Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: David Aspinall 0001
@inproceedings{DBLP:conf/esorics/ArnaboldiAKR23, author = {Luca Arnaboldi and David Aspinall and Christina Kolb and Sasa Radomirovic}, editor = {Gene Tsudik and Mauro Conti and Kaitai Liang and Georgios Smaragdakis}, title = {Tactics for Account Access Graphs}, booktitle = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14346}, pages = {452--470}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-51479-1\_23}, doi = {10.1007/978-3-031-51479-1\_23}, timestamp = {Thu, 18 Jan 2024 08:27:16 +0100}, biburl = {https://dblp.org/rec/conf/esorics/ArnaboldiAKR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sncs/FloodCCA22, author = {Robert Flood and Sheung Chi Chan and Wei Chen and David Aspinall}, title = {Checking Contact Tracing App Implementations with Bespoke Static Analysis}, journal = {{SN} Comput. Sci.}, volume = {3}, number = {6}, pages = {496}, year = {2022}, url = {https://doi.org/10.1007/s42979-022-01357-w}, doi = {10.1007/S42979-022-01357-W}, timestamp = {Thu, 07 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sncs/FloodCCA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safecomp/ArnaboldiA22, author = {Luca Arnaboldi and David Aspinall}, editor = {Mario Trapp and Erwin Schoitsch and J{\'{e}}r{\'{e}}mie Guiochet and Friedemann Bitsch}, title = {Towards Interdependent Safety Security Assessments Using Bowties}, booktitle = {Computer Safety, Reliability, and Security. {SAFECOMP} 2022 Workshops - DECSoS, DepDevOps, SASSUR, SENSEI, USDAI, and WAISE, Munich, Germany, September 6-9, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13415}, pages = {211--229}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-14862-0\_16}, doi = {10.1007/978-3-031-14862-0\_16}, timestamp = {Fri, 12 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/safecomp/ArnaboldiA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2208-03484, author = {Luca Arnaboldi and David Aspinall}, title = {Towards Interdependent Safety Security Assessments using Bowties}, journal = {CoRR}, volume = {abs/2208.03484}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2208.03484}, doi = {10.48550/ARXIV.2208.03484}, eprinttype = {arXiv}, eprint = {2208.03484}, timestamp = {Fri, 12 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2208-03484.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computers/ClausenGA21, author = {Henry Clausen and Gudmund Grov and David Aspinall}, title = {{CBAM:} {A} Contextual Model for Network Anomaly Detection}, journal = {Comput.}, volume = {10}, number = {6}, pages = {79}, year = {2021}, url = {https://doi.org/10.3390/computers10060079}, doi = {10.3390/COMPUTERS10060079}, timestamp = {Thu, 29 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computers/ClausenGA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jar/ButlerLAG21, author = {David Butler and Andreas Lochbihler and David Aspinall and Adri{\`{a}} Gasc{\'{o}}n}, title = {Formalising {\textdollar}{\textbackslash}varSigma{\textdollar}-Protocols and Commitment Schemes Using CryptHOL}, journal = {J. Autom. Reason.}, volume = {65}, number = {4}, pages = {521--567}, year = {2021}, url = {https://doi.org/10.1007/s10817-020-09581-w}, doi = {10.1007/S10817-020-09581-W}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jar/ButlerLAG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdataconf/SchneiderAB21, author = {Madeleine Schneider and David Aspinall and Nathaniel D. Bastian}, editor = {Yixin Chen and Heiko Ludwig and Yicheng Tu and Usama M. Fayyad and Xingquan Zhu and Xiaohua Hu and Suren Byna and Xiong Liu and Jianping Zhang and Shirui Pan and Vagelis Papalexakis and Jianwu Wang and Alfredo Cuzzocrea and Carlos Ordonez}, title = {Evaluating Model Robustness to Adversarial Samples in Network Intrusion Detection}, booktitle = {2021 {IEEE} International Conference on Big Data (Big Data), Orlando, FL, USA, December 15-18, 2021}, pages = {3343--3352}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/BigData52589.2021.9671580}, doi = {10.1109/BIGDATA52589.2021.9671580}, timestamp = {Fri, 13 Jan 2023 17:06:49 +0100}, biburl = {https://dblp.org/rec/conf/bigdataconf/SchneiderAB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/FloodCC021, author = {Robert Flood and Sheung Shi Chan and Wei Chen and David Aspinall}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Checking Contact Tracing App Implementations}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {133--144}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010237201330144}, doi = {10.5220/0010237201330144}, timestamp = {Thu, 07 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/FloodCC021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/ClausenF021, author = {Henry Clausen and Robert Flood and David Aspinall}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Shujun Li and Radha Poovendran and Herv{\'{e}} Debar and Moti Yung}, title = {Controlling Network Traffic Microstructures for Machine-Learning Model Probing}, booktitle = {Security and Privacy in Communication Networks - 17th {EAI} International Conference, SecureComm 2021, Virtual Event, September 6-9, 2021, Proceedings, Part {I}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {398}, pages = {456--475}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90019-9\_23}, doi = {10.1007/978-3-030-90019-9\_23}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/ClausenF021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Clausen021, author = {Henry Clausen and David Aspinall}, title = {Examining traffic microstructures to improve model development}, booktitle = {{IEEE} Security and Privacy Workshops, {SP} Workshops 2021, San Francisco, CA, USA, May 27, 2021}, pages = {19--24}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SPW53761.2021.00011}, doi = {10.1109/SPW53761.2021.00011}, timestamp = {Thu, 21 Sep 2023 16:11:08 +0200}, biburl = {https://dblp.org/rec/conf/sp/Clausen021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aplas/KokkeKKAA20, author = {Wen Kokke and Ekaterina Komendantskaya and Daniel Kienitz and Robert Atkey and David Aspinall}, editor = {Bruno C. d. S. Oliveira}, title = {Neural Networks, Secure by Construction - An Exploration of Refinement Types}, booktitle = {Programming Languages and Systems - 18th Asian Symposium, {APLAS} 2020, Fukuoka, Japan, November 30 - December 2, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12470}, pages = {67--85}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64437-6\_4}, doi = {10.1007/978-3-030-64437-6\_4}, timestamp = {Fri, 27 Nov 2020 15:04:41 +0100}, biburl = {https://dblp.org/rec/conf/aplas/KokkeKKAA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cpp/00020G20, author = {David Butler and David Aspinall and Adri{\`{a}} Gasc{\'{o}}n}, editor = {Jasmin Blanchette and Catalin Hritcu}, title = {Formalising oblivious transfer in the semi-honest and malicious model in CryptHOL}, booktitle = {Proceedings of the 9th {ACM} {SIGPLAN} International Conference on Certified Programs and Proofs, {CPP} 2020, New Orleans, LA, USA, January 20-21, 2020}, pages = {229--243}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3372885.3373815}, doi = {10.1145/3372885.3373815}, timestamp = {Sun, 02 Oct 2022 15:58:04 +0200}, biburl = {https://dblp.org/rec/conf/cpp/00020G20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mln/ClausenGS020, author = {Henry Clausen and Gudmund Grov and Marc Sabate and David Aspinall}, editor = {{\'{E}}ric Renault and Selma Boumerdassi and Paul M{\"{u}}hlethaler}, title = {Better Anomaly