Follow
Andrew D Gordon
Andrew D Gordon
Microsoft Research and University of Edinburgh
Verified email at microsoft.com - Homepage
Title
Cited by
Cited by
Year
Mobile ambients
L Cardelli, AD Gordon
International Conference on Foundations of Software Science and Computation …, 1998
26231998
A calculus for cryptographic protocols: The spi calculus
M Abadi, AD Gordon
Proceedings of the 4th ACM Conference on Computer and Communications …, 1997
21021997
Mobile ambients
L Cardelli, AD Gordon
International Conference on Foundations of Software Science and Computation …, 1998
16341998
Concurrent haskell
SP Jones, A Gordon, S Finne
POPL 96, 295-308, 1996
6311996
Anytime, anywhere: Modal logics for mobile ambients
L Cardelli, AD Gordon
Proceedings of the 27th ACM SIGPLAN-SIGACT symposium on Principles of …, 2000
5392000
Probabilistic programming
AD Gordon, TA Henzinger, AV Nori, SK Rajamani
Future of software engineering proceedings, 167-181, 2014
4832014
SecPAL: Design and semantics of a decentralized authorization language
MY Becker, C Fournet, AD Gordon
Journal of Computer Security 18 (4), 619-665, 2010
4562010
Authenticity by typing for security protocols
AD Gordon, A Jeffrey
Journal of computer security 11 (4), 451-519, 2003
3422003
Refinement types for secure implementations
J Bengtson, K Bhargavan, C Fournet, AD Gordon, S Maffeis
ACM Transactions on Programming Languages and Systems (TOPLAS) 33 (2), 1-45, 2011
3222011
Experience with embedding hardware description languages in HOL.
RJ Boulton, AD Gordon, MJC Gordon, J Harrison, J Herbert, J Van Tassel
TPCD 10, 129-156, 1992
3021992
Types for mobile ambients
L Cardelli, AD Gordon
Proceedings of the 26th ACM SIGPLAN-SIGACT symposium on Principles of …, 1999
2691999
Types for mobile ambients
L Cardelli, AD Gordon
Proceedings of the 26th ACM SIGPLAN-SIGACT symposium on Principles of …, 1999
2691999
Bimodal modelling of source code and natural language
M Allamanis, D Tarlow, A Gordon, Y Wei
International conference on machine learning, 2123-2132, 2015
2352015
Types and effects for asymmetric cryptographic protocols
AD Gordon, A Jeffrey
Journal of Computer Security 12 (3-4), 435-483, 2004
2202004
A bisimulation method for cryptographic protocols
M Abadi, AD Gordon
European Symposium on Programming, 12-26, 1998
2201998
Verified interoperable implementations of security protocols
K Bhargavan, C Fournet, AD Gordon, S Tse
ACM Transactions on Programming Languages and Systems (TOPLAS) 31 (1), 1-61, 2008
2152008
Mobility types for mobile ambients
L Cardelli, G Ghelli, AD Gordon
Automata, Languages and Programming: 26th International Colloquium, ICALP’99 …, 1999
2131999
Functional programming and input/output
AD Gordon
Cambridge University Press, 1994
2111994
Functional programming and input/output
AD Gordon
Cambridge University Press, 1994
2111994
Verifying intermediate language code
D Syme, A Gordon, JA Forbes, VP Morrison
US Patent 6,851,108, 2005
1882005
The system can't perform the operation now. Try again later.
Articles 1–20