|
Search the dblp DataBase
Steve Schneider:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Steve Schneider, Jim Davies, D. M. Jackson, George M. Reed, Joy N. Reed, A. W. Roscoe
Timed CSP: Theory and Practice. [Citation Graph (1, 0)][DBLP] REX Workshop, 1991, pp:640-675 [Conf]
- Steve Schneider
Rigorous Specification of Real-Time Systems. [Citation Graph (0, 0)][DBLP] AMAST, 1993, pp:59-74 [Conf]
- Helen Treharne, J. Draper, Steve Schneider
Test Case Preparation Using a Prototype. [Citation Graph (0, 0)][DBLP] B, 1998, pp:293-311 [Conf]
- Jim Davies, Steve Schneider
Using CSP to Verify a Timed Protocol over a Fair Medium. [Citation Graph (0, 0)][DBLP] CONCUR, 1992, pp:355-369 [Conf]
- Jeremy Bryans, Jim Davies, Steve Schneider
Towards a denotational semantics for ET-LOTOS. [Citation Graph (0, 0)][DBLP] CONCUR, 1995, pp:269-283 [Conf]
- Steve Schneider
Process Algebra and Security. [Citation Graph (0, 0)][DBLP] CONCUR, 2001, pp:37-38 [Conf]
- James Heather, Gavin Lowe, Steve Schneider
How to Prevent Type Flaw Attacks on Security Protocols. [Citation Graph (0, 0)][DBLP] CSFW, 2000, pp:255-268 [Conf]
- James Heather, Steve Schneider
Towards Automatic Verification of Authentication Protocols on an Unbounded Network. [Citation Graph (0, 0)][DBLP] CSFW, 2000, pp:132-143 [Conf]
- Steve Schneider
Verifying authentication protocols with CSP. [Citation Graph (0, 0)][DBLP] CSFW, 1997, pp:3-17 [Conf]
- Steve Schneider
Formal Analysis of a Non-Repudiation Protocol. [Citation Graph (0, 0)][DBLP] CSFW, 1998, pp:54-65 [Conf]
- Neil Evans, Steve Schneider
Analysing Time Dependent Security Properties in CSP Using PVS. [Citation Graph (0, 0)][DBLP] ESORICS, 2000, pp:222-237 [Conf]
- James Heather, Steve Schneider
Equal