Detection for Access Attacks Using Deep Bidirectional LSTMs}, booktitle = {Machine Learning for Networking - Third International Conference, {MLN} 2020, Paris, France, November 24-26, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12629}, pages = {1--18}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-70866-5\_1}, doi = {10.1007/978-3-030-70866-5\_1}, timestamp = {Thu, 04 Mar 2021 17:04:54 +0100}, biburl = {https://dblp.org/rec/conf/mln/ClausenGS020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/ClausenGA20, author = {Henry Clausen and Michael Scott Gibson and David Aspinall}, editor = {Miroslaw Kutylowski and Jun Zhang and Chao Chen}, title = {Evading Stepping-Stone Detection with Enough Chaff}, booktitle = {Network and System Security - 14th International Conference, {NSS} 2020, Melbourne, VIC, Australia, November 25-27, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12570}, pages = {431--446}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-65745-1\_26}, doi = {10.1007/978-3-030-65745-1\_26}, timestamp = {Tue, 27 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/ClausenGA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2011-06350, author = {Henry Clausen and Robert Flood and David Aspinall}, title = {Traffic Generation using Containerization for Machine Learning}, journal = {CoRR}, volume = {abs/2011.06350}, year = {2020}, url = {https://arxiv.org/abs/2011.06350}, eprinttype = {arXiv}, eprint = {2011.06350}, timestamp = {Fri, 20 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2011-06350.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/afp/AspinallB19, author = {David Aspinall and David Butler}, title = {Multi-Party Computation}, journal = {Arch. Formal Proofs}, volume = {2019}, year = {2019}, url = {https://www.isa-afp.org/entries/Multi\_Party\_Computation.html}, timestamp = {Mon, 25 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/afp/AspinallB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iotsms/YeIA19, author = {Chenghao Ye and Praburam Prabhakar Indra and David Aspinall}, editor = {Mohammad A. Alsmirat and Yaser Jararweh}, title = {Retrofitting Security and Privacy Measures to Smart Home Devices}, booktitle = {Sixth International Conference on Internet of Things: Systems, Management and Security, {IOTSMS} 2019, Granada, Spain, October 22-25, 2019}, pages = {283--290}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/IOTSMS48152.2019.8939272}, doi = {10.1109/IOTSMS48152.2019.8939272}, timestamp = {Mon, 16 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iotsms/YeIA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/ButlerAG19, author = {David Butler and David Aspinall and Adri{\`{a}} Gasc{\'{o}}n}, editor = {Flemming Nielson and David Sands}, title = {On the Formalisation of {\(\Sigma\)}-Protocols and Commitment Schemes}, booktitle = {Principles of Security and Trust - 8th International Conference, {POST} 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2019, Prague, Czech Republic, April 6-11, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11426}, pages = {175--196}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17138-4\_8}, doi = {10.1007/978-3-030-17138-4\_8}, timestamp = {Fri, 31 Jan 2020 21:32:30 +0100}, biburl = {https://dblp.org/rec/conf/post/ButlerAG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ButlerLAG19, author = {David Butler and Andreas Lochbihler and David Aspinall and Adri{\`{a}} Gasc{\'{o}}n}, title = {Formalising {\(\Sigma\)}-Protocols and Commitment Schemes using CryptHOL}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1185}, year = {2019}, url = {https://eprint.iacr.org/2019/1185}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ButlerLAG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/00020G19, author = {David Butler and David Aspinall and Adri{\`{a}} Gasc{\'{o}}n}, title = {Formalising Oblivious Transfer in the Semi-Honest and Malicious Model in CryptHOL}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1449}, year = {2019}, url = {https://eprint.iacr.org/2019/1449}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/00020G19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eaai/BijaniRA18, author = {Shahriar Bijani and David Robertson and David Aspinall}, title = {Secure information sharing in social agent interactions using information flow analysis}, journal = {Eng. Appl. Artif. Intell.}, volume = {70}, pages = {52--66}, year = {2018}, url = {https://doi.org/10.1016/j.engappai.2018.01.002}, doi = {10.1016/J.ENGAPPAI.2018.01.002}, timestamp = {Tue, 13 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eaai/BijaniRA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/HofmannACSS18, author = {Martin Hofmann and David Aspinall and Brian Campbell and Ian Stark and Perdita Stevens}, title = {Foreword}, journal = {Theor. Comput. Sci.}, volume = {741}, pages = {1--2}, year = {2018}, url = {https://doi.org/10.1016/j.tcs.2018.06.032}, doi = {10.1016/J.TCS.2018.06.032}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/HofmannACSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/ChenLGNLA18, author = {Wei Chen and Yuhui Lin and Vashti Galpin and Vivek Nigam and Myungjin Lee and David Aspinall}, editor = {Lech Jan Janczewski and Miroslaw Kutylowski}, title = {Formal Analysis of Sneak-Peek: {A} Data Centre Attack and Its Mitigations}, booktitle = {{ICT} Systems Security and Privacy Protection - 33rd {IFIP} {TC} 11 International Conference, {SEC} 2018, Held at the 24th {IFIP} World Computer Congress, {WCC} 2018, Poznan, Poland, September 18-20, 2018, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {529}, pages = {307--322}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99828-2\_22}, doi = {10.1007/978-3-319-99828-2\_22}, timestamp = {Thu, 07 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/ChenLGNLA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1805-12482, author = {David Butler and David Aspinall and Adri{\`{a}} Gasc{\'{o}}n}, title = {How to Simulate It in Isabelle: Towards Formal Proof for Secure Multi-Party Computation}, journal = {CoRR}, volume = {abs/1805.12482}, year = {2018}, url = {http://arxiv.org/abs/1805.12482}, eprinttype = {arXiv}, eprint = {1805.12482}, timestamp = {Mon, 13 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1805-12482.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itp/Butler0G17, author = {David Butler and David Aspinall and Adri{\`{a}} Gasc{\'{o}}n}, editor = {Mauricio Ayala{-}Rinc{\'{o}}n and C{\'{e}}sar A. Mu{\~{n}}oz}, title = {How to Simulate It in Isabelle: Towards Formal Proof for Secure Multi-Party Computation}, booktitle = {Interactive Theorem Proving - 8th International Conference, {ITP} 2017, Bras{\'{\i}}lia, Brazil, September 26-29, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10499}, pages = {114--130}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66107-0\_8}, doi = {10.1007/978-3-319-66107-0\_8}, timestamp = {Tue, 14 May 2019 10:00:37 +0200}, biburl = {https://dblp.org/rec/conf/itp/Butler0G17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/Hallett017, author = {Joseph Hallett and David Aspinall}, editor = {Sabrina De Capitani di Vimercati and Fabio Martinelli}, title = {Capturing Policies for {BYOD}}, booktitle = {{ICT} Systems Security and Privacy Protection - 32nd {IFIP} {TC} 11 International Conference, {SEC} 2017, Rome, Italy, May 29-31, 2017, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {502}, pages = {310--323}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-58469-0\_21}, doi = {10.1007/978-3-319-58469-0\_21}, timestamp = {Wed, 17 