Scholar Home



 Follow this author
5 Followers


 Co-authors
No co-authors
Citation indices
 AllSince 2009
Citations107193538
h-index4929
i10-index9273
Citations to my articles
Citations to my articles
Show: 1-20Next >
Title / AuthorCited by Year
Mobile ambients
L Cardelli, AD Gordon
Foundations of Software Science and Computation Structures, 140-155
20221998
A calculus for cryptographic protocols: The spi calculus
M Abadi, AD Gordon
Proceedings of the 4th ACM conference on Computer and communications ...
17191997
Concurrent haskell
SP Jones, A Gordon, S Finne
POPL 96, 295-308
4681996
Anytime, anywhere: Modal logics for mobile ambients
L Cardelli, AD Gordon
Proceedings of the 27th ACM SIGPLAN-SIGACT symposium on Principles of ...
4212000
Authenticity by typing for security protocols
AD Gordon, A Jeffrey
Journal of computer security 11 (4), 451-519
2592003
Types for mobile ambients
L Cardelli, AD Gordon
Proceedings of the 26th ACM SIGPLAN-SIGACT symposium on Principles of ...
2391999
Experience with Embedding Hardware Description Languages in HOL.
RJ Boulton, AD Gordon, MJC Gordon, J Harrison, J Herbert, J Van Tassel
TPCD 10, 129-156
2191992
Mobility types for mobile ambients
L Cardelli, G Ghelli, AD Gordon
Automata, Languages and Programming, 230-239
1871999
A bisimulation method for cryptographic protocols
M Abadi, AD Gordon
Programming Languages and Systems, 12-26
1761998
Types and effects for asymmetric cryptographic protocols
AD Gordon, A Jeffrey
Journal of Computer Security 12 (3), 435-483
1692004
Design and semantics of a decentralized authorization language
MY Becker, C Fournet, AD Gordon
Computer Security Foundations Symposium, 2007. CSF'07. 20th IEEE, 3-15
1682007
Refinement types for secure implementations
J Bengtson, K Bhargavan, C Fournet, AD Gordon, S Maffeis
ACM Transactions on Programming Languages and Systems (TOPLAS) 33 (2), 8
1672011
Functional programming and input/output
AD Gordon
Cambridge University Press
1501994
Bisimilarity as a theory of functional programming
AD Gordon
Electronic Notes in Theoretical Computer Science 1, 232-252
1391995
A concurrent object calculus: Reduction and typing
AD Gordon, PD Hankin
Electronic Notes in Theoretical Computer Science 16 (3), 248-264
1351998
Reasoning about cryptographic protocols in the spi calculus
M Abadi, AD Gordon
CONCUR'97: Concurrency Theory, 59-73
1301997
Verified interoperable implementations of security protocols
K Bhargavan, C Fournet, AD Gordon, S Tse
ACM Transactions on Programming Languages and Systems (TOPLAS) 31 (1), 5
1292008
Typing a multi-language intermediate code
AD Gordon, D Syme
ACM SIGPLAN Notices 36 (3), 248-260
1192001
Ambient groups and mobility types
L Cardelli, G Ghelli, AD Gordon
Theoretical Computer Science: Exploring New Frontiers of Theoretical ...
1142000
Verifier to check intermediate language
A Gordon, D Syme, J Forbes, VP Morrison
US Patent 6,560,774
1012003
Show: 1-20Next >
Dates and citation counts are estimated and are determined automatically by a computer program.
©2013 Google - About Google Scholar - All About Google - Provide feedback - My Citations