Site Maintenance will take place from 4:00 PM on 2024-04-29 to 9:00 AM on 2024-05-01.
Please do not make any content change during this time, otherwise all the changes will be lost.

Select Publications

Book Chapters

Bird R; Gibbons J; Hinze R; Höfner P; Jeuring J; Meertens L; Möller B; Morgan C; Schrijvers T; Swierstra W; Wu N, 2021, 'Algorithmics', in Advancing Research in Information and Communication Technology, pp. 59 - 98, http://dx.doi.org/10.1007/978-3-030-81701-5_3

Gibbons J; McIver A; Morgan C; Schrijvers T, 2020, 'Quantitative Information Flow with Monads in Haskell', in Foundations of Probabilistic Programming, Cambridge University Press, pp. 391 - 448, http://dx.doi.org/10.1017/9781108770750.013

Alvim MS; Chatzikokolakis K; McIver A; Morgan C; Palamidessi C; Smith G, 2020, 'A demonic lattice of information', in Information Security and Cryptography, pp. 325 - 350, http://dx.doi.org/10.1007/978-3-319-96131-6_17

Alvim MS; Chatzikokolakis K; McIver A; Morgan C; Palamidessi C; Smith G, 2020, 'Axiomatics', in Information Security and Cryptography, pp. 183 - 204, http://dx.doi.org/10.1007/978-3-319-96131-6_11

Alvim MS; Chatzikokolakis K; McIver A; Morgan C; Palamidessi C; Smith G, 2020, 'Capacity', in Information Security and Cryptography, pp. 107 - 130, http://dx.doi.org/10.1007/978-3-319-96131-6_7

Alvim MS; Chatzikokolakis K; McIver A; Morgan C; Palamidessi C; Smith G, 2020, 'Channels', in Information Security and Cryptography, pp. 49 - 70, http://dx.doi.org/10.1007/978-3-319-96131-6_4

Alvim MS; Chatzikokolakis K; McIver A; Morgan C; Palamidessi C; Smith G, 2020, 'Composition of channels', in Information Security and Cryptography, pp. 131 - 145, http://dx.doi.org/10.1007/978-3-319-96131-6_8

Alvim MS; Chatzikokolakis K; McIver A; Morgan C; Palamidessi C; Smith G, 2020, 'Defense against side channels', in Information Security and Cryptography, pp. 389 - 397, http://dx.doi.org/10.1007/978-3-319-96131-6_20

Alvim MS; Chatzikokolakis K; McIver A; Morgan C; Palamidessi C; Smith G, 2020, 'Differential privacy', in Information Security and Cryptography, pp. 433 - 444, http://dx.doi.org/10.1007/978-3-319-96131-6_23

Alvim MS; Chatzikokolakis K; McIver A; Morgan C; Palamidessi C; Smith G, 2020, 'Hidden-Markov modeling of QIF in sequential programs', in Information Security and Cryptography, pp. 255 - 282, http://dx.doi.org/10.1007/978-3-319-96131-6_14

Alvim MS; Chatzikokolakis K; McIver A; Morgan C; Palamidessi C; Smith G, 2020, 'Introduction', in Information Security and Cryptography, pp. 3 - 13, http://dx.doi.org/10.1007/978-3-319-96131-6_1

Alvim MS; Chatzikokolakis K; McIver A; Morgan C; Palamidessi C; Smith G, 2020, 'Iteration and nontermination', in Information Security and Cryptography, pp. 307 - 323, http://dx.doi.org/10.1007/978-3-319-96131-6_16

Alvim MS; Chatzikokolakis K; McIver A; Morgan C; Palamidessi C; Smith G, 2020, 'Modeling secrets', in Information Security and Cryptography, pp. 17 - 23, http://dx.doi.org/10.1007/978-3-319-96131-6_2

Alvim MS; Chatzikokolakis K; McIver A; Morgan C; Palamidessi C; Smith G, 2020, 'Multi-party computation: The Three Judges protocol', in Information Security and Cryptography, pp. 399 - 411, http://dx.doi.org/10.1007/978-3-319-96131-6_21

Alvim MS; Chatzikokolakis K; McIver A; Morgan C; Palamidessi C; Smith G, 2020, 'On $$ \mathit {g} $$ -vulnerability', in Information Security and Cryptography, pp. 25 - 46, http://dx.doi.org/10.1007/978-3-319-96131-6_3

Alvim MS; Chatzikokolakis K; McIver A; Morgan C; Palamidessi C; Smith G, 2020, 'Posterior vulnerability and leakage', in Information Security and Cryptography, pp. 71 - 100, http://dx.doi.org/10.1007/978-3-319-96131-6_5

Alvim MS; Chatzikokolakis K; McIver A; Morgan C; Palamidessi C; Smith G, 2020, 'Program algebra for QIF', in Information Security and Cryptography, pp. 283 - 305, http://dx.doi.org/10.1007/978-3-319-96131-6_15

