S Mauw, A Tiu
Fundamenta Informaticae 153 (1-2), 57-86, 2017
Tracing where and who provenance in linked data: A calculus
M Dezani-Ciancaglini, R Horne, V Sassone
Theoretical Computer Science 464, 113-129, 2012
Assuming Just Enough Fairness to make Session Types Complete for Lock-freedom
R van Glabbeek, P Höfner, R Horne
ACM/IEEE LICS 2021 36th Annual Symposium on Logic in Computer Science 29 …, 2021
SPEC: an equivalence checker for security protocols
A Tiu, N Nguyen, R Horne
Programming Languages and Systems: 14th Asian Symposium, APLAS 2016, Hanoi …, 2016
Global types with internal delegation
I Castellani, M Dezani-Ciancaglini, P Giannini, R Horne
Theoretical Computer Science 807, 128-153, 2020
Breaking unlinkability of the ICAO 9303 standard for e-passports using bisimilarity
I Filimonov, R Horne, S Mauw, Z Smith
European Symposium on Research in Computer Security, 577-594, 2019
The consistency and complexity of multiplicative additive system virtual
R Horne
Scientific Annals of Computer Science 15 (2), 245-316, 2015
A verified algebra for read–write Linked Data
R Horne, V Sassone
Science of Computer Programming 89, 2-22, 2014
Quasi-open bisimilarity with mismatch is intuitionistic
R Horne, KY Ahn, SW Lin, A Tiu
Proceedings of the 33rd Annual ACM/IEEE Symposium on Logic in Computer …, 2018
De Morgan Dual Nominal Quantifiers Modelling Private Names in Non-Commutative Logic
R Horne, A Tiu, B Aman, G Ciobanu
ACM Transactions on Computational Logic (TOCL) 20 (4), 1-44, 2019
Minimal type inference for linked data consumers
G Ciobanu, R Horne, V Sassone
Journal of Logical and Algebraic Methods in Programming 84 (4), 485-504, 2015
Operational semantics for SPARQL update
R Horne, V Sassone, N Gibbins
The Semantic Web: Joint International Semantic Technology Conference, JIST …, 2012
Logic Beyond Formulas: A Proof System on Graphs
M Acclavio, R Horne, L Straßburger
LICS'20: Proceedings of the 35th Annual ACM/IEEE Symposium on Logic in …, 2020
Constructing weak simulations from linear implications for processes with private names
R Horne, A Tiu
Mathematical Structures in Computer Science 29 (8), 1275-1308, 2019
Behavioural analysis of sessions using the calculus of structures
G Ciobanu, R Horne
Perspectives of System Informatics: 10th International Andrei Ershov …, 2016
A descriptive type foundation for RDF Schema
G Ciobanu, R Horne, V Sassone
Journal of Logical and Algebraic Methods in Programming 85 (5), 681-706, 2016
When privacy fails, a formula describes an attack: A complete and compositional verification method for the applied π-calculus
R Horne, S Mauw, S Yurkov
Theoretical Computer Science 959, 113842, 2023
Session subtyping and multiparty compatibility using circular sequents
RJ Horne
In 31st International Conference on Concurrency Theory (CONCUR 2020)., 2020
Discovering ePassport Vulnerabilities using Bisimilarity
R Horne, S Mauw
Logical Methods in Computer Science 17 (2), 24:1-24:52, 2021
The sub-additives: A proof theory for probabilistic choice extending linear logic
RJ Horne
4th International Conference on Formal Structures for Computation and …, 2019
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20