The Theory and Practice of Concurrency. international series in computer science AW Roscoe Prentice-Hall, 1997 | 2935* | 1997 |
A theory of communicating sequential processes SD Brookes, CAR Hoare, AW Roscoe Journal of the ACM (JACM) 31 (3), 560-599, 1984 | 1822 | 1984 |
Modelling and Analysis of Security Protocols: the CSP approach P Ryan, S Schneider, M Goldsmith, G Lowe, AW Roscoe Addison Wesley, 2001 | 835 | 2001 |
A timed model for communicating sequential processes GM Reed, AW Roscoe International Colloquium on Automata, Languages, and Programming, 314-323, 1986 | 783 | 1986 |
Laws of programming CAR Hoare, IJ Hayes, H Jifeng, CC Morgan, AW Roscoe, JW Sanders, ... Communications of the ACM 30 (8), 672-686, 1987 | 605 | 1987 |
Understanding concurrent systems AW Roscoe Springer-Verlag New York Inc, 2010 | 502 | 2010 |
Model− checking CSP B Roscoe A classical Mind, Essays in honour of C.A.R. Hoare, 1994 | 465 | 1994 |
An improved failures model for communicating processes SD Brookes, AW Roscoe International Conference on Concurrency, 281-305, 1984 | 376 | 1984 |
The laws of occam programming AW Roscoe, CAR Hoare Theoretical Computer Science 60 (2), 177-229, 1988 | 356 | 1988 |
Reguard: finding reentrancy bugs in smart contracts C Liu, H Liu, Z Cao, Z Chen, B Chen, B Roscoe Proceedings of the 40th International Conference on Software Engineering …, 2018 | 355 | 2018 |
FDR3—A Modern Refinement Checker for CSP T Gibson-Robinson, P Armstrong, A Boulgakov, AW Roscoe TACAS, 2014 | 347 | 2014 |
Modelling and verifying key-exchange protocols using CSP and FDR AW Roscoe Proceedings The Eighth IEEE Computer Security Foundations Workshop, 98-107, 1995 | 318 | 1995 |
Using CSP to detect errors in the TMN protocol G Lowe, AW Roscoe Software Engineering, IEEE Transactions on 23 (10), 659-669, 1997 | 308 | 1997 |
CSP and determinism in security modelling AW Roscoe Proceedings 1995 IEEE Symposium on Security and Privacy, 114-127, 1995 | 299 | 1995 |
Star covering properties EK Van Douwen, GM Reed, AW Roscoe, IJ Tree Topology and its Applications 39 (1), 71-103, 1991 | 269 | 1991 |
Security and usability: Analysis and evaluation R Kainda, I Flechais, AW Roscoe 2010 international conference on availability, reliability and security, 275-282, 2010 | 211 | 2010 |
Concepts of digital topology TY Kong, AW Roscoe, A Rosenfeld Topology and its Applications 46, 1992 | 191 | 1992 |
Hierarchical compression for model-checking CSP or how to check 10^20 dining philosophers for deadlock AW Roscoe, PHB Gardiner, MH Goldsmith, JR Hulance, DM Jackson, ... Tools and Algorithms for the Construction and Analysis of Systems, 133-152, 1995 | 181 | 1995 |
Non-interference through determinism AW Roscoe, JCP Woodcock, L Wulf Computer Security—ESORICS 94: Third European Symposium on Research in …, 1994 | 171 | 1994 |
Usability and security of out-of-band channels in secure device pairing protocols R Kainda, I Flechais, AW Roscoe Proceedings of the 5th Symposium on Usable Privacy and Security, 1-12, 2009 | 168 | 2009 |