default search action
Steve A. Schneider
Person information
- affiliation: University of Surrey
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j47]Mohammed Alsadi, Matthew Casey, Constantin Catalin Dragan, François Dupressoir, Luke Riley, Muntadher Sallal, Steve Schneider, Helen Treharne, Joe Wadsworth, Phil Wright:
Towards End-to-End Verifiable Online Voting: Adding Verifiability to Established Voting Systems. IEEE Trans. Dependable Secur. Comput. 21(4): 3357-3374 (2024) - [c94]Marie-Laure Zollinger, Peter B. Rønne, Steve Schneider, Peter Y. A. Ryan, Wojciech Jamroga:
Intelligo Ut Confido: Understanding, Trust and User Experience in Verifiable Receipt-Free E-Voting. E-Vote-ID 2024: 158-174 - [i14]Marie-Laure Zollinger, Peter B. Rønne, Steve Schneider, Peter Y. A. Ryan, Wojtek Jamroga:
Intelligo ut Confido: Understanding, Trust and User Experience in Verifiable Receipt-Free E-Voting (long version). CoRR abs/2407.13240 (2024) - 2023
- [c93]Nidhi Desai, Damiano Di Francesco Maesa, Nishanth Sastry, Steve Schneider, Laura Ricci:
Preserving Privacy of Vulnerable Users across Heterogeneous Sensitive Sensor Data Streams using Smart Contracts. BlockSys 2023: 2-8 - [c92]Ksenia Budykho, Ioana Boureanu, Stephan Wesemeyer, Daniel Romero, Matt Lewis, Yogaratnam Rahulan, Fortunat Rajaona, Steve Schneider:
Fine-Grained Trackability in Protocol Executions. NDSS 2023 - [e15]Ioana Boureanu, Steve Schneider, Bradley Reaves, Nils Ole Tippenhauer:
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom, 29 May 2023 - 1 June 2023. ACM 2023, ISBN 978-1-4503-9859-6 [contents] - [i13]Wojciech Jamroga, Peter Y. A. Ryan, Steve Schneider, Carsten Schürmann, Philip B. Stark:
A Declaration of Software Independence. CoRR abs/2311.03372 (2023) - 2022
- [j46]Tomas Kulik, Brijesh Dongol, Peter Gorm Larsen, Hugo Daniel Macedo, Steve Schneider, Peter W. V. Tran-Jørgensen, Jim Woodcock:
A Survey of Practical Formal Methods for Security. Formal Aspects Comput. 34(1): 1-39 (2022) - 2021
- [j45]Jinguang Han, Liqun Chen, Steve Schneider, Helen Treharne, Stephan Wesemeyer:
Privacy-Preserving Electronic Ticket Scheme with Attribute-Based Credentials. IEEE Trans. Dependable Secur. Comput. 18(4): 1836-1849 (2021) - [c91]Wojciech Jamroga, Peter Y. A. Ryan, Steve Schneider, Carsten Schürmann, Philip B. Stark:
A Declaration of Software Independence. Protocols, Strands, and Logic 2021: 198-217 - [i12]Tomas Kulik, Brijesh Dongol, Peter Gorm Larsen, Hugo Daniel Macedo, Steve Schneider, Peter Würtz Vinther Tran-Jørgensen, Jim Woodcock:
A Survey of Practical Formal Methods for Security. CoRR abs/2109.01362 (2021) - 2020
- [j44]David M. Williams, Salaheddin Darwish, Steve Schneider, David R. Michael:
Legislation-driven development of a Gift Aid system using Event-B. Formal Aspects Comput. 32(2-3): 251-273 (2020) - [j43]Jinguang Han, Liqun Chen, Steve A. Schneider, Helen Treharne, Stephan Wesemeyer, Nick Wilson:
Anonymous Single Sign-On With Proxy Re-Verification. IEEE Trans. Inf. Forensics Secur. 15: 223-236 (2020) - [c90]Thomas Gittings, Steve Schneider, John P. Collomosse:
Vax-a-Net: Training-Time Defence Against Adversarial Patch Attacks. ACCV (4) 2020: 235-251 - [c89]Muntadher Sallal, Steve Schneider, Matthew Casey, François Dupressoir, Helen Treharne, Constantin Catalin Dragan, Luke Riley, Phil Wright:
Augmenting an Internet Voting System with Selene Verifiability using Permissioned Distributed Ledger. ICDCS 2020: 1167-1168 - [e14]Liqun Chen, Ninghui Li, Kaitai Liang, Steve A. Schneider:
