关注
Ross Horne
Ross Horne
在 strath.ac.uk 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Semantics for specialising attack trees based on linear logic
R Horne, S Mauw, A Tiu
Fundamenta Informaticae 153 (1-2), 57-86, 2017
392017
Tracing where and who provenance in linked data: A calculus
M Dezani-Ciancaglini, R Horne, V Sassone
Theoretical Computer Science 464, 113-129, 2012
312012
Assuming Just Enough Fairness to make Session Types Complete for Lock-freedom
R van Glabbeek, P Höfner, R Horne
ACM/IEEE LICS 2021 36th Annual Symposium on Logic in Computer Science 29 …, 2021
262021
SPEC: an equivalence checker for security protocols
A Tiu, N Nguyen, R Horne
Programming Languages and Systems: 14th Asian Symposium, APLAS 2016, Hanoi …, 2016
262016
Global types with internal delegation
I Castellani, M Dezani-Ciancaglini, P Giannini, R Horne
Theoretical Computer Science 807, 128-153, 2020
252020
Breaking unlinkability of the ICAO 9303 standard for e-passports using bisimilarity
I Filimonov, R Horne, S Mauw, Z Smith
European Symposium on Research in Computer Security, 577-594, 2019
252019
The consistency and complexity of multiplicative additive system virtual
R Horne
Scientific Annals of Computer Science 15 (2), 245-316, 2015
242015
A verified algebra for read–write Linked Data
R Horne, V Sassone
Science of Computer Programming 89, 2-22, 2014
22*2014
Quasi-open bisimilarity with mismatch is intuitionistic
R Horne, KY Ahn, SW Lin, A Tiu
Proceedings of the 33rd Annual ACM/IEEE Symposium on Logic in Computer …, 2018
212018
De Morgan Dual Nominal Quantifiers Modelling Private Names in Non-Commutative Logic
R Horne, A Tiu, B Aman, G Ciobanu
ACM Transactions on Computational Logic (TOCL) 20 (4), 1-44, 2019
20*2019
Minimal type inference for linked data consumers
G Ciobanu, R Horne, V Sassone
Journal of Logical and Algebraic Methods in Programming 84 (4), 485-504, 2015
20*2015
Operational semantics for SPARQL update
R Horne, V Sassone, N Gibbins
The Semantic Web: Joint International Semantic Technology Conference, JIST …, 2012
192012
Logic Beyond Formulas: A Proof System on Graphs
M Acclavio, R Horne, L Straßburger
LICS'20: Proceedings of the 35th Annual ACM/IEEE Symposium on Logic in …, 2020
182020
Constructing weak simulations from linear implications for processes with private names
R Horne, A Tiu
Mathematical Structures in Computer Science 29 (8), 1275-1308, 2019
182019
Behavioural analysis of sessions using the calculus of structures
G Ciobanu, R Horne
Perspectives of System Informatics: 10th International Andrei Ershov …, 2016
182016
A descriptive type foundation for RDF Schema
G Ciobanu, R Horne, V Sassone
Journal of Logical and Algebraic Methods in Programming 85 (5), 681-706, 2016
17*2016
When privacy fails, a formula describes an attack: A complete and compositional verification method for the applied π-calculus
R Horne, S Mauw, S Yurkov
Theoretical Computer Science 959, 113842, 2023
14*2023
Session subtyping and multiparty compatibility using circular sequents
RJ Horne
In 31st International Conference on Concurrency Theory (CONCUR 2020)., 2020
142020
Discovering ePassport Vulnerabilities using Bisimilarity
R Horne, S Mauw
Logical Methods in Computer Science 17 (2), 24:1-24:52, 2021
132021
The sub-additives: A proof theory for probabilistic choice extending linear logic
RJ Horne
4th International Conference on Formal Structures for Computation and …, 2019
132019
系统目前无法执行此操作,请稍后再试。
文章 1–20