ORCID as entered in ROS

Select Publications
Chen C; McIver A; Morgan C, 2025, 'Source-Level Reasoning for Quantifying Information Leaks', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 98 - 127, http://dx.doi.org/10.1007/978-3-031-75783-9_5
Bird R; Gibbons J; Hinze R; Höfner P; Jeuring J; Meertens L; Möller B; Morgan C; Schrijvers T; Swierstra W; Wu N, 2021, 'Algorithmics', in Advancing Research in Information and Communication Technology, pp. 59 - 98, http://dx.doi.org/10.1007/978-3-030-81701-5_3
Alvim MS; Chatzikokolakis K; McIver A; Morgan C; Palamidessi C; Smith G, 2020, 'A demonic lattice of information', in Information Security and Cryptography, pp. 325 - 350, http://dx.doi.org/10.1007/978-3-319-96131-6_17
Alvim MS; Chatzikokolakis K; McIver A; Morgan C; Palamidessi C; Smith G, 2020, 'Axiomatics', in Information Security and Cryptography, pp. 183 - 204, http://dx.doi.org/10.1007/978-3-319-96131-6_11
Alvim MS; Chatzikokolakis K; McIver A; Morgan C; Palamidessi C; Smith G, 2020, 'Capacity', in Information Security and Cryptography, pp. 107 - 130, http://dx.doi.org/10.1007/978-3-319-96131-6_7
Alvim MS; Chatzikokolakis K; McIver A; Morgan C; Palamidessi C; Smith G, 2020, 'Channels', in Information Security and Cryptography, pp. 49 - 70, http://dx.doi.org/10.1007/978-3-319-96131-6_4
Alvim MS; Chatzikokolakis K; McIver A; Morgan C; Palamidessi C; Smith G, 2020, 'Composition of channels', in Information Security and Cryptography, pp. 131 - 145, http://dx.doi.org/10.1007/978-3-319-96131-6_8
Alvim MS; Chatzikokolakis K; McIver A; Morgan C; Palamidessi C; Smith G, 2020, 'Defense against side channels', in Information Security and Cryptography, pp. 389 - 397, http://dx.doi.org/10.1007/978-3-319-96131-6_20
Alvim MS; Chatzikokolakis K; McIver A; Morgan C; Palamidessi C; Smith G, 2020, 'Differential privacy', in Information Security and Cryptography, pp. 433 - 444, http://dx.doi.org/10.1007/978-3-319-96131-6_23
Alvim MS; Chatzikokolakis K; McIver A; Morgan C; Palamidessi C; Smith G, 2020, 'Hidden-Markov modeling of QIF in sequential programs', in Information Security and Cryptography, pp. 255 - 282, http://dx.doi.org/10.1007/978-3-319-96131-6_14
Alvim MS; Chatzikokolakis K; McIver A; Morgan C; Palamidessi C; Smith G, 2020, 'Introduction', in , pp. 3 - 13, http://dx.doi.org/10.1007/978-3-319-96131-6_1
Alvim MS; Chatzikokolakis K; McIver A; Morgan C; Palamidessi C; Smith G, 2020, 'Iteration and nontermination', in Information Security and Cryptography, pp. 307 - 323, http://dx.doi.org/10.1007/978-3-319-96131-6_16
Alvim MS; Chatzikokolakis K; McIver A; Morgan C; Palamidessi C; Smith G, 2020, 'Modeling secrets', in Information Security and Cryptography, pp. 17 - 23, http://dx.doi.org/10.1007/978-3-319-96131-6_2
Alvim MS; Chatzikokolakis K; McIver A; Morgan C; Palamidessi C; Smith G, 2020, 'Multi-party computation: The Three Judges protocol', in Information Security and Cryptography, pp. 399 - 411, http://dx.doi.org/10.1007/978-3-319-96131-6_21
Alvim MS; Chatzikokolakis K; McIver A; Morgan C; Palamidessi C; Smith G, 2020, 'On $$ \mathit {g} $$ -vulnerability', in Information Security and Cryptography, pp. 25 - 46, http://dx.doi.org/10.1007/978-3-319-96131-6_3
Alvim MS; Chatzikokolakis K; McIver A; Morgan C; Palamidessi C; Smith G, 2020, 'Posterior vulnerability and leakage', in Information Security and Cryptography, pp. 71 - 100, http://dx.doi.org/10.1007/978-3-319-96131-6_5
Alvim MS; Chatzikokolakis K; McIver A; Morgan C; Palamidessi C; Smith G, 2020, 'Program algebra for QIF', in Information Security and Cryptography, pp. 283 - 305, http://dx.doi.org/10.1007/978-3-319-96131-6_15
Alvim MS; Chatzikokolakis K; McIver A; Morgan C; Palamidessi C; Smith G, 2020, 'Quantitative information flow in sequential computer programs', in Information Security and Cryptography, pp. 225 - 253, http://dx.doi.org/10.1007/978-3-319-96131-6_13
Gibbons J; McIver A; Morgan C; Schrijvers T, 2020, 'Quantitative Information Flow with Monads in Haskell', in Foundations of Probabilistic Programming, pp. 391 - 448, http://dx.doi.org/10.1017/9781108770750.013