Computer Security - ESORICS 2020 - 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14-18, 2020, Proceedings, Part I. Lecture Notes in Computer Science 12308, Springer 2020, ISBN 978-3-030-58950-9 [contents] - [e13]Liqun Chen, Ninghui Li, Kaitai Liang, Steve A. Schneider:
Computer Security - ESORICS 2020 - 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14-18, 2020, Proceedings, Part II. Lecture Notes in Computer Science 12309, Springer 2020, ISBN 978-3-030-59012-3 [contents] - [i11]Thomas Gittings, Steve A. Schneider, John P. Collomosse:
Vax-a-Net: Training-time Defence Against Adversarial Patch Attacks. CoRR abs/2009.08194 (2020)
2010 – 2019
- 2019
- [c88]Thomas Gittings, Steve A. Schneider, John P. Collomosse:
Robust Synthesis of Adversarial Visual Examples Using a Deep Image Prior. BMVC 2019: 283 - [c87]Jorden Whitefield, Liqun Chen, Ralf Sasse, Steve A. Schneider, Helen Treharne, Stephan Wesemeyer:
A Symbolic Analysis of ECC-Based Direct Anonymous Attestation. EuroS&P 2019: 127-141 - [e12]Kazue Sako, Steve A. Schneider, Peter Y. A. Ryan:
Computer Security - ESORICS 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part I. Lecture Notes in Computer Science 11735, Springer 2019, ISBN 978-3-030-29958-3 [contents] - [e11]Kazue Sako, Steve A. Schneider, Peter Y. A. Ryan:
Computer Security - ESORICS 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part II. Lecture Notes in Computer Science 11736, Springer 2019, ISBN 978-3-030-29961-3 [contents] - [i10]Thomas Gittings, Steve A. Schneider, John P. Collomosse:
Robust Synthesis of Adversarial Visual Examples Using a Deep Image Prior. CoRR abs/1907.01996 (2019) - [i9]Muntadher Sallal, Steve A. Schneider, Matthew Casey, Constantin Catalin Dragan, François Dupressoir, Luke Riley, Helen Treharne, Joe Wadsworth, Phil Wright:
VMV: Augmenting an Internet Voting System with Selene Verifiability. CoRR abs/1912.00288 (2019) - 2018
- [c86]Jinguang Han, Liqun Chen, Steve A. Schneider, Helen Treharne, Stephan Wesemeyer:
Anonymous Single-Sign-On for n Designated Services with Traceability. ESORICS (1) 2018: 470-490 - [e10]Liqun Chen, Mark Manulis, Steve A. Schneider:
Information Security - 21st International Conference, ISC 2018, Guildford, UK, September 9-12, 2018, Proceedings. Lecture Notes in Computer Science 11060, Springer 2018, ISBN 978-3-319-99135-1 [contents] - [i8]Jinguang Han, Liqun Chen, Steve A. Schneider, Helen Treharne, Stephan Wesemeyer:
Anonymous Single-Sign-On for n designated services with traceability. CoRR abs/1804.07201 (2018) - [i7]Jinguang Han, Liqun Chen, Steve A. Schneider, Helen Treharne, Stephan Wesemeyer, Nick Wilson:
Anonymous Single Sign-on with Proxy Re-Verification. CoRR abs/1811.07642 (2018) - 2017
- [j42]Josh Benaloh, Peter Y. A. Ryan, Steve A. Schneider, Vanessa Teague:
A Vote of Confidence? IEEE Secur. Priv. 15(3): 12-13 (2017) - [c85]Jorden Whitefield, Liqun Chen, Frank Kargl, Andrew Paverd, Steve A. Schneider, Helen Treharne, Stephan Wesemeyer:
Formal Analysis of V2X Revocation Protocols. STM 2017: 147-163 - [c84]Jorden Whitefield, Liqun Chen, Thanassis Giannetsos, Steve A. Schneider, Helen Treharne:
Privacy-enhanced capabilities for VANETs using direct anonymous attestation. VNC 2017: 123-130 - [e9]Nadia Polikarpova, Steve A. Schneider:
Integrated Formal Methods - 13th International Conference, IFM 2017, Turin, Italy, September 20-22, 2017, Proceedings. Lecture Notes in Computer Science 10510, Springer 2017, ISBN 978-3-319-66844-4 [contents] - [i6]Jorden Whitefield, Liqun Chen, Frank Kargl, Andrew Paverd, Steve A. Schneider, Helen Treharne, Stephan Wesemeyer:
Formal Analysis of V2X Revocation Protocols. CoRR abs/1704.07216 (2017) - [i5]Jinguang Han, Liqun Chen, Steve A. Schneider, Helen Treharne:
PPETS-FGP: Privacy-Preserving Electronic Ticket Scheme with Fine-Grained Pricing. CoRR abs/1706.03016 (2017) - 2016
- [j41]Thai Son Hoang, Steve A. Schneider, Helen Treharne, David M. Williams:
Foundations for using linear temporal logic in Event-B refinement. Formal Aspects Comput. 28(6): 909-935 (2016) - [j40]Craig Burton, Chris Culnane, Steve A. Schneider:
vVote: Verifiable Electronic Voting in Practice. IEEE Secur. Priv. 14(4): 64-73 (2016) - [j39]Murat Moran, James Heather, Steve A. Schneider:
Automated anonymity verification of the ThreeBallot and VAV voting systems. Softw. Syst. Model. 15(4): 1049-1062 (2016) - [p2]Steve A. Schneider, Helen Treharne, David M. Williams:
Event-B and Linear Temporal Logic. From Action Systems to Distributed Systems 2016: 113-123 - [e8]Mark Manulis, Ahmad-Reza Sadeghi, Steve A. Schneider:
Applied Cryptography and Network Security - 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings. Lecture Notes in Computer Science 9696, Springer 2016, ISBN 978-3-319-39554-8 [contents] - 2015
- [j38]Peter Y. A. Ryan, Steve A. Schneider, Vanessa Teague:
End-to-End Verifiability in Voting Systems, from Theory to Practice. IEEE Secur. Priv. 13(3): 59-62 (2015) - [j37]Abdullah Ali Alshehri, Steve A. Schneider:
A formal framework for security analysis of NFC mobile coupon protocols. J. Comput. Secur. 23(6): 685-707 (2015) - [j36]Steve A. Schneider, Helen Treharne:
Special issue on Automated Verification of Critical Systems (AVoCS 2013). Sci. Comput. Program. 111: 213 (2015) - [j35]Chris Culnane, Peter Y. A. Ryan, Steve A. Schneider, Vanessa Teague:
vVote: A Verifiable Voting System. ACM Trans. Inf. Syst. Secur. 18(1): 3:1-3:30 (2015) - [i4]Craig Burton, Chris Culnane, Steve A. Schneider:
Secure and Verifiable Electronic Voting in Practice: the use of vVote in the Victorian State Election. CoRR abs/1504.07098 (2015) - 2014
- [j34]Eerke A. Boiten, Steve A. Schneider:
Editorial. Formal Aspects Comput. 26(1): 1-2 (2014) - [j33]James Heather, Steve A. Schneider, Vanessa Teague:
Cryptographic protocols with everyday objects. Formal Aspects Comput. 26(1): 37-62 (2014) - [j32]Murat Moran, James Heather, Steve A. Schneider:
Verifying anonymity in voting systems using CSP. Formal Aspects Comput. 26(1): 63-98 (2014) - [j31]Steve A. Schneider, Helen Treharne, Heike Wehrheim:
The behavioural semantics of Event-B refinement. Formal Aspects Comput. 26(2): 251-280 (2014) - [j30]Steve A. Schneider, Vanessa Teague, Chris Culnane, James Heather:
Special Section on Vote-ID 2013. J. Inf. Secur. Appl. 19(2): 103-104 (2014) - [j29]Phillip James, Faron Moller, Hoang Nga Nguyen, Markus Roggenbach, Steve A. Schneider, Helen Treharne:
On modelling and verifying railway interlockings: Tracking train lengths. Sci. Comput. Program. 96: 315-336 (2014) - [j28]Phillip James, Faron Moller, Nguyen Hoang Nga, Markus Roggenbach, Steve A. Schneider, Helen Treharne:
Techniques for modelling and verifying railway interlockings. Int. J. Softw. Tools Technol. Transf. 16(6): 685-711 (2014) - [c83]Chris Culnane, Steve A. Schneider:
A Peered Bulletin Board for Robust Use in Verifiable Voting Systems. CSF 2014: 169-183 - [c82]Steve A. Schneider, Helen Treharne, Heike Wehrheim, David M. Williams:
Managing LTL Properties in Event-B Refinement. IFM 2014: 221-237 - [c81]Sriramkrishnan Srinivasan, Chris Culnane, James Heather, Steve A. Schneider, Zhe Xia:
Countering Ballot Stuffing and Incorporating Eligibility Verifiability in Helios. NSS 2014: 335-348 - [c80]Efstathios Stathakidis, Steve A. Schneider, James Heather:
