Annabelle McIver

Professor

  • Source: Scopus
  • Calculated based on no. of publications stored in Pure and citations from Scopus
1987 …2020

Research activity per year

If you made any changes in Pure these will be visible here soon.
Filter
Chapter

Search results

  • Categorical information flow

    Rabehaja, T., McIver, A., Morgan, C. & Struth, G., 2019, The art of modelling computational systems: a journey from logic and concurrency to security and privacy. Alvim, M. S., Chatzikokolakis, K., Olarte, C. & Valencia, F. (eds.). Cham, Switzerland: Springer, Springer Nature, p. 329-343 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11760 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    1 Citation (Scopus)
  • On probabilistic Kleene algebras, automata and simulations

    McIver, A., Rabehaja, T. M. & Struth, G., 2011, Relational and Algebraic Methods in Computer Science: 12th International Conference, RAMICS 2011, Rotterdam, The Netherlands, May 30 – June 3, 2011. Proceedings. de Swart, H. (ed.). Heidelberg: Springer, Springer Nature, p. 264-279 16 p. (Lecture Notes in Computer Science; vol. 6663).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    3 Citations (Scopus)
  • Program refinement, perfect secrecy and information flow

    McIver, A. K., 2016, Engineering Trustworthy Software Systems - 1st International School, SETSS 2014, Tutorial Lectures. Liu, Z. & Zhang, Z. (eds.). 1st ed. Cham, Switzerland: Springer, Springer Nature, Vol. 9506. p. 80-102 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9506).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    1 Citation (Scopus)
  • Security, probability and nearly fair coins in the cryptographers' café

    McIver, A., Meinicke, L. & Morgan, C., 2009, FM 2009: Formal Methods: Second World Congress, Eindhoven, The Netherlands, November 2-6, 2009. Proceedings. Cavalcanti, A. & Dams, D. R. (eds.). Berlin: Springer, Springer Nature, p. 41-71 31 p. (Lecture Notes in Computer Science; vol. 5850).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    4 Citations (Scopus)
  • The thousand-and-one cryptographers

    McIver, A. K. & Morgan, C. C., 2010, Reflections on the work of C.A.R. Hoare. Roscoe, A. W., Jones, C. B. & Wood, K. B. (eds.). London: Springer, Springer Nature, p. 255-282 28 p. (History of computing).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • The thousand-and-one cryptographers

    McIver, A. & Morgan, C., 2019, Engineering Secure and Dependable Software Systems. Pretschner, A., Müller, P. & Stöckle, P. (eds.). Amsterdam: IOS Press, p. 137-162 26 p. (NATO Science for Peace and Security Series. Sub-Series D: Information and Communication Security; vol. 53).

    Research output: Chapter in Book/Report/Conference proceedingChapter