Search the dblp DataBase
James Heather :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
James Heather Strand Spaces and Rank Functions: More than Distant Cousins. [Citation Graph (0, 0)][DBLP ] CSFW, 2002, pp:104-0 [Conf ] James Heather , Gavin Lowe , Steve Schneider How to Prevent Type Flaw Attacks on Security Protocols. [Citation Graph (0, 0)][DBLP ] CSFW, 2000, pp:255-268 [Conf ] James Heather , Steve Schneider Towards Automatic Verification of Authentication Protocols on an Unbounded Network. [Citation Graph (0, 0)][DBLP ] CSFW, 2000, pp:132-143 [Conf ] James Heather , Steve Schneider Equal To The Task? [Citation Graph (0, 0)][DBLP ] ESORICS, 2002, pp:162-177 [Conf ] Nick Antonopoulos , James Heather , Roger M. A. Peel Programmable Agents for Generic Distributed Authorisation. [Citation Graph (0, 0)][DBLP ] International Conference on Internet Computing, 2005, pp:174-180 [Conf ] James Heather , Jonathan Y. Clark Family Secrets. [Citation Graph (0, 0)][DBLP ] Formal Aspects in Security and Trust, 2004, pp:99-114 [Conf ] Kun Wei , James Heather Towards Verification of Timed Non-repudiation Protocols. [Citation Graph (0, 0)][DBLP ] Formal Aspects in Security and Trust, 2005, pp:244-257 [Conf ] Kun Wei , James Heather Embedding the Stable Failures Model of CSP in PVS. [Citation Graph (0, 0)][DBLP ] IFM, 2005, pp:246-265 [Conf ] James Heather , Steve Schneider To infinity and beyond or, avoiding the infinite in security protocol analysis. [Citation Graph (0, 0)][DBLP ] SAC, 2006, pp:346-353 [Conf ] James Heather , Gavin Lowe , Steve Schneider How to Prevent Type Flaw Attacks on Security Protocols. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2003, v:11, n:2, pp:217-244 [Journal ] James Heather , Steve Schneider A decision procedure for the existence of a rank function. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2005, v:13, n:2, pp:317-344 [Journal ] Kun Wei , James Heather A Theorem-Proving Approach to Verification of Fair Non-repudiation Protocols. [Citation Graph (0, 0)][DBLP ] Formal Aspects in Security and Trust, 2006, pp:202-219 [Conf ] Implementing STV securely in Pret a Voter. [Citation Graph (, )][DBLP ] Pretty Good Democracy for More Expressive Voting Schemes. [Citation Graph (, )][DBLP ] The Append-Only Web Bulletin Board. [Citation Graph (, )][DBLP ] Where Next for Formal Methods? [Citation Graph (, )][DBLP ] Where Next for Formal Methods? [Citation Graph (, )][DBLP ] Analysis, Improvement, and Simplification of Prêt à Voter with Paillier Encryption. [Citation Graph (, )][DBLP ] Search in 0.002secs, Finished in 0.003secs