May 2017 12:30:16 +0200}, biburl = {https://dblp.org/rec/conf/sec/Hallett017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Kramer0W16, author = {Martin Kr{\"{a}}mer and David Aspinall and Maria Wolters}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Christopher Kruegel and Andrew C. Myers and Shai Halevi}, title = {{POSTER:} Weighing in eHealth Security}, booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016}, pages = {1832--1834}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2976749.2989044}, doi = {10.1145/2976749.2989044}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Kramer0W16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/essos/Franzen016, author = {Daniel Franzen and David Aspinall}, editor = {David Aspinall and Lorenzo Cavallaro and Mohamed Nassim Seghir and Melanie Volkamer}, title = {PhoneWrap - Injecting the "How Often" into Mobile Apps}, booktitle = {Proceedings of the 1st International Workshop on Innovations in Mobile Privacy and Security, {IMPS} 2016, co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2016), London, UK, April 6, 2016}, series = {{CEUR} Workshop Proceedings}, volume = {1575}, pages = {11--19}, publisher = {CEUR-WS.org}, year = {2016}, url = {https://ceur-ws.org/Vol-1575/paper\_11.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:23 +0100}, biburl = {https://dblp.org/rec/conf/essos/Franzen016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/essos/Chen0GSM16, author = {Wei Chen and David Aspinall and Andrew D. Gordon and Charles Sutton and Igor Muttik}, editor = {David Aspinall and Lorenzo Cavallaro and Mohamed Nassim Seghir and Melanie Volkamer}, title = {Explaining Unwanted Behaviours in Context}, booktitle = {Proceedings of the 1st International Workshop on Innovations in Mobile Privacy and Security, {IMPS} 2016, co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2016), London, UK, April 6, 2016}, series = {{CEUR} Workshop Proceedings}, volume = {1575}, pages = {38--45}, publisher = {CEUR-WS.org}, year = {2016}, url = {https://ceur-ws.org/Vol-1575/paper\_1.pdf}, timestamp = {Thu, 07 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/essos/Chen0GSM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/essos/Hallett016, author = {Joseph Hallett and David Aspinall}, editor = {Juan Caballero and Eric Bodden and Elias Athanasopoulos}, title = {AppPAL for Android - Capturing and Checking Mobile App Policies}, booktitle = {Engineering Secure Software and Systems - 8th International Symposium, ESSoS 2016, London, UK, April 6-8, 2016. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9639}, pages = {216--232}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-30806-7\_14}, doi = {10.1007/978-3-319-30806-7\_14}, timestamp = {Tue, 01 Jun 2021 15:22:49 +0200}, biburl = {https://dblp.org/rec/conf/essos/Hallett016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosec/ChenAGSM16, author = {Wei Chen and David Aspinall and Andrew D. Gordon and Charles Sutton and Igor Muttik}, editor = {Michalis Polychronakis and Cristiano Giuffrida}, title = {A text-mining approach to explain unwanted behaviours}, booktitle = {Proceedings of the 9th European Workshop on System Security, {EUROSEC} 2016, London, UK, April 18-21, 2016}, pages = {4:1--4:6}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2905760.2905763}, doi = {10.1145/2905760.2905763}, timestamp = {Thu, 07 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosec/ChenAGSM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fase/0001K16, author = {David Aspinall and Cezary Kaliszyk}, editor = {Perdita Stevens and Andrzej Wasowski}, title = {Towards Formal Proof Metrics}, booktitle = {Fundamental Approaches to Software Engineering - 19th International Conference, {FASE} 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2016, Eindhoven, The Netherlands, April 2-8, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9633}, pages = {325--341}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49665-7\_19}, doi = {10.1007/978-3-662-49665-7\_19}, timestamp = {Wed, 16 Mar 2022 23:55:35 +0100}, biburl = {https://dblp.org/rec/conf/fase/0001K16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifm/ChenAGSM16, author = {Wei Chen and David Aspinall and Andrew D. Gordon and Charles Sutton and Igor Muttik}, editor = {Erika {\'{A}}brah{\'{a}}m and Marieke Huisman}, title = {On Robust Malware Classifiers by Verifying Unwanted Behaviours}, booktitle = {Integrated Formal Methods - 12th International Conference, {IFM} 2016, Reykjavik, Iceland, June 1-5, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9681}, pages = {326--341}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-33693-0\_21}, doi = {10.1007/978-3-319-33693-0\_21}, timestamp = {Thu, 07 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifm/ChenAGSM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itp/0001K16, author = {David Aspinall and Cezary Kaliszyk}, editor = {Jasmin Christian Blanchette and Stephan Merz}, title = {What's in a Theorem Name?}, booktitle = {Interactive Theorem Proving - 7th International Conference, {ITP} 2016, Nancy, France, August 22-25, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9807}, pages = {459--465}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-43144-4\_28}, doi = {10.1007/978-3-319-43144-4\_28}, timestamp = {Tue, 14 May 2019 10:00:37 +0200}, biburl = {https://dblp.org/rec/conf/itp/0001K16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/Seghir0M16, author = {Mohamed Nassim Seghir and David Aspinall and Lenka Marekov{\'{a}}}, title = {Certified Lightweight Contextual Policies for Android}, booktitle = {{IEEE} Cybersecurity Development, SecDev 2016, Boston, MA, USA, November 3-4, 2016}, pages = {94--100}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SecDev.2016.032}, doi = {10.1109/SECDEV.2016.032}, timestamp = {Thu, 08 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secdev/Seghir0M16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ChenAGSM16, author = {Wei Chen and David Aspinall and Andrew D. Gordon and Charles Sutton and Igor Muttik}, editor = {Matthias Hollick and Panos Papadimitratos and William Enck}, title = {More Semantics More Robust: Improving Android Malware Classifiers}, booktitle = {Proceedings of the 9th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, {WISEC} 2016, Darmstadt, Germany, July 18-22, 2016}, pages = {147--158}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2939918.2939931}, doi = {10.1145/2939918.2939931}, timestamp = {Thu, 07 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/ChenAGSM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/essos/2016imps, editor = {David Aspinall and Lorenzo Cavallaro and Mohamed Nassim Seghir and Melanie Volkamer}, title = {Proceedings of the 1st International Workshop on Innovations in Mobile Privacy and Security, {IMPS} 2016, co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2016), London, UK, April 6, 2016}, series = {{CEUR} Workshop Proceedings}, volume = {1575}, publisher = {CEUR-WS.org}, year = {2016}, url = {https://ceur-ws.org/Vol-1575}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/essos/2016imps.