Seuraa
Ross Horne
Ross Horne
Vahvistettu sähköpostiosoite verkkotunnuksessa strath.ac.uk - Kotisivu
Nimike
Viittaukset
Viittaukset
Vuosi
Semantics for specialising attack trees based on linear logic
R Horne, S Mauw, A Tiu
Fundamenta Informaticae 153 (1-2), 57-86, 2017
402017
Assuming Just Enough Fairness to make Session Types Complete for Lock-freedom
R van Glabbeek, P Höfner, R Horne
ACM/IEEE LICS 2021 36th Annual Symposium on Logic in Computer Science 29 …, 2021
352021
Tracing where and who provenance in linked data: A calculus
M Dezani-Ciancaglini, R Horne, V Sassone
Theoretical Computer Science 464, 113-129, 2012
302012
Global types with internal delegation
I Castellani, M Dezani-Ciancaglini, P Giannini, R Horne
Theoretical Computer Science 807, 128-153, 2020
282020
SPEC: an equivalence checker for security protocols
A Tiu, N Nguyen, R Horne
Programming Languages and Systems: 14th Asian Symposium, APLAS 2016, Hanoi …, 2016
262016
Breaking unlinkability of the ICAO 9303 standard for e-passports using bisimilarity
I Filimonov, R Horne, S Mauw, Z Smith
European Symposium on Research in Computer Security, 577-594, 2019
252019
The consistency and complexity of multiplicative additive system virtual
R Horne
Scientific Annals of Computer Science 15 (2), 245-316, 2015
232015
A verified algebra for read–write Linked Data
R Horne, V Sassone
Science of Computer Programming 89, 2-22, 2014
23*2014
Quasi-open bisimilarity with mismatch is intuitionistic
R Horne, KY Ahn, SW Lin, A Tiu
Proceedings of the 33rd Annual ACM/IEEE Symposium on Logic in Computer …, 2018
222018
De Morgan Dual Nominal Quantifiers Modelling Private Names in Non-Commutative Logic
R Horne, A Tiu, B Aman, G Ciobanu
ACM Transactions on Computational Logic (TOCL) 20 (4), 1-44, 2019
21*2019
Minimal type inference for linked data consumers
G Ciobanu, R Horne, V Sassone
Journal of Logical and Algebraic Methods in Programming 84 (4), 485-504, 2015
20*2015
Operational semantics for SPARQL update
R Horne, V Sassone, N Gibbins
The Semantic Web: Joint International Semantic Technology Conference, JIST …, 2012
202012
Logic Beyond Formulas: A Proof System on Graphs
M Acclavio, R Horne, L Straßburger
LICS'20: Proceedings of the 35th Annual ACM/IEEE Symposium on Logic in …, 2020
192020
Constructing weak simulations from linear implications for processes with private names
R Horne, A Tiu
Mathematical Structures in Computer Science 29 (8), 1275-1308, 2019
192019
A descriptive type foundation for RDF Schema
G Ciobanu, R Horne, V Sassone
Journal of Logical and Algebraic Methods in Programming 85 (5), 681-706, 2016
19*2016
Behavioural analysis of sessions using the calculus of structures
G Ciobanu, R Horne
Perspectives of System Informatics: 10th International Andrei Ershov …, 2016
192016
Discovering ePassport Vulnerabilities using Bisimilarity
R Horne, S Mauw
Logical Methods in Computer Science 17 (2), 24:1-24:52, 2021
172021
Session subtyping and multiparty compatibility using circular sequents
RJ Horne
In 31st International Conference on Concurrency Theory (CONCUR 2020)., 2020
152020
Assessing the solid protocol in relation to security and privacy obligations
C Esposito, R Horne, L Robaldo, B Buelens, E Goesaert
Information 14 (7), 411, 2023
142023
When privacy fails, a formula describes an attack: A complete and compositional verification method for the applied π-calculus
R Horne, S Mauw, S Yurkov
Theoretical Computer Science 959, 113842, 2023
14*2023
Järjestelmä ei voi suorittaa toimenpidettä nyt. Yritä myöhemmin uudelleen.
Artikkelit 1–20