The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

James Heather: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. James Heather
    Strand Spaces and Rank Functions: More than Distant Cousins. [Citation Graph (0, 0)][DBLP]
    CSFW, 2002, pp:104-0 [Conf]
  2. James Heather, Gavin Lowe, Steve Schneider
    How to Prevent Type Flaw Attacks on Security Protocols. [Citation Graph (0, 0)][DBLP]
    CSFW, 2000, pp:255-268 [Conf]
  3. James Heather, Steve Schneider
    Towards Automatic Verification of Authentication Protocols on an Unbounded Network. [Citation Graph (0, 0)][DBLP]
    CSFW, 2000, pp:132-143 [Conf]
  4. James Heather, Steve Schneider
    Equal To The Task? [Citation Graph (0, 0)][DBLP]
    ESORICS, 2002, pp:162-177 [Conf]
  5. Nick Antonopoulos, James Heather, Roger M. A. Peel
    Programmable Agents for Generic Distributed Authorisation. [Citation Graph (0, 0)][DBLP]
    International Conference on Internet Computing, 2005, pp:174-180 [Conf]
  6. James Heather, Jonathan Y. Clark
    Family Secrets. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2004, pp:99-114 [Conf]
  7. Kun Wei, James Heather
    Towards Verification of Timed Non-repudiation Protocols. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2005, pp:244-257 [Conf]
  8. Kun Wei, James Heather
    Embedding the Stable Failures Model of CSP in PVS. [Citation Graph (0, 0)][DBLP]
    IFM, 2005, pp:246-265 [Conf]
  9. James Heather, Steve Schneider
    To infinity and beyond or, avoiding the infinite in security protocol analysis. [Citation Graph (0, 0)][DBLP]
    SAC, 2006, pp:346-353 [Conf]
  10. James Heather, Gavin Lowe, Steve Schneider
    How to Prevent Type Flaw Attacks on Security Protocols. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2003, v:11, n:2, pp:217-244 [Journal]
  11. James Heather, Steve Schneider
    A decision procedure for the existence of a rank function. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2005, v:13, n:2, pp:317-344 [Journal]
  12. Kun Wei, James Heather
    A Theorem-Proving Approach to Verification of Fair Non-repudiation Protocols. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2006, pp:202-219 [Conf]

  13. Implementing STV securely in Pret a Voter. [Citation Graph (, )][DBLP]


  14. Pretty Good Democracy for More Expressive Voting Schemes. [Citation Graph (, )][DBLP]


  15. The Append-Only Web Bulletin Board. [Citation Graph (, )][DBLP]


  16. Where Next for Formal Methods? [Citation Graph (, )][DBLP]


  17. Where Next for Formal Methods? [Citation Graph (, )][DBLP]


  18. Analysis, Improvement, and Simplification of Prêt à Voter with Paillier Encryption. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002