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/primelife/2015, editor = {David Aspinall and Jan Camenisch and Marit Hansen and Simone Fischer{-}H{\"{u}}bner and Charles D. Raab}, title = {Privacy and Identity Management. Time for a Revolution? - 10th {IFIP} {WG} 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Edinburgh, UK, August 16-21, 2015, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {476}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-41763-9}, doi = {10.1007/978-3-319-41763-9}, isbn = {978-3-319-41762-2}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/primelife/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/Seghir016, author = {Mohamed Nassim Seghir and David Aspinall}, title = {DroidGen: Constraint-based and Data-Driven Policy Generation for Android}, journal = {CoRR}, volume = {abs/1612.07586}, year = {2016}, url = {http://arxiv.org/abs/1612.07586}, eprinttype = {arXiv}, eprint = {1612.07586}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/Seghir016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atva/SeghirA15, author = {Mohamed Nassim Seghir and David Aspinall}, editor = {Bernd Finkbeiner and Geguang Pu and Lijun Zhang}, title = {EviCheck: Digital Evidence for Android}, booktitle = {Automated Technology for Verification and Analysis - 13th International Symposium, {ATVA} 2015, Shanghai, China, October 12-15, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9364}, pages = {221--227}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24953-7\_17}, doi = {10.1007/978-3-319-24953-7\_17}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/atva/SeghirA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icst/KnorrA15, author = {Konstantin Knorr and David Aspinall}, title = {Security testing for Android mHealth apps}, booktitle = {Eighth {IEEE} International Conference on Software Testing, Verification and Validation, {ICST} 2015 Workshops, Graz, Austria, April 13-17, 2015}, pages = {1--8}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICSTW.2015.7107459}, doi = {10.1109/ICSTW.2015.7107459}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icst/KnorrA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mkm/ObuaFSA15, author = {Steven Obua and Jacques D. Fleuriot and Phil Scott and David Aspinall}, editor = {Manfred Kerber and Jacques Carette and Cezary Kaliszyk and Florian Rabe and Volker Sorge}, title = {Type Inference for {ZFH}}, booktitle = {Intelligent Computer Mathematics - International Conference, {CICM} 2015, Washington, DC, USA, July 13-17, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9150}, pages = {87--101}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-20615-8\_6}, doi = {10.1007/978-3-319-20615-8\_6}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mkm/ObuaFSA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/percom/MicallefKJBA15, author = {Nicholas Micallef and Hilmi G{\"{u}}nes Kayacik and Mike Just and Lynne Baillie and David Aspinall}, title = {Sensor use and usefulness: Trade-offs for data-driven authentication on mobile devices}, booktitle = {2015 {IEEE} International Conference on Pervasive Computing and Communications, PerCom 2015, St. Louis, MO, USA, 23-27 March, 2015}, pages = {189--197}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/PERCOM.2015.7146528}, doi = {10.1109/PERCOM.2015.7146528}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/percom/MicallefKJBA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/KnorrAW15, author = {Konstantin Knorr and David Aspinall and Maria Wolters}, editor = {Hannes Federrath and Dieter Gollmann}, title = {On the Privacy, Security and Safety of Blood Pressure and Diabetes Apps}, booktitle = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11 International Conference, {SEC} 2015, Hamburg, Germany, May 26-28, 2015, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {455}, pages = {571--584}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-18467-8\_38}, doi = {10.1007/978-3-319-18467-8\_38}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/KnorrAW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/GorA15, author = {Bela Gor and David Aspinall}, title = {Accessible Banking: Experiences and Future Directions}, journal = {CoRR}, volume = {abs/1507.04578}, year = {2015}, url = {http://arxiv.org/abs/1507.04578}, eprinttype = {arXiv}, eprint = {1507.04578}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/GorA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/essos/HallettA14, author = {Joseph Hallett and David Aspinall}, editor = {Wouter Joosen and Fabio Martinelli and Thomas Heyman}, title = {Towards an Authorization Framework for App Security Checking}, booktitle = {Proceedings of the 2014 ESSoS Doctoral Symposium co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2014), Munich, Germany, February 26, 2014}, series = {{CEUR} Workshop Proceedings}, volume = {1298}, publisher = {CEUR-WS.org}, year = {2014}, url = {https://ceur-ws.org/Vol-1298/paper10.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:23 +0100}, biburl = {https://dblp.org/rec/conf/essos/HallettA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sycss/FranzenA14, author = {Daniel Franzen and David Aspinall}, editor = {Temur Kutsia and Andrei Voronkov}, title = {Towards an amortized type system for JavaScript}, booktitle = {6th International Symposium on Symbolic Computation in Software Science, {SCSS} 2014, Gammarth, La Marsa, Tunisia, December 7-8, 2014}, series = {EPiC Series in Computing}, volume = {30}, pages = {12--26}, publisher = {EasyChair}, year = {2014}, url = {https://doi.org/10.29007/v2f2}, doi = {10.29007/V2F2}, timestamp = {Sun, 15 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sycss/FranzenA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ObuaFSA14, author = {Steven Obua and Jacques D. Fleuriot and Phil Scott and David Aspinall}, title = {ProofPeer: Collaborative Theorem Proving}, journal = {CoRR}, volume = {abs/1404.6186}, year = {2014}, url = {http://arxiv.org/abs/1404.6186}, eprinttype = {arXiv}, eprint = {1404.6186}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ObuaFSA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/KayacikJBAM14, author = {Hilmi G{\"{u}}nes Kayacik and Mike Just and Lynne Baillie and David Aspinall and Nicholas Micallef}, title = {Data Driven Authentication: On the Effectiveness of User Behaviour Modelling with Mobile Device Sensors}, journal = {CoRR}, volume = {abs/1410.7743}, year = {2014}, url = {http://arxiv.org/abs/1410.7743}, eprinttype = {arXiv}, eprint = {1410.7743}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/KayacikJBAM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/AspinallJ13, author = {David Aspinall and Mike Just}, editor = {Ahmad{-}Reza Sadeghi}, title = {"Give Me Letters 2, 3 and 6!": Partial Password Implementations and Attacks}, booktitle = {Financial Cryptography and Data Security - 17th International Conference, {FC} 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7859}, pages = {126--143}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39884-1\_11}, doi = {10.1007/978-3-642-39884-1\_11}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/AspinallJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lpar/AspinallDL13, author = {David Aspinall and Ewen Denney and Christoph L{\"{u}}th}, editor = {Kenneth L. McMillan and Aart Middeldorp and Andrei Voronkov}, title = {A Semantic Basis for Proof Queries and Transformations}, booktitle = {Logic for Programming, Artificial Intelligence, and Reasoning - 19th International Conference, LPAR-19, Stellenbosch, South Africa, December 14-19, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8312}, pages = {53--70}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-45221-5\_4}, doi = {10.1007/978-3-642-45221-5\_4}, timestamp = {Tue, 14 May 2019 10:00:55 +0200}, biburl = {https://dblp.org/rec/conf/lpar/AspinallDL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lpar/DietrichWA13, author = {Dominik Dietrich and Iain