Volgen
Ross Horne
Ross Horne
Geverifieerd e-mailadres voor strath.ac.uk - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Semantics for specialising attack trees based on linear logic
R Horne, S Mauw, A Tiu
Fundamenta Informaticae 153 (1-2), 57-86, 2017
392017
Tracing where and who provenance in linked data: A calculus
M Dezani-Ciancaglini, R Horne, V Sassone
Theoretical Computer Science 464, 113-129, 2012
312012
Assuming Just Enough Fairness to make Session Types Complete for Lock-freedom
R van Glabbeek, P Höfner, R Horne
ACM/IEEE LICS 2021 36th Annual Symposium on Logic in Computer Science 29 …, 2021
262021
SPEC: an equivalence checker for security protocols
A Tiu, N Nguyen, R Horne
Programming Languages and Systems: 14th Asian Symposium, APLAS 2016, Hanoi …, 2016
262016
Global types with internal delegation
I Castellani, M Dezani-Ciancaglini, P Giannini, R Horne
Theoretical Computer Science 807, 128-153, 2020
252020
Breaking unlinkability of the ICAO 9303 standard for e-passports using bisimilarity
I Filimonov, R Horne, S Mauw, Z Smith
European Symposium on Research in Computer Security, 577-594, 2019
252019
The consistency and complexity of multiplicative additive system virtual
R Horne
Scientific Annals of Computer Science 15 (2), 245-316, 2015
242015
A verified algebra for read–write Linked Data
R Horne, V Sassone
Science of Computer Programming 89, 2-22, 2014
22*2014
Quasi-open bisimilarity with mismatch is intuitionistic
R Horne, KY Ahn, SW Lin, A Tiu
Proceedings of the 33rd Annual ACM/IEEE Symposium on Logic in Computer …, 2018
212018
De Morgan Dual Nominal Quantifiers Modelling Private Names in Non-Commutative Logic
R Horne, A Tiu, B Aman, G Ciobanu
ACM Transactions on Computational Logic (TOCL) 20 (4), 1-44, 2019
20*2019
Minimal type inference for linked data consumers
G Ciobanu, R Horne, V Sassone
Journal of Logical and Algebraic Methods in Programming 84 (4), 485-504, 2015
20*2015
Operational semantics for SPARQL update
R Horne, V Sassone, N Gibbins
The Semantic Web: Joint International Semantic Technology Conference, JIST …, 2012
192012
Logic Beyond Formulas: A Proof System on Graphs
M Acclavio, R Horne, L Straßburger
LICS'20: Proceedings of the 35th Annual ACM/IEEE Symposium on Logic in …, 2020
182020
Constructing weak simulations from linear implications for processes with private names
R Horne, A Tiu
Mathematical Structures in Computer Science 29 (8), 1275-1308, 2019
182019
Behavioural analysis of sessions using the calculus of structures
G Ciobanu, R Horne
Perspectives of System Informatics: 10th International Andrei Ershov …, 2016
182016
A descriptive type foundation for RDF Schema
G Ciobanu, R Horne, V Sassone
Journal of Logical and Algebraic Methods in Programming 85 (5), 681-706, 2016
17*2016
When privacy fails, a formula describes an attack: A complete and compositional verification method for the applied π-calculus
R Horne, S Mauw, S Yurkov
Theoretical Computer Science 959, 113842, 2023
14*2023
Session subtyping and multiparty compatibility using circular sequents
RJ Horne
In 31st International Conference on Concurrency Theory (CONCUR 2020)., 2020
142020
Discovering ePassport Vulnerabilities using Bisimilarity
R Horne, S Mauw
Logical Methods in Computer Science 17 (2), 24:1-24:52, 2021
132021
The sub-additives: A proof theory for probabilistic choice extending linear logic
RJ Horne
4th International Conference on Formal Structures for Computation and …, 2019
132019
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20