Follow
Andrew D Gordon
Andrew D Gordon
Cogna and University of Edinburgh
Verified email at cogna.co - Homepage
Title
Cited by
Cited by
Year
Mobile ambients
L Cardelli, AD Gordon
International Conference on Foundations of Software Science and Computation …, 1998
26491998
A calculus for cryptographic protocols: The spi calculus
M Abadi, AD Gordon
Proceedings of the 4th ACM Conference on Computer and Communications …, 1997
21331997
Concurrent haskell
SP Jones, A Gordon, S Finne
POPL 96, 295-308, 1996
6451996
Anytime, anywhere: Modal logics for mobile ambients
L Cardelli, AD Gordon
Proceedings of the 27th ACM SIGPLAN-SIGACT symposium on Principles of …, 2000
5422000
Probabilistic programming
AD Gordon, TA Henzinger, AV Nori, SK Rajamani
Future of software engineering proceedings, 167-181, 2014
5382014
SecPAL: Design and semantics of a decentralized authorization language
MY Becker, C Fournet, AD Gordon
Journal of Computer Security 18 (4), 619-665, 2010
4652010
Authenticity by typing for security protocols
AD Gordon, A Jeffrey
Journal of computer security 11 (4), 451-519, 2003
3482003
Refinement types for secure implementations
J Bengtson, K Bhargavan, C Fournet, AD Gordon, S Maffeis
ACM Transactions on Programming Languages and Systems (TOPLAS) 33 (2), 1-45, 2011
3282011
Experience with embedding hardware description languages in HOL.
RJ Boulton, AD Gordon, MJC Gordon, J Harrison, J Herbert, J Van Tassel
TPCD 10, 129-156, 1992
3091992
Bimodal modelling of source code and natural language
M Allamanis, D Tarlow, A Gordon, Y Wei
International conference on machine learning, 2123-2132, 2015
2672015
Types for mobile ambients
L Cardelli, AD Gordon
Proceedings of the 26th ACM SIGPLAN-SIGACT symposium on Principles of …, 1999
2661999
A bisimulation method for cryptographic protocols
M Abadi, AD Gordon
European Symposium on Programming, 12-26, 1998
2221998
Types and effects for asymmetric cryptographic protocols
AD Gordon, A Jeffrey
Journal of Computer Security 12 (3-4), 435-483, 2004
2192004
Verified interoperable implementations of security protocols
K Bhargavan, C Fournet, AD Gordon, S Tse
ACM Transactions on Programming Languages and Systems (TOPLAS) 31 (1), 1-61, 2008
2182008
Mobility types for mobile ambients
L Cardelli, G Ghelli, AD Gordon
Automata, Languages and Programming: 26th International Colloquium, ICALP’99 …, 1999
2141999
Functional programming and input/output
AD Gordon
Cambridge University Press, 1994
2111994
Verifying intermediate language code
D Syme, A Gordon, JA Forbes, VP Morrison
US Patent 6,851,108, 2005
1932005
Verifier to check intermediate language
A Gordon, D Syme, J Forbes, VP Morrison
US Patent 6,560,774, 2003
1832003
Modular verification of security protocol code by typing
K Bhargavan, C Fournet, AD Gordon
ACM Sigplan Notices 45 (1), 445-456, 2010
1722010
Bisimilarity as a theory of functional programming
AD Gordon
Electronic Notes in Theoretical Computer Science 1, 232-252, 1995
1641995
The system can't perform the operation now. Try again later.
Articles 1–20