Whiteside and David Aspinall}, editor = {Kenneth L. McMillan and Aart Middeldorp and Andrei Voronkov}, title = {Polar: {A} Framework for Proof Refactoring}, booktitle = {Logic for Programming, Artificial Intelligence, and Reasoning - 19th International Conference, LPAR-19, Stellenbosch, South Africa, December 14-19, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8312}, pages = {776--791}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-45221-5\_52}, doi = {10.1007/978-3-642-45221-5\_52}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/lpar/DietrichWA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mkm/ObuaAA13, author = {Steven Obua and Mark Adams and David Aspinall}, editor = {Jacques Carette and David Aspinall and Christoph Lange and Petr Sojka and Wolfgang Windsteiger}, title = {Capturing Hiproofs in {HOL} Light}, booktitle = {Intelligent Computer Mathematics - MKM, Calculemus, DML, and Systems and Projects 2013, Held as Part of {CICM} 2013, Bath, UK, July 8-12, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7961}, pages = {184--199}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39320-4\_12}, doi = {10.1007/978-3-642-39320-4\_12}, timestamp = {Sun, 02 Jun 2019 21:17:34 +0200}, biburl = {https://dblp.org/rec/conf/mkm/ObuaAA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/mkm/2013ws, editor = {Christoph Lange and David Aspinall and Jacques Carette and James H. Davenport and Andrea Kohlhase and Michael Kohlhase and Paul Libbrecht and Pedro Quaresma and Florian Rabe and Petr Sojka and Iain Whiteside and Wolfgang Windsteiger}, title = {Joint Proceedings of the MathUI, OpenMath, {PLMMS} and ThEdu Workshops and Work in Progress at CICM, Bath, {UK}}, series = {{CEUR} Workshop Proceedings}, volume = {1010}, publisher = {CEUR-WS.org}, year = {2013}, url = {https://ceur-ws.org/Vol-1010}, urn = {urn:nbn:de:0074-1010-3}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mkm/2013ws.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/mkm/2013, editor = {Jacques Carette and David Aspinall and Christoph Lange and Petr Sojka and Wolfgang Windsteiger}, title = {Intelligent Computer Mathematics - MKM, Calculemus, DML, and Systems and Projects 2013, Held as Part of {CICM} 2013, Bath, UK, July 8-12, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7961}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39320-4}, doi = {10.1007/978-3-642-39320-4}, isbn = {978-3-642-39319-8}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mkm/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ObuaAA13, author = {Steven Obua and Mark Adams and David Aspinall}, title = {Capturing Hiproofs in {HOL} Light}, journal = {CoRR}, volume = {abs/1307.2713}, year = {2013}, url = {http://arxiv.org/abs/1307.2713}, eprinttype = {arXiv}, eprint = {1307.2713}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ObuaAA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aisc/WhitesideAG12, author = {Iain Whiteside and David Aspinall and Gudmund Grov}, editor = {Johan Jeuring and John A. Campbell and Jacques Carette and Gabriel Dos Reis and Petr Sojka and Makarius Wenzel and Volker Sorge}, title = {An Essence of SSReflect}, booktitle = {Intelligent Computer Mathematics - 11th International Conference, {AISC} 2012, 19th Symposium, Calculemus 2012, 5th International Workshop, {DML} 2012, 11th International Conference, {MKM} 2012, Systems and Projects, Held as Part of {CICM} 2012, Bremen, Germany, July 8-13, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7362}, pages = {186--201}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31374-5\_13}, doi = {10.1007/978-3-642-31374-5\_13}, timestamp = {Sun, 02 Jun 2019 21:23:46 +0200}, biburl = {https://dblp.org/rec/conf/aisc/WhitesideAG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/JustA12, author = {Mike Just and David Aspinall}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {On the security and usability of dual credential authentication in {UK} online banking}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {259--264}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470955/}, timestamp = {Thu, 10 Mar 2022 09:31:39 +0100}, biburl = {https://dblp.org/rec/conf/icitst/JustA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lpar/AspinallDL12, author = {David Aspinall and Ewen Denney and Christoph L{\"{u}}th}, editor = {Nikolaj S. Bj{\o}rner and Andrei Voronkov}, title = {Querying Proofs}, booktitle = {Logic for Programming, Artificial Intelligence, and Reasoning - 18th International Conference, LPAR-18, M{\'{e}}rida, Venezuela, March 11-15, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7180}, pages = {92--106}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28717-6\_10}, doi = {10.1007/978-3-642-28717-6\_10}, timestamp = {Thu, 14 Apr 2022 20:26:15 +0200}, biburl = {https://dblp.org/rec/conf/lpar/AspinallDL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/uitp/2010, editor = {David Aspinall and Claudio Sacerdoti Coen}, title = {Proceedings of the 9th International Workshop On User Interfaces for Theorem Provers, {UITP} 2010, Edinburgh, UK, July 15, 2010}, series = {Electronic Notes in Theoretical Computer Science}, volume = {285}, publisher = {Elsevier}, year = {2012}, url = {https://www.sciencedirect.com/journal/electronic-notes-in-theoretical-computer-science/vol/285/suppl/C}, timestamp = {Fri, 25 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uitp/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dalt/BijaniRA11, author = {Shahriar Bijani and David Robertson and David Aspinall}, editor = {Chiaki Sakama and Sebastian Sardi{\~{n}}a and Wamberto Weber Vasconcelos and Michael Winikoff}, title = {Probing Attacks on Multi-Agent Systems Using Electronic Institutions}, booktitle = {Declarative Agent Languages and Technologies {IX} - 9th International Workshop, {DALT} 2011, Taipei, Taiwan, May 3, 2011, Revised Selected and Invited Papers}, series = {Lecture Notes in Computer Science}, volume = {7169}, pages = {33--50}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29113-5\_4}, doi = {10.1007/978-3-642-29113-5\_4}, timestamp = {Tue, 13 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dalt/BijaniRA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mkm/WhitesideADG11, author = {Iain Whiteside and David Aspinall and Lucas Dixon and Gudmund Grov}, editor = {James H. Davenport and William M. Farmer and Josef Urban and Florian Rabe}, title = {Towards Formal Proof Script Refactoring}, booktitle = {Intelligent Computer Mathematics - 18th Symposium, Calculemus 2011, and 10th International Conference, {MKM} 2011, Bertinoro, Italy, July 18-23, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6824}, pages = {260--275}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22673-1\_18}, doi = {10.1007/978-3-642-22673-1\_18}, timestamp = {Fri, 20 Nov 2020 16:08:54 +0100}, biburl = {https://dblp.org/rec/conf/mkm/WhitesideADG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mics/AspinallDL10, author = {David Aspinall and Ewen Denney and Christoph L{\"{u}}th}, title = {Tactics for Hierarchical Proof}, journal = {Math. Comput. Sci.