Alvim MS; Chatzikokolakis K; McIver A; Morgan C; Palamidessi C; Smith G, 2020, 'Refinement', in Information Security and Cryptography, pp. 147 - 170, http://dx.doi.org/10.1007/978-3-319-96131-6_9
Alvim MS; Chatzikokolakis K; McIver A; Morgan C; Palamidessi C; Smith G, 2020, 'Robustness', in Information Security and Cryptography, pp. 101 - 105, http://dx.doi.org/10.1007/978-3-319-96131-6_6
Alvim MS; Chatzikokolakis K; McIver A; Morgan C; Palamidessi C; Smith G, 2020, 'The Crowds protocol', in Information Security and Cryptography, pp. 353 - 367, http://dx.doi.org/10.1007/978-3-319-96131-6_18
Alvim MS; Chatzikokolakis K; McIver A; Morgan C; Palamidessi C; Smith G, 2020, 'The Dalenius perspective', in Information Security and Cryptography, pp. 171 - 181, http://dx.doi.org/10.1007/978-3-319-96131-6_10
Alvim MS; Chatzikokolakis K; McIver A; Morgan C; Palamidessi C; Smith G, 2020, 'The geometry of hypers, gains and losses', in Information Security and Cryptography, pp. 205 - 221, http://dx.doi.org/10.1007/978-3-319-96131-6_12
Alvim MS; Chatzikokolakis K; McIver A; Morgan C; Palamidessi C; Smith G, 2020, 'Timing attacks on blinded and bucketed cryptography', in Information Security and Cryptography, pp. 369 - 388, http://dx.doi.org/10.1007/978-3-319-96131-6_19
Alvim MS; Chatzikokolakis K; McIver A; Morgan C; Palamidessi C; Smith G, 2020, 'Voting systems', in Information Security and Cryptography, pp. 413 - 431, http://dx.doi.org/10.1007/978-3-319-96131-6_22
Rabehaja T; McIver A; Morgan C; Struth G, 2019, 'Categorical Information Flow', in The Art of Modelling Computational Systems: A Journey from Logic and Concurrency to Security and Privacy, pp. 329 - 343, http://dx.doi.org/10.1007/978-3-030-31175-9_19
Morgan C, 2017, 'A demonic lattice of information', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Springer, Cham, pp. 203 - 222, http://dx.doi.org/10.1007/978-3-319-51046-0_11
McIver A; Morgan CC, 2010, 'The thousand-and-one cryptographers', in Wood K; Roscoe AW; Jones CB (ed.), Reflections on the work of C.A.R. Hoare, Springer, New York, pp. 255 - 282
Morgan CC; McIver A, 2006, 'Developing and Reasoning about probabilistic programs in pGCL', in Cavalcanti ; Sampaio ; Woodcock (ed.), Refinement Techniques in Software Engineering, Springer Publishing Company, Germany, pp. 123 - 155
Morgan CC; McIver A, 2006, 'Programming-Logic Analysis of Fault Tolerance', in Butler ; Jones ; Romanovsky ; Troubitsyna (ed.), Rigorous Development of Complex Fault-Tolerant Systems, Springer Publishing Company, Germany, pp. 288 - 305
Hoang TS; Jin Z; Robinson K; McIver A; Morgan C, 2005, 'Development via Refinement in Probabilistic B — Foundation and Case Study', in Lecture Notes in Computer Science, Springer Berlin Heidelberg, pp. 355 - 373, http://dx.doi.org/10.1007/11415787_21
Morgan CC, 2005, 'Of probabilistic wp and CSP - and compositionality', in Abdallah ; Jones ; Roscoe ; Sanders (ed.), Proceedings of the First International Conference on Advances in Natural Computation (ICNC 2005), Part III, Lecture Notes in Computer Science 3612/2005, Springer, Berlin, Germany, pp. 220 - 241
Morgan CC; McIver A, 2003, 'A probabilistic approach to information hiding', in Morgan C; McIver A (ed.), Programming Methodology, Springer Publishing Company, New York, pp. 441 - 460, http://portal.acm.org/citation.cfm?id=766972
Morgan C, 1993, 'The refinement calculus, and literate development', in Lecture Notes in Computer Science, Springer Berlin Heidelberg, pp. 161 - 182, http://dx.doi.org/10.1007/3-540-57499-9_20
Hoare CAR; Hayes IJ; Jifeng H; Morgan CC; Roscoe AW; Sanders JW; Sorenson IH; Spivey JM; Sufrin BA, 1992, 'Laws of Programming', in Programming and Mathematical Method, Springer Berlin Heidelberg, pp. 95 - 122, http://dx.doi.org/10.1007/978-3-642-77572-7_7
Morgan C, 1990, 'Of wp and CSP', in Beauty Is Our Business, Springer New York, pp. 319 - 326, http://dx.doi.org/10.1007/978-1-4612-4476-9_37