Andrew D Gordon
Andrew D Gordon
Microsoft Research and University of Edinburgh
Verified email at microsoft.com - Homepage
TitleCited byYear
Mobile ambients
L Cardelli, AD Gordon
International Conference on Foundations of Software Science and Computation …, 1998
23741998
A calculus for cryptographic protocols: The spi calculus
M Abadi, AD Gordon
Information and computation 148 (1), 1-70, 1999
19591999
Mobile ambients
L Cardelli, AD Gordon
International Conference on Foundations of Software Science and Computation …, 1998
15201998
Concurrent haskell
SP Jones, A Gordon, S Finne
POPL 96, 295-308, 1996
5521996
Anytime, anywhere: Modal logics for mobile ambients
L Cardelli, AD Gordon
Proceedings of the 27th ACM SIGPLAN-SIGACT symposium on Principles of …, 2000
4942000
Authenticity by typing for security protocols 1
AD Gordon, A Jeffrey
Journal of computer security 11 (4), 451-519, 2003
3062003
Experience with embedding hardware description languages in HOL.
RJ Boulton, AD Gordon, MJC Gordon, J Harrison, J Herbert, J Van Tassel
TPCD 10, 129-156, 1992
2611992
Refinement types for secure implementations
J Bengtson, K Bhargavan, C Fournet, AD Gordon, S Maffeis
ACM Transactions on Programming Languages and Systems (TOPLAS) 33 (2), 8, 2011
2522011
Types for mobile ambients
L Cardelli, AD Gordon
Proceedings of the 26th ACM SIGPLAN-SIGACT symposium on Principles of …, 1999
2511999
Types for mobile ambients
L Cardelli, AD Gordon
Proceedings of the 26th ACM SIGPLAN-SIGACT symposium on Principles of …, 1999
2511999
Probabilistic programming
AD Gordon, TA Henzinger, AV Nori, SK Rajamani
Proceedings of the on Future of Software Engineering, 167-181, 2014
2502014
Mobility types for mobile ambients
L Cardelli, G Ghelli, AD Gordon
International Colloquium on Automata, Languages, and Programming, 230-239, 1999
2021999
A bisimulation method for cryptographic protocols
M Abadi, AD Gordon
European Symposium on Programming, 12-26, 1998
1991998
Types and effects for asymmetric cryptographic protocols
AD Gordon, A Jeffrey
Journal of Computer Security 12 (3-4), 435-483, 2004
1962004
Design and semantics of a decentralized authorization language
M Becker, C Fournet, A Gordon
20th IEEE Computer Security Foundations Symposium (CSF'07), 3-15, 2007
1922007
Functional programming and input/output
AD Gordon
Cambridge University Press, 1994
1921994
Functional programming and input/output
AD Gordon
Cambridge University Press, 1994
1921994
Verified interoperable implementations of security protocols
K Bhargavan, C Fournet, AD Gordon, S Tse
19th IEEE Computer Security Foundations Workshop (CSFW'06), 14 pp.-152, 2006
1792006
Verifier to check intermediate language
A Gordon, D Syme, J Forbes, VP Morrison
US Patent 6,560,774, 2003
1702003
Higher order operational techniques in semantics
N Negroponte
Cambridge University Press, 1998
1541998
The system can't perform the operation now. Try again later.
Articles 1–20