}, volume = {3}, number = {3}, pages = {309--330}, year = {2010}, url = {https://doi.org/10.1007/s11786-010-0025-6}, doi = {10.1007/S11786-010-0025-6}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mics/AspinallDL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tgc/AspinallAMS10, author = {David Aspinall and Robert Atkey and Kenneth MacKenzie and Donald Sannella}, editor = {Martin Wirsing and Martin Hofmann and Axel Rauschmayer}, title = {Symbolic and Analytic Techniques for Resource Analysis of Java Bytecode}, booktitle = {Trustworthly Global Computing - 5th International Symposium, {TGC} 2010, Munich, Germany, February 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6084}, pages = {1--22}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15640-3\_1}, doi = {10.1007/978-3-642-15640-3\_1}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tgc/AspinallAMS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/AspinallC12, author = {David Aspinall and Claudio Sacerdoti Coen}, editor = {David Aspinall and Claudio Sacerdoti Coen}, title = {Preface}, booktitle = {Proceedings of the 9th International Workshop On User Interfaces for Theorem Provers, {UITP} 2010, Edinburgh, UK, July 15, 2010}, series = {Electronic Notes in Theoretical Computer Science}, volume = {285}, pages = {1--2}, publisher = {Elsevier}, year = {2010}, url = {https://doi.org/10.1016/j.entcs.2012.06.001}, doi = {10.1016/J.ENTCS.2012.06.001}, timestamp = {Fri, 25 Nov 2022 14:25:12 +0100}, biburl = {https://dblp.org/rec/journals/entcs/AspinallC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/KeighrenAS09, author = {Gavin Keighren and David Aspinall and Graham Steel}, editor = {Pierpaolo Degano and Luca Vigan{\`{o}}}, title = {Towards a Type System for Security APIs}, booktitle = {Foundations and Applications of Security Analysis, Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, {ARSPA-WITS} 2009, York, UK, March 28-29, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5511}, pages = {173--192}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03459-6\_12}, doi = {10.1007/978-3-642-03459-6\_12}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/KeighrenAS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/JustA09, author = {Mike Just and David Aspinall}, editor = {Lorrie Faith Cranor}, title = {Personal choice and challenge questions: a security and usability assessment}, booktitle = {Proceedings of the 5th Symposium on Usable Privacy and Security, {SOUPS} 2009, Mountain View, California, USA, July 15-17, 2009}, series = {{ACM} International Conference Proceeding Series}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1572532.1572543}, doi = {10.1145/1572532.1572543}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/soups/JustA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jfp/AspinallHK08, author = {David Aspinall and Martin Hofmann and Michal Konecn{\'{y}}}, title = {A type system with usage aspects}, journal = {J. Funct. Program.}, volume = {18}, number = {2}, pages = {141--178}, year = {2008}, url = {https://doi.org/10.1017/S0956796807006399}, doi = {10.1017/S0956796807006399}, timestamp = {Tue, 06 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jfp/AspinallHK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aisc/AspinallDL08, author = {David Aspinall and Ewen Denney and Christoph L{\"{u}}th}, editor = {Serge Autexier and John A. Campbell and Julio Rubio and Volker Sorge and Masakazu Suzuki and Freek Wiedijk}, title = {A Tactic Language for Hiproofs}, booktitle = {Intelligent Computer Mathematics, 9th International Conference, {AISC} 2008, 15th Symposium, Calculemus 2008, 7th International Conference, {MKM} 2008, Birmingham, UK, July 28 - August 1, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5144}, pages = {339--354}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85110-3\_30}, doi = {10.1007/978-3-540-85110-3\_30}, timestamp = {Mon, 05 Feb 2024 20:35:32 +0100}, biburl = {https://dblp.org/rec/conf/aisc/AspinallDL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecoop/SevcikA08, author = {Jaroslav Sevc{\'{\i}}k and David Aspinall}, editor = {Jan Vitek}, title = {On Validity of Program Transformations in the Java Memory Model}, booktitle = {{ECOOP} 2008 - Object-Oriented Programming, 22nd European Conference, Paphos, Cyprus, July 7-11, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5142}, pages = {27--51}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70592-5\_3}, doi = {10.1007/978-3-540-70592-5\_3}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/ecoop/SevcikA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/AspinallALW09, author = {David Aspinall and Serge Autexier and Christoph L{\"{u}}th and Marc Wagner}, editor = {Serge Autexier and Christoph Benzm{\"{u}}ller}, title = {Towards Merging PlatOmega and {PGIP}}, booktitle = {Proceedings of the 8th International Workshop on User Interfaces for Theorem Provers, UITP@TPHOLs 2008, Montr{\'{e}}al, Canada, August 22, 2008}, series = {Electronic Notes in Theoretical Computer Science}, volume = {226}, pages = {3--21}, publisher = {Elsevier}, year = {2008}, url = {https://doi.org/10.1016/j.entcs.2008.12.094}, doi = {10.1016/J.ENTCS.2008.12.094}, timestamp = {Fri, 24 Feb 2023 10:08:44 +0100}, biburl = {https://dblp.org/rec/journals/entcs/AspinallALW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jar/AspinallL07, author = {David Aspinall and Christoph L{\"{u}}th}, title = {Special Issue on User Interfaces in Theorem Proving: Preface}, journal = {J. Autom. Reason.}, volume = {39}, number = {2}, pages = {107--108}, year = {2007}, url = {https://doi.org/10.1007/s10817-007-9075-0}, doi = {10.1007/S10817-007-9075-0}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jar/AspinallL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/AspinallBHLM07, author = {David Aspinall and Lennart Beringer and Martin Hofmann and Hans{-}Wolfgang Loidl and Alberto Momigliano}, title = {A program logic for resources}, journal = {Theor. Comput. Sci.}, volume = {389}, number = {3}, pages = {411--445}, year = {2007}, url = {https://doi.org/10.1016/j.tcs.2007.09.003}, doi = {10.1016/J.TCS.2007.09.003}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/AspinallBHLM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/calco/AspinallH07, author = {David Aspinall and Piotr Hoffman}, editor = {Till Mossakowski and Ugo Montanari and Magne Haveraaen}, title = {Datatypes in Memory}, booktitle = {Algebra and Coalgebra in Computer Science, Second International Conference, {CALCO} 2007, Bergen, Norway, August 20-24, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4624}, pages = {111--125}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73859-6\_8}, doi = {10.1007/978-3-540-73859-6\_8}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/calco/AspinallH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fmco/AspinallMS07, author = {David Aspinall and Patrick Maier and Ian Stark}, editor = {Frank S. de Boer and Marcello M. Bonsangue and Susanne Graf and Willem P. de Roever}, title = {Safety Guarantees from Explicit Resource Management}, booktitle = {Formal Methods for Components and Objects, 6th International Symposium, {FMCO} 2007, Amsterdam, The Netherlands, October 24-26, 2007, Revised Lectures}, series = {Lecture Notes in Computer Science}, volume = {5382}, pages = {52--71}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-92188-2\_3}, doi = {10.1007/978-3-540-92188-2\_3}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/fmco/AspinallMS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mkm/AspinallLW07, author = {David Aspinall and Christoph L{\"{u}}th and Daniel Winterstein}, editor = {Manuel Kauers and Manfred Kerber and Robert Miner and Wolfgang Windsteiger}, title = {A Framework for Interactive Proof}, booktitle = {Towards Mechanized Mathematical Assistants, 14th Symposium, Calculemus 2007, 6th International Conference, {MKM} 2007, Hagenberg, Austria, June 27-30, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4573}, pages = {161--175}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73086-6\_15}, doi = {10.1007/978-3-540-73086-6\_15}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/mkm/AspinallLW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tphol/AspinallS07, author = {David Aspinall and Jaroslav Sevc{\'{\i}}k}, editor = {Klaus Schneider and Jens Brandt}, title = {Formalising Java's Data Race Free Guarantee}, booktitle = {Theorem Proving in Higher Order Logics, 20th International Conference, TPHOLs 2007, Kaiserslautern, Germany, September 10-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4732}, pages = {22--37}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74591-4\_4}, doi = {10.1007/978-3-540-74591-4\_4}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/tphol/AspinallS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/AspinallMS08, author = {David Aspinall and Patrick Maier and Ian Stark}, editor = {Fabio Massacci and Frank Piessens}, title = {Monitoring External Resources in Java {MIDP}}, booktitle = {Proceedings of the First International Workshop on Run Time Enforcement for Mobile and Distributed Systems, REM@ESORICS 2007, Dresden, Germany, September 27, 2007}, series = {Electronic Notes in Theoretical Computer Science}, volume = {197}, number = {1}, pages = {17--30}, publisher = {Elsevier}, year = {2007}, url = {https://doi.org/10.1016/j.entcs.2007.10.011}, doi = {10.1016/J.ENTCS.2007.10.011}, timestamp = {Mon, 13 Feb 2023 09:09:10 +0100}, biburl = {https://dblp.org/rec/journals/entcs/AspinallMS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eclipse/AspinallWLF06, author = {David Aspinall and Daniel Winterstein and Christoph L{\"{u}}th and Ahsan Fayyaz}, editor = {Michael G. Burke and Alessandro Orso and Martin P. Robillard}, title = {Proof general in Eclipse: system and architecture overview}, booktitle = {Proceedings of the 2006 {OOPSLA} workshop on Eclipse Technology eXchange, {ETX} 2006, Portland, Oregon, USA, October 22-23, 2006}, pages = {45--49}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1188835.1188845}, doi = {10.1145/1188835.1188845}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eclipse/AspinallWLF06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/AspinallBM07, author = {David Aspinall and Lennart Beringer and Alberto Momigliano}, editor = {Jens Knoop and George C. Necula and Wolf Zimmermann}, title = {Optimisation Validation}, booktitle = {Proceedings of the 5th International Workshop on Compiler Optimization meets Compiler Verification, COCV@ETAPS 2006, Vienna, Austria, April 2, 2006}, series = {Electronic Notes in Theoretical Computer Science}, volume = {176}, number = {3}, pages = {37--59}, publisher = {Elsevier}, year = {2006}, url = {https://doi.org/10.1016/j.entcs.2006.06.017}, doi = {10.1016/J.ENTCS.2006.06.017}, timestamp = {Tue, 31 Jan 2023 13:22:34 +0100}, biburl = {https://dblp.org/rec/journals/entcs/AspinallBM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cassis/AspinallM05, author = {David Aspinall and Kenneth MacKenzie}, editor = {Gilles Barthe and Benjamin Gr{\'{e}}goire and Marieke Huisman and Jean{-}Louis Lanet}, title = {Mobile Resource Guarantees and Policies}, booktitle = {Construction and Analysis of Safe, Secure, and Interoperable Smart Devices, Second International Workshop, {CASSIS} 2005, Nice, France, March 8-11, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3956}, pages = {16--36}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11741060\_2}, doi = {10.1007/11741060\_2}, timestamp = {Fri, 09 Apr 2021 18:40:44 +0200}, biburl = {https://dblp.org/rec/conf/cassis/AspinallM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcai/WintersteinAL05, author = {Daniel Winterstein and David Aspinall and Christoph L{\"{u}}th}, editor = {Leslie Pack Kaelbling and Alessandro Saffiotti}, title = {Proof General / Eclipse: {A} Generic Interface for Interactive Proof}, booktitle = {IJCAI-05, Proceedings of the Nineteenth International Joint Conference on Artificial Intelligence, Edinburgh, Scotland, UK, July 30 - August 5, 2005}, pages = {1587--1588}, publisher = {Professional Book Center}, year = {2005}, url = {http://ijcai.org/Proceedings/05/Papers/post-0503.pdf}, timestamp = {Tue, 20 Aug 2019 16:16:29 +0200}, biburl = {https://dblp.org/rec/conf/ijcai/WintersteinAL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mkm/AspinallLW05, author = {David Aspinall and Christoph L{\"{u}}th and Burkhart Wolff}, editor = {Michael Kohlhase}, title = {Assisted Proof Document Authoring}, booktitle = {Mathematical Knowledge Management, 4th International Conference, {MKM} 2005, Bremen, Germany, July 15-17, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3863}, pages = {65--80}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11618027\_5}, doi = {10.1007/11618027\_5}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/mkm/AspinallLW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sfp/SannellaHAGSBLMMS05, author = {Donald Sannella and Martin Hofmann and David Aspinall and Stephen Gilmore and Ian Stark and Lennart Beringer and Hans{-}Wolfgang Loidl and Kenneth MacKenzie and Alberto Momigliano and Olha Shkaravska}, editor = {Marko C. J. D. van Eekelen}, title = {Mobile Resource Guarantees (project evaluation paper)}, booktitle = {Revised Selected Papers from the Sixth Symposium on Trends in Functional Programming, {TFP} 2005, Tallinn, Estonia, 23-24 September 2005}, series = {Trends in Functional Programming}, volume = {6}, pages = {211--226}, publisher = {Intellect}, year = {2005}, timestamp = {Wed, 09 Sep 2015 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sfp/SannellaHAGSBLMMS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cassis/AspinallGHSS04, author = {David Aspinall and Stephen Gilmore and Martin Hofmann and Donald Sannella and Ian Stark}, editor = {Gilles Barthe and Lilian Burdy and Marieke Huisman and Jean{-}Louis Lanet and Traian Muntean}, title = {Mobile Resource Guarantees for Smart Devices}, booktitle = {Construction and Analysis of Safe, Secure, and Interoperable Smart Devices, International Workshop, {CASSIS} 2004, Marseille, France, March 10-14, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3362}, pages = {1--26}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30569-9\_1}, doi = {10.1007/978-3-540-30569-9\_1}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cassis/AspinallGHSS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tphol/AspinallBHLM04, author = {David Aspinall and Lennart Beringer and Martin Hofmann and Hans{-}Wolfgang Loidl and Alberto Momigliano}, editor = {Konrad Slind and Annette Bunker and Ganesh Gopalakrishnan}, title = {A Program Logic for Resource Verification}, booktitle = {Theorem Proving in Higher Order Logics, 17th International Conference, TPHOLs 2004, Park City, Utah, USA, September 14-17, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3223}, pages = {34--49}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30142-4\_3}, doi = {10.1007/978-3-540-30142-4\_3}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/tphol/AspinallBHLM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/uitp/2003, editor = {David Aspinall and Christoph L{\"{u}}th}, title = {Proceedings of the User Interfaces for Theorem Provers Workshop, UITP@TPHOLs 2003, Rome, Italy, September 8, 2003}, series = {Electronic Notes in Theoretical Computer Science}, volume = {103}, publisher = {Elsevier}, year = {2004}, url = {https://www.sciencedirect.com/journal/electronic-notes-in-theoretical-computer-science/vol/103/suppl/C}, timestamp = {Fri, 09 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uitp/2003.