| On flow-sensitive security types S Hunt, D Sands ACM SIGPLAN Notices 41 (1), 79-90, 2006 | 331 | 2006 |
| Termination-insensitive noninterference leaks more than just a bit A Askarov, S Hunt, A Sabelfeld, D Sands European symposium on research in computer security, 333-348, 2008 | 272 | 2008 |
| A static analysis for quantifying information flow in a simple imperative language D Clark, S Hunt, P Malacaria Journal of Computer Security 15 (3), 321-371, 2007 | 267 | 2007 |
| Quantitative analysis of the leakage of confidential data D Clark, S Hunt, P Malacaria Electronic Notes in Theoretical Computer Science 59 (3), 238-251, 2002 | 245 | 2002 |
| Quantitative information flow, relations and polymorphic types D Clark, S Hunt, P Malacaria Journal of Logic and Computation 15 (2), 181-199, 2005 | 192 | 2005 |
| Quantified interference for a while language D Clark, S Hunt, P Malacaria Electronic Notes in Theoretical Computer Science 112, 149-166, 2005 | 116 | 2005 |
| Non-interference for deterministic interactive programs D Clark, S Hunt Formal Aspects in Security and Trust, 50-66, 2009 | 76 | 2009 |
| Binding time analysis: A new PERspective S Hunt, D Sands Proceedings of the 1991 ACM SIGPLAN symposium on Partial evaluation and …, 1991 | 75 | 1991 |
| Information flow for Algol-like languages D Clark, C Hankin, S Hunt Computer Languages, Systems & Structures 28 (1), 3-28, 2002 | 69 | 2002 |
| Abstract interpretation of functional languages: from theory to practice S Hunt University of London, 1991 | 66 | 1991 |
| Just forget it–the semantics and enforcement of information erasure S Hunt, D Sands European Symposium on Programming, 239-253, 2008 | 49 | 2008 |
| PERs generalise projections for strictness analysis S Hunt Functional Programming, Glasgow 1990: Proceedings of the 1990 Glasgow …, 1991 | 46 | 1991 |
| Fixed points and frontiers: a new perspective S Hunt, C Hankin Journal of Functional Programming 1 (1), 91-120, 1991 | 46 | 1991 |
| Very static enforcement of dynamic policies B van Delft, S Hunt, D Sands International Conference on Principles of Security and Trust, 32-52, 2015 | 36 | 2015 |
| The PER model of abstract non-interference S Hunt, I Mastroeni International Static Analysis Symposium, 171-185, 2005 | 35 | 2005 |
| Frontiers and open sets in abstract interpretation S Hunt Proceedings of the fourth international conference on Functional programming …, 1989 | 28 | 1989 |
| Quantified interference: Information theory and information flow D Clark, S Hunt, P Malacaria Workshop on Issues in the Theory of Security (WITS’04), 2004 | 27 | 2004 |
| From exponential to polynomial-time security typing via principal types S Hunt, D Sands European Symposium on Programming, 297-316, 2011 | 23 | 2011 |
| Approximate fixed points in abstract interpretation C Hankin, S Hunt European Symposium on Programming, 219-232, 1992 | 21 | 1992 |
| Debonding in overmolded integrated circuit packages S Hunt, LA Carlsson Journal of Electronic Packaging 115 (3), 249-255, 1993 | 17 | 1993 |