Alvim MS; Chatzikokolakis K; McIver A; Morgan C; Palamidessi C; Smith G, 2020, 'Quantitative information flow in sequential computer programs', in Information Security and Cryptography, pp. 225 - 253, http://dx.doi.org/10.1007/978-3-319-96131-6_13

Alvim MS; Chatzikokolakis K; McIver A; Morgan C; Palamidessi C; Smith G, 2020, 'Refinement', in Information Security and Cryptography, pp. 147 - 170, http://dx.doi.org/10.1007/978-3-319-96131-6_9

Alvim MS; Chatzikokolakis K; McIver A; Morgan C; Palamidessi C; Smith G, 2020, 'Robustness', in Information Security and Cryptography, pp. 101 - 105, http://dx.doi.org/10.1007/978-3-319-96131-6_6

Alvim MS; Chatzikokolakis K; McIver A; Morgan C; Palamidessi C; Smith G, 2020, 'The Crowds protocol', in Information Security and Cryptography, pp. 353 - 367, http://dx.doi.org/10.1007/978-3-319-96131-6_18

Alvim MS; Chatzikokolakis K; McIver A; Morgan C; Palamidessi C; Smith G, 2020, 'The Dalenius perspective', in Information Security and Cryptography, pp. 171 - 181, http://dx.doi.org/10.1007/978-3-319-96131-6_10

Alvim MS; Chatzikokolakis K; McIver A; Morgan C; Palamidessi C; Smith G, 2020, 'The geometry of hypers, gains and losses', in Information Security and Cryptography, pp. 205 - 221, http://dx.doi.org/10.1007/978-3-319-96131-6_12

Alvim MS; Chatzikokolakis K; McIver A; Morgan C; Palamidessi C; Smith G, 2020, 'Timing attacks on blinded and bucketed cryptography', in Information Security and Cryptography, pp. 369 - 388, http://dx.doi.org/10.1007/978-3-319-96131-6_19

Alvim MS; Chatzikokolakis K; McIver A; Morgan C; Palamidessi C; Smith G, 2020, 'Voting systems', in Information Security and Cryptography, pp. 413 - 431, http://dx.doi.org/10.1007/978-3-319-96131-6_22

Rabehaja T; McIver A; Morgan C; Struth G, 2019, 'Categorical Information Flow', in The Art of Modelling Computational Systems: A Journey from Logic and Concurrency to Security and Privacy, pp. 329 - 343, http://dx.doi.org/10.1007/978-3-030-31175-9_19

Morgan C, 2017, 'A demonic lattice of information', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Springer, Cham, pp. 203 - 222, http://dx.doi.org/10.1007/978-3-319-51046-0_11

McIver A; Morgan CC, 2010, 'The thousand-and-one cryptographers', in Wood K; Roscoe AW; Jones CB (ed.), Reflections on the work of C.A.R. Hoare, Springer, New York, pp. 255 - 282

Morgan CC; McIver A, 2006, 'Developing and Reasoning about probabilistic programs in pGCL', in Cavalcanti ; Sampaio ; Woodcock (ed.), Refinement Techniques in Software Engineering, Springer Publishing Company, Germany, pp. 123 - 155

Morgan CC; McIver A, 2006, 'Programming-Logic Analysis of Fault Tolerance', in Butler ; Jones ; Romanovsky ; Troubitsyna (ed.), Rigorous Development of Complex Fault-Tolerant Systems, edn. First, Springer Publishing Company, Germany, pp. 288 - 305

Hoang TS; Jin Z; Robinson K; McIver A; Morgan C, 2005, 'Development via Refinement in Probabilistic B — Foundation and Case Study', in ZB 2005: Formal Specification and Development in Z and B, Springer Berlin Heidelberg, pp. 355 - 373, http://dx.doi.org/10.1007/11415787_21

Morgan CC, 2005, 'Of probabilistic wp and CSP - and compositionality', in Abdallah ; Jones ; Roscoe ; Sanders (ed.), Proceedings of the First International Conference on Advances in Natural Computation (ICNC 2005), Part III, Lecture Notes in Computer Science 3612/2005, Springer, Berlin, Germany, pp. 220 - 241

Morgan CC; McIver A, 2003, 'A probabilistic approach to information hiding', in Morgan C; McIver A (ed.), Programming Methodology, Springer Publishing Company, New York, pp. 441 - 460, http://portal.acm.org/citation.cfm?id=766972

Morgan C, 1993, 'The refinement calculus, and literate development', in Formal Program Development, Springer Berlin Heidelberg, pp. 161 - 182, http://dx.doi.org/10.1007/3-540-57499-9_20

Hoare CAR; Hayes IJ; Jifeng H; Morgan CC; Roscoe AW; Sanders JW; Sorenson IH; Spivey JM; Sufrin BA, 1992, 'Laws of Programming', in Programming and Mathematical Method, Springer Berlin Heidelberg, pp. 95 - 122, http://dx.doi.org/10.1007/978-3-642-77572-7_7

Morgan C, 1990, 'Of wp and CSP', in Beauty Is Our Business, Springer New York, pp. 319 - 326, http://dx.doi.org/10.1007/978-1-4612-4476-9_37


Back to profile page