Robustness Modelling and Verification of a Mix Net Protocol. SSR 2014: 131-150 - [c79]Chris Culnane, James Heather, Rui Joaquim, Peter Y. A. Ryan, Steve A. Schneider, Vanessa Teague:
Faster Print on Demand for Prêt à Voter. EVT/WOTE 2014 - [i3]Chris Culnane, Steve A. Schneider:
A Peered Bulletin Board for Robust Use in Verifiable Voting Systems. CoRR abs/1401.4151 (2014) - [i2]Chris Culnane, Peter Y. A. Ryan, Steve A. Schneider, Vanessa Teague:
vVote: a Verifiable Voting System (DRAFT). CoRR abs/1404.6822 (2014) - [i1]Steve A. Schneider, Helen Treharne, Heike Wehrheim, David M. Williams:
Managing LTL properties in Event-B refinement. CoRR abs/1406.6622 (2014) - 2013
- [j27]Islam Abdelhalim, Steve A. Schneider, Helen Treharne:
An integrated framework for checking the behaviour of fUML models using CSP. Int. J. Softw. Tools Technol. Transf. 15(4): 375-396 (2013) - [c78]James Heather, Chris Culnane, Steve A. Schneider, Sriramkrishnan Srinivasan, Zhe Xia:
Solving the Discrete Logarithm Problem for Packing Candidate Preferences. CD-ARES Workshops 2013: 209-221 - [c77]Abdullah Ali Alshehri, Steve A. Schneider:
Formal Security Analysis and Improvement of a Hash-Based NFC M-Coupon Protocol. CARDIS 2013: 152-167 - [c76]Steve A. Schneider:
Fuzzy-Systeme zur Unterstützung von Entscheidungen in land- und forstwirtschaftlichen Logistik-Prozessen. GIL Jahrestagung 2013: 307-310 - [c75]Abdullah Ali Alshehri, Steve A. Schneider:
Formally defining NFC M-coupon requirements, with a case study. ICITST 2013: 52-58 - [c74]Murat Moran, James Heather, Steve A. Schneider:
Automated Anonymity Verification of the ThreeBallot Voting System. IFM 2013: 94-108 - [c73]Phillip James, Matthew Trumble, Helen Treharne, Markus Roggenbach, Steve A. Schneider:
OnTrack: An Open Tooling Environment for Railway Verification. NASA Formal Methods 2013: 435-440 - [c72]Evangelos Aktoudianakis, Jason Crampton, Steve A. Schneider, Helen Treharne, Adrian Waller:
Policy templates for relationship-based access control. PST 2013: 221-228 - [c71]Phillip James, Faron Moller, Hoang Nga Nguyen, Markus Roggenbach, Steve A. Schneider, Helen Treharne, Matthew Trumble, David M. Williams:
Verification of Scheme Plans Using CSP $$||$$ | | B. SEFM Workshops 2013: 189-204 - [c70]Morgan Llewellyn, Steve A. Schneider, Zhe Xia, Chris Culnane, James Heather, Peter Y. A. Ryan, Sriramkrishnan Srinivasan:
Testing Voters' Understanding of a Security Mechanism Used in Verifiable Voting. EVT/WOTE 2013 - [e7]James Heather, Steve A. Schneider, Vanessa Teague:
E-Voting and Identify - 4th International Conference, VoteID 2013, Guildford, UK, July 17-19, 2013. Proceedings. Lecture Notes in Computer Science 7985, Springer 2013, ISBN 978-3-642-39184-2 [contents] - 2012
- [j26]Markus Roggenbach, Faron Moller, Steve A. Schneider, Helen Treharne, Hoang Nga Nguyen:
Railway modelling in CSP||B: the double junction case study. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 53 (2012) - [c69]Craig Burton, Chris Culnane, James Heather, Thea Peacock, Peter Y. A. Ryan, Steve A. Schneider, Sriramkrishnan Srinivasan, Vanessa Teague, Roland Wen, Zhe Xia:
A Supervised Verifiable Voting Protocol for the Victorian Electoral Commission. Electronic Voting 2012: 81-94 - [c68]James Heather, Steve A. Schneider:
A Formal Framework for Modelling Coercion Resistance and Receipt Freeness. FM 2012: 217-231 - [c67]Faron Moller, Hoang Nga Nguyen, Markus Roggenbach, Steve A. Schneider, Helen Treharne:
Defining and Model Checking Abstractions of Complex Railway Models Using CSP||B. Haifa Verification Conference 2012: 193-208 - [c66]Islam Abdelhalim, Steve A. Schneider, Helen Treharne:
An Optimization Approach for Effective Formalized fUML Model Checking. SEFM 2012: 248-262 - [c65]Craig Burton, Chris Culnane, James Heather, Thea Peacock, Peter Y. A. Ryan, Steve A. Schneider, Vanessa Teague, Roland Wen, Zhe Xia, Sriramkrishnan Srinivasan:
Using Prêt à Voter in Victoria State Elections. EVT/WOTE 2012 - 2011
- [j25]Steve A. Schneider, Helen Treharne:
Changing system interfaces consistently: A new refinement strategy for CSP||B. Sci. Comput. Program. 76(10): 837-860 (2011) - [c64]Islam Abdelhalim, Steve A. Schneider, Helen Treharne:
Towards a Practical Approach to Check UML/fUML Models Consistency Using CSP. ICFEM 2011: 33-48 - [c63]Steve A. Schneider, Morgan Llewellyn, Chris Culnane, James Heather, Sriramkrishnan Srinivasan, Zhe Xia:
Focus group views on Prêt à Voter 1.0. REVOTE 2011: 56-65 - [c62]Chris Culnane, David Bismark, James Heather, Steve A. Schneider, Sriramkrishnan Srinivasan, Zhe Xia:
Authentication Codes. EVT/WOTE 2011 - [c61]Denise Demirel, Maria Henning, Peter Y. A. Ryan, Steve A. Schneider, Melanie Volkamer:
Feasibility Analysis of Prêt à Voter for German Federal Elections. VoteID 2011: 158-173 - [c60]Steve A. Schneider, Sriramkrishnan Srinivasan, Chris Culnane, James Heather, Zhe Xia:
Prêt á Voter with Write-Ins. VoteID 2011: 174-189 - [c59]Steve A. Schneider, Helen Treharne, Heike Wehrheim:
A CSP Account of Event-B Refinement. Refine@FM 2011: 139-154 - [c58]Steve A. Schneider, Helen Treharne, Heike Wehrheim:
Bounded Retransmission in Event-B∥CSP: a Case Study. B@FM 2011: 69-80 - [p1]Steve A. Schneider:
Security Analysis using Rank Functions in CSP. Formal Models and Techniques for Analyzing Security Protocols 2011: 258-276 - 2010
- [j24]Alistair A. McEwan, Steve A. Schneider:
Modelling and analysis of the AMBA bus using CSP and B. Concurr. Comput. Pract. Exp. 22(8): 949-964 (2010) - [j23]Wilson Ifill, Steve A. Schneider:
A step towards refining and translating B control annotations to Handel-C. Concurr. Comput. Pract. Exp. 22(8): 1023-1048 (2010) - [c57]Islam Abdelhalim, James Sharp, Steve A. Schneider, Helen Treharne:
Formal Verification of Tokeneer Behaviours Modelled in fUML Using CSP. ICFEM 2010: 371-387 - [c56]Steve A. Schneider, Helen Treharne, Heike Wehrheim:
A CSP Approach to Control in Event-B. IFM 2010: 260-274 - [c55]Zhe Xia, Chris Culnane, James Heather, Hugo Jonker, Peter Y. A. Ryan, Steve A. Schneider, Sriramkrishnan Srinivasan:
Versatile Prêt à Voter: Handling Multiple Election Methods with a Unified Interface. INDOCRYPT 2010: 98-114
2000 – 2009
- 2009
- [j22]Siraj A. Shaikh, Vicky J. Bush, Steve A. Schneider:
Specifying authentication using signal events in CSP. Comput. Secur. 28(5): 310-324 (2009) - [j21]Beeta Vajar, Steve A. Schneider, Helen Treharne:
Mobile CSP||B. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 23 (2009) - [j20]Peter Y. A. Ryan, David Bismark, James Heather, Steve A. Schneider, Zhe Xia:
Prêt à voter: a voter-verifiable voting system. IEEE Trans. Inf. Forensics Secur. 4(4): 662-673 (2009) - [c54]Helen Treharne, Steve A. Schneider, Neil Grant, Neil Evans, Wilson Ifill:
A Step towards Merging xUML and CSP || {\| \ }B. Rigorous Methods for Software Construction and Analysis 2009: 130-146 - [c53]Steve A. Schneider, Helen Treharne:
Changing System Interfaces Consistently: A New Refinement Strategy for CSP||B. IFM 2009: 103-117 - [c52]David Bismark, James Heather, Roger M. A. Peel, Steve A. Schneider, Zhe Xia, Peter Y. A. Ryan:
Experiences Gained from the first Prêt à Voter Implementation. REVOTE 2009: 19-28 - 2008
- [c51]Helen Treharne, Edward Turner, Steve A. Schneider, Neil Evans:
Object Modelling in the SystemB Industrial Project. ABZ 2008: 359 - [c50]Edward Turner, Helen Treharne, Steve A. Schneider, Neil Evans:
Automatic Generation of CSP || B Skeletons from xUML Models. ICTAC 2008: 364-379 - [c49]Zhe Xia, Steve A. Schneider, James Heather, Jacques Traoré:
Analysis, Improvement, and Simplification of Prêt à Voter with Paillier Encryption. EVT 2008 - [c48]Steve A. Schneider, Helen Treharne, Alistair A. McEwan, Wilson Ifill:
Experiments in Translating CSP || B to Handel-C. CPA 2008: 115-133 - 2007
- [j19]Theodosis Dimitrakos, Fabio Martinelli, Peter Y. A. Ryan, Steve A. Schneider:
Guest Editors' Preface. Int. J. Inf. Sec. 6(2-3): 65-66 (2007) - [j18]Rob Delicata, Steve A. Schneider:
An algebraic approach to the verification of a class of Diffie-Hellman protocols. Int. J. Inf. Sec. 6(2-3): 183-196 (2007) - [c47]Wilson Ifill, Steve A. Schneider, Helen Treharne:
Augmenting B with Control Annotations. B 2007: 34-48 - [c46]Damien Karkinsky, Steve A. Schneider, Helen Treharne:
Combining Mobility with State. IFM 2007: 373-392 - [c45]Sébastien Foulle, Steve A. Schneider, Jacques Traoré, Zhe Xia:
Threat Analysis of a Practical Voting Scheme with Receipts. VOTE-ID 2007: 156-165 - [c44]Alistair A. McEwan, Steve A. Schneider:
Modeling and Analysis of the AMBA Bus Using CSP and B. CPA 2007: 379-398 - [c43]Wilson Ifill, Steve A. Schneider:
A Step Towards Refining and Translating B Control Annotations to Handel-C. CPA 2007: 399-424 - [e6]Theodosis Dimitrakos, Fabio Martinelli, Peter Y. A. Ryan, Steve A. Schneider:
Formal Aspects in Security and Trust, Fourth International Workshop, FAST 2006, Hamilton, Ontario, Canada, August 26-27, 2006, Revised Selected Papers. Lecture Notes in Computer Science 4691, Springer 2007, ISBN 978-3-540-75226-4 [contents] - [e5]Alistair A. McEwan, Steve A. Schneider, Wilson Ifill, Peter H. Welch:
The 30th Communicating Process Architectures Conference, CPA 2007, organised under the auspices of WoTUG and the University of Surrey, Guildford, Surrey, UK, 8-11 July 2007. Concurrent Systems Engineering Series 65, IOS Press 2007, ISBN 978-1-58603-767-3 [contents] - 2006
- [j17]Steve A. Schneider, Thai Son Hoang, Ken Robinson, Helen Treharne:
Tank monitoring: a pAMN case study. Formal Aspects Comput. 18(3): 308-328 (2006) - [c42]Peter Y. A. Ryan, Steve A. Schneider:
Prêt à Voter with Re-encryption Mixes. ESORICS 2006: 313-326 - [c41]Steve A. Schneider, Helen Treharne, Ana Cavalcanti, Jim Woodcock:
A Layered Behavioural Model of Platelets. ICECCS 2006: 98-106 - [c40]Alistair A. McEwan, Steve A. Schneider:
A verified development of hardware using CSP∥B. MEMOCODE 2006: 81 - [c39]James Heather, Steve A. Schneider:
To infinity and beyond or, avoiding the infinite in security protocol analysis. SAC 2006: 346-353 - [e4]Theodosis Dimitrakos, Fabio Martinelli, Peter Y. A. Ryan, Steve A. Schneider:
Formal Aspects in Security and Trust, Third International Workshop, FAST 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected Papers. Lecture Notes in Computer Science 3866, Springer 2006, ISBN 3-540-32628-6 [contents] - 2005
- [j16]Steve A. Schneider, Helen Treharne:
CSP theorems for communicating B machines. Formal Aspects Comput. 17(4): 390-422 (2005) - [j15]James Heather, Steve A. Schneider:
A decision procedure for the existence of a rank function. J. Comput. Secur. 13(2): 317-344 (2005) - [j14]Neil Evans, Steve A. Schneider:
Verifying security protocols with PVS: widening the rank function approach. J. Log. Algebraic Methods Program. 64(2): 253-284 (2005) - [j13]Nicholas W. Jankowski, Kirsten Foot, Randy Kluver, Steve Schneider:
The Web and the 2004 EP election: Comparing political actor Web sites in 11 EU Member States. Inf. Polity 10(3-4): 165-176 (2005) - [c38]Siraj A. Shaikh, Vicky J. Bush, Steve A. Schneider:
Specifying Authentication Using Signal Events in CSP. CISC 2005: 63-74 - [c37]Rob Delicata, Steve A. Schneider:
Temporal Rank Functions for Forward Secrecy. CSFW 2005: 126-139 - [c36]David Chaum, Peter Y. A. Ryan, Steve A. Schneider:
A Practical Voter-Verifiable Election Scheme. ESORICS 2005: 118-139 - [c35]Rob Delicata, Steve A. Schneider:
A Formal Approach for Reasoning About a Class of Diffie-Hellman Protocols. Formal Aspects in Security and Trust 2005: 34-46 - [c34]Steve A. Schneider, Helen Treharne, Neil Evans:
Chunks: Component Verification in CSP||B. IFM 2005: 89-108 - [c33]Steve A. Schneider, Thai Son Hoang, Ken Robinson, Helen Treharne:
Tank Monitoring: A pAMN Case Study. REFINE 2005: 183-204 - [c32]Joël Ouaknine, Steve A. Schneider:
Timed CSP: A Retrospective. APC 25 2005: 273-276 - [e3]Helen Treharne, Steve King, Martin C. Henson, Steve A. Schneider:
ZB 2005: Formal Specification and Development in Z and B, 4th International Conference of B and Z Users, Guildford, UK, April 13-15, 2005, Proceedings. Lecture Notes in Computer Science 3455, Springer 2005, ISBN 3-540-25559-1 [contents] - 2004
- [c31]Steve A. Schneider, Rob Delicata:
Verifying Security Protocols: An Application of CSP. 25 Years Communicating Sequential Processes 2004: 243-263 - [c30]Steve A. Schneider, Helen Treharne:
Verifying Controlled Components. IFM 2004: 87-107 - 2003
- [j12]Wing Lok Yeung, Steve A. Schneider:
Design and Verification of Distributed Recovery Blocks with CSP. Formal Methods Syst. Des. 22(3): 225-248 (2003) - [j11]James Heather, Gavin Lowe, Steve A. Schneider:
How to Prevent Type Flaw Attacks on Security Protocols. J. Comput. Secur. 11(2): 217-244 (2003) - [j10]Li Gong, Joshua D. Guttman, Peter Y. A. Ryan, Steve A. Schneider:
Guest editorial overview. IEEE J. Sel. Areas Commun. 21(1): 1-4 (2003) - [c29]Helen Treharne, Steve A. Schneider, Marchia Bramble:
Composing Specifications Using Communication. ZB 2003: 58-78 - [e2]Ali E. Abdallah, Peter Y. A. Ryan, Steve A. Schneider:
Formal Aspects of Security, First International Conference, FASec 2002, London, UK, December 16-18, 2002, Revised Papers. Lecture Notes in Computer Science 2629, Springer 2003, ISBN 3-540-20693-0 [contents] - 2002
- [c28]James Heather, Steve A. Schneider:
Equal To The Task? ESORICS 2002: 162-177 - [c27]Steve A. Schneider:
Verifying Authentication Protocol Implementations. FMOODS 2002: 5-24 - [c26]Steve A. Schneider, Helen Treharne:
Communicating B Machines. ZB 2002: 416-435 - 2001
- [b2]Steve A. Schneider:
The B-method - an introduction. The cornerstones of computing series, Macmillan Publ. 2001, ISBN 978-0-333-79284-1, pp. I-XIII, 1-370 - [b1]Peter Y. A. Ryan, Steve A. Schneider:
Modelling and analysis of security protocols. Addison-Wesley-Longman 2001, ISBN 978-0-201-67471-2, pp. I-XIV, 1-300 - [j9]Peter Y. A. Ryan, Steve A. Schneider:
Process Algebra and Non-Interference. J. Comput. Secur. 9(1/2): 75-103 (2001) - [c25]Steve A. Schneider:
Process Algebra and Security. CONCUR 2001: 37-38 - 2000
- [j8]Steve A. Schneider:
Abstraction and Testing in CSP. Formal Aspects Comput. 12(3): 165-181 (2000) - [c24]James Heather, Steve A. Schneider:
Towards Automatic Verification of Authentication Protocols on an Unbounded Network. CSFW 2000: 132-143 - [c23]James Heather, Gavin Lowe, Steve A. Schneider:
How to Prevent Type Flaw Attacks on Security Protocols. CSFW 2000: 255-268 - [c22]Neil Evans, Steve A. Schneider:
Analysing Time Dependent Security Properties in CSP Using PVS. ESORICS 2000: 222-237 - [c21]Helen Treharne, Steve A. Schneider:
