Sledovat
Ross Horne
Ross Horne
E-mailová adresa ověřena na: strath.ac.uk - Domovská stránka
Název
Citace
Citace
Rok
Semantics for specialising attack trees based on linear logic
R Horne, S Mauw, A Tiu
Fundamenta Informaticae 153 (1-2), 57-86, 2017
392017
Tracing where and who provenance in linked data: A calculus
M Dezani-Ciancaglini, R Horne, V Sassone
Theoretical Computer Science 464, 113-129, 2012
312012
SPEC: an equivalence checker for security protocols
A Tiu, N Nguyen, R Horne
Programming Languages and Systems: 14th Asian Symposium, APLAS 2016, Hanoi …, 2016
262016
Assuming Just Enough Fairness to make Session Types Complete for Lock-freedom
R van Glabbeek, P Höfner, R Horne
ACM/IEEE LICS 2021 36th Annual Symposium on Logic in Computer Science 29 …, 2021
252021
Global types with internal delegation
I Castellani, M Dezani-Ciancaglini, P Giannini, R Horne
Theoretical Computer Science 807, 128-153, 2020
242020
Breaking unlinkability of the ICAO 9303 standard for e-passports using bisimilarity
I Filimonov, R Horne, S Mauw, Z Smith
European Symposium on Research in Computer Security, 577-594, 2019
242019
The consistency and complexity of multiplicative additive system virtual
R Horne
Scientific Annals of Computer Science 15 (2), 245-316, 2015
232015
A verified algebra for read–write Linked Data
R Horne, V Sassone
Science of Computer Programming 89, 2-22, 2014
22*2014
Quasi-open bisimilarity with mismatch is intuitionistic
R Horne, KY Ahn, SW Lin, A Tiu
Proceedings of the 33rd Annual ACM/IEEE Symposium on Logic in Computer …, 2018
212018
De Morgan Dual Nominal Quantifiers Modelling Private Names in Non-Commutative Logic
R Horne, A Tiu, B Aman, G Ciobanu
ACM Transactions on Computational Logic (TOCL) 20 (4), 1-44, 2019
20*2019
Minimal type inference for linked data consumers
G Ciobanu, R Horne, V Sassone
Journal of Logical and Algebraic Methods in Programming 84 (4), 485-504, 2015
20*2015
Operational semantics for SPARQL update
R Horne, V Sassone, N Gibbins
The Semantic Web: Joint International Semantic Technology Conference, JIST …, 2012
192012
Logic Beyond Formulas: A Proof System on Graphs
M Acclavio, R Horne, L Straßburger
LICS'20: Proceedings of the 35th Annual ACM/IEEE Symposium on Logic in …, 2020
182020
Constructing weak simulations from linear implications for processes with private names
R Horne, A Tiu
Mathematical Structures in Computer Science 29 (8), 1275-1308, 2019
182019
Behavioural analysis of sessions using the calculus of structures
G Ciobanu, R Horne
Perspectives of System Informatics: 10th International Andrei Ershov …, 2016
182016
A descriptive type foundation for RDF Schema
G Ciobanu, R Horne, V Sassone
Journal of Logical and Algebraic Methods in Programming 85 (5), 681-706, 2016
17*2016
When privacy fails, a formula describes an attack: A complete and compositional verification method for the applied π-calculus
R Horne, S Mauw, S Yurkov
Theoretical Computer Science 959, 113842, 2023
13*2023
Discovering ePassport Vulnerabilities using Bisimilarity
R Horne, S Mauw
Logical Methods in Computer Science 17 (2), 24:1-24:52, 2021
132021
Session subtyping and multiparty compatibility using circular sequents
RJ Horne
In 31st International Conference on Concurrency Theory (CONCUR 2020)., 2020
132020
The sub-additives: A proof theory for probabilistic choice extending linear logic
RJ Horne
4th International Conference on Formal Structures for Computation and …, 2019
132019
Systém momentálně nemůže danou operaci provést. Zkuste to znovu později.
Články 1–20