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jar/AspinallC03, author = {David Aspinall and Adriana B. Compagnoni}, title = {Heap-Bounded Assembly Language}, journal = {J. Autom. Reason.}, volume = {31}, number = {3-4}, pages = {261--302}, year = {2003}, url = {https://doi.org/10.1023/B:JARS.0000021014.79255.33}, doi = {10.1023/B:JARS.0000021014.79255.33}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jar/AspinallC03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/AspinallL04, author = {David Aspinall and Christoph L{\"{u}}th}, editor = {David Aspinall and Christoph L{\"{u}}th}, title = {Preface}, booktitle = {Proceedings of the User Interfaces for Theorem Provers Workshop, UITP@TPHOLs 2003, Rome, Italy, September 8, 2003}, series = {Electronic Notes in Theoretical Computer Science}, volume = {103}, pages = {1--2}, publisher = {Elsevier}, year = {2003}, url = {https://doi.org/10.1016/j.entcs.2004.09.010}, doi = {10.1016/J.ENTCS.2004.09.010}, timestamp = {Fri, 09 Dec 2022 11:35:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/AspinallL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/AspinallL04a, author = {David Aspinall and Christoph L{\"{u}}th}, editor = {David Aspinall and Christoph L{\"{u}}th}, title = {Proof General meets IsaWin: Combining Text-Based And Graphical User Interfaces}, booktitle = {Proceedings of the User Interfaces for Theorem Provers Workshop, UITP@TPHOLs 2003, Rome, Italy, September 8, 2003}, series = {Electronic Notes in Theoretical Computer Science}, volume = {103}, pages = {3--26}, publisher = {Elsevier}, year = {2003}, url = {https://doi.org/10.1016/j.entcs.2004.09.011}, doi = {10.1016/J.ENTCS.2004.09.011}, timestamp = {Fri, 09 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/AspinallL04a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amast/AspinallS02, author = {David Aspinall and Donald Sannella}, editor = {H{\'{e}}l{\`{e}}ne Kirchner and Christophe Ringeissen}, title = {From Specifications to Code in {CASL}}, booktitle = {Algebraic Methodology and Software Technology, 9th International Conference, {AMAST} 2002, Saint-Gilles-les-Bains, Reunion Island, France, September 9-13, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2422}, pages = {1--14}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45719-4\_1}, doi = {10.1007/3-540-45719-4\_1}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/amast/AspinallS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esop/AspinallH02, author = {David Aspinall and Martin Hofmann}, editor = {Daniel Le M{\'{e}}tayer}, title = {Another Type System for In-Place Update}, booktitle = {Programming Languages and Systems, 11th European Symposium on Programming, {ESOP} 2002, held as Part of the Joint European Conference on Theory and Practice of Software, {ETAPS} 2002, Grenoble, France, April 8-12, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2305}, pages = {36--52}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45927-8\_4}, doi = {10.1007/3-540-45927-8\_4}, timestamp = {Tue, 14 May 2019 10:00:41 +0200}, biburl = {https://dblp.org/rec/conf/esop/AspinallH02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wadt/Aspinall02, author = {David Aspinall}, editor = {Martin Wirsing and Dirk Pattinson and Rolf Hennicker}, title = {Type Checking Parametrised Programs and Specifications in ASL+\({}_{\mbox{FPC}}\)}, booktitle = {Recent Trends in Algebraic Development Techniques, 16th International Workshop, {WADT} 2002, Frauenchiemsee, Germany, September 24-27, 2002, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {2755}, pages = {129--144}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-3-540-40020-2\_7}, doi = {10.1007/978-3-540-40020-2\_7}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/wadt/Aspinall02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/AspinallC01, author = {David Aspinall and Adriana B. Compagnoni}, title = {Subtyping dependent types}, journal = {Theor. Comput. Sci.}, volume = {266}, number = {1-2}, pages = {273--309}, year = {2001}, url = {https://doi.org/10.1016/S0304-3975(00)00175-4}, doi = {10.1016/S0304-3975(00)00175-4}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/AspinallC01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csl/Aspinall00, author = {David Aspinall}, editor = {Peter Clote and Helmut Schwichtenberg}, title = {Subtyping with Power Types}, booktitle = {Computer Science Logic, 14th Annual Conference of the EACSL, Fischbachau, Germany, August 21-26, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1862}, pages = {156--171}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44622-2\_10}, doi = {10.1007/3-540-44622-2\_10}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/csl/Aspinall00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tacas/Aspinall00, author = {David Aspinall}, editor = {Susanne Graf and Michael I. Schwartzbach}, title = {Proof General: {A} Generic Tool for Proof Development}, booktitle = {Tools and Algorithms for Construction and Analysis of Systems, 6th International Conference, {TACAS} 2000, Held as Part of the European Joint Conferences on the Theory and Practice of Software, {ETAPS} 2000, Berlin, Germany, March 25 - April 2, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1785}, pages = {38--42}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-46419-0\_3}, doi = {10.1007/3-540-46419-0\_3}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/tacas/Aspinall00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/ethos/Aspinall97, author = {David Aspinall}, title = {Type systems for modular programs and specifications}, school = {University of Edinburgh, {UK}}, year = {1997}, url = {https://hdl.handle.net/1842/11587}, timestamp = {Wed, 04 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/ethos/Aspinall97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lics/AspinallC96, author = {David Aspinall and Adriana B. Compagnoni}, title = {Subtyping Dependent Types (Summary)}, booktitle = {Proceedings, 11th Annual {IEEE} Symposium on Logic in Computer Science, New Brunswick, New Jersey, USA, July 27-30, 1996}, pages = {86--97}, publisher = {{IEEE} Computer Society}, year = {1996}, url = {https://doi.org/10.1109/LICS.1996.561307}, doi = {10.1109/LICS.1996.561307}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lics/AspinallC96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compass/Aspinall94, author = {David Aspinall}, editor = {Egidio Astesiano and Gianna Reggio and Andrzej Tarlecki}, title = {Types, Subtypes, and {ASL+}}, booktitle = {Recent Trends in Data Type Specification, 10th Workshop on Specification of Abstract Data Types Joint with the 5th {COMPASS} Workshop, S. Margherita, Italy, May 30 - June 3, 1994, Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {906}, pages = {116--131}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/BFb0014424}, doi = {10.1007/BFB0014424}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/compass/Aspinall94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csl/Aspinall94, author = {David Aspinall}, editor = {Leszek Pacholski and Jerzy Tiuryn}, title = {Subtyping with Singleton Types}, booktitle = {Computer Science Logic, 8th International Workshop, {CSL} '94, Kazimierz, Poland, September 25-30, 1994, Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {933}, pages = {1--15}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/BFb0022243}, doi = {10.1007/BFB0022243}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/csl/Aspinall94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.