How to Drive a B Machine. ZB 2000: 188-208 - [c20]Steve A. Schneider:
May Testing, Non-interference, and Compositionality. MFCSIT 2000: 361-391 - [e1]Steve A. Schneider, Peter Ryan:
Workshop on Secure Architectures and Information Flow 1999, Royal Holloway, London, UK, December 1-3, 1999. Electronic Notes in Theoretical Computer Science 32, Elsevier 2000 [contents]
1990 – 1999
- 1999
- [c19]Peter Y. A. Ryan, Steve A. Schneider:
Process Algebra and Non-Interference. CSFW 1999: 214-227 - [c18]Steve A. Schneider:
Abstraction and Testing. World Congress on Formal Methods 1999: 738-757 - [c17]Helen Treharne, Steve A. Schneider:
Using a Process Algebra to Control B Operations. IFM 1999: 437-456 - [c16]Carl B. Adekunle, Steve A. Schneider:
Detecting Feature Interactions in the Terrestrial Trunked Radio (TETRA) Network Using Promela and Xspin. SPIN 1999: 136-151 - [c15]Steve A. Schneider, Peter Ryan:
Preface. Workshop on Secure Architectures and Information Flow 1999: 113-114 - 1998
- [j7]Peter Y. A. Ryan, Steve A. Schneider:
An Attack on a Recursive Authentication Protocol. A Cautionary Tale. Inf. Process. Lett. 65(1): 7-10 (1998) - [j6]Steve A. Schneider:
Verifying Authentication Protocols in CSP. IEEE Trans. Software Eng. 24(9): 741-758 (1998) - [c14]Helen Treharne, J. Draper, Steve A. Schneider:
Test Case Preparation Using a Prototype. B 1998: 293-311 - [c13]Steve A. Schneider:
Formal Analysis of a Non-Repudiation Protocol. CSFW 1998: 54-65 - 1997
- [j5]Steve A. Schneider:
Timewise Refinement for Communicating Processes. Sci. Comput. Program. 28(1): 43-90 (1997) - [c12]Steve A. Schneider:
Verifying authentication protocols with CSP. CSFW 1997: 3-17 - [c11]Bruno Dutertre, Steve A. Schneider:
Using a PVS Embedding of CSP to Verify Authentication Protocols. TPHOLs 1997: 121-136 - 1996
- [c10]Steve A. Schneider, Abraham Sidiropoulos:
CSP and Anonymity. ESORICS 1996: 198-218 - [c9]Steve A. Schneider:
Security Properties and CSP. S&P 1996: 174-187 - 1995
- [j4]Steve A. Schneider:
An Operational Semantics for Timed CSP. Inf. Comput. 116(2): 193-213 (1995) - [j3]Jim Davies, Steve A. Schneider:
A Brief History of Timed CSP. Theor. Comput. Sci. 138(2): 243-271 (1995) - [j2]Michael W. Mislove, A. W. Roscoe, Steve A. Schneider:
Fixed Points Without Completeness. Theor. Comput. Sci. 138(2): 273-314 (1995) - [c8]Jeremy W. Bryans, Jim Davies, Steve A. Schneider:
Towards a denotational semantics for ET-LOTOS. CONCUR 1995: 269-283 - [c7]Jim Davies, Jeremy W. Bryans, Steve A. Schneider:
Real-time LOTOS and Timed Observations. FORTE 1995: 383-397 - 1993
- [j1]Jim Davies, Steve A. Schneider:
Recursion Induction for Real-Time Processes. Formal Aspects Comput. 5(6): 530-553 (1993) - [c6]Steve A. Schneider:
Rigorous Specification of Real-Time Systems. AMAST 1993: 59-74 - [c5]Steve A. Schneider:
Timewise Refinement for Communicating Processes. MFPS 1993: 177-214 - 1992
- [c4]Jim Davies, Steve A. Schneider:
Using CSP to Verify a Timed Protocol over a Fair Medium. CONCUR 1992: 355-369 - [c3]Jim Davies, Dave Jackson, Steve A. Schneider:
Broadcast Communication for Real-time Processes. FTRTFT 1992: 149-169 - 1991
- [c2]Steve A. Schneider, Jim Davies, D. M. Jackson, George M. Reed, Joy N. Reed, A. W. Roscoe:
Timed CSP: Theory and Practice. REX Workshop 1991: 640-675
1980 – 1989
- 1989
- [c1]Jim Davies, Steve A. Schneider:
Factorizing Proofs in Timed CSP. Mathematical Foundations of Programming Semantics 1989: 129-159
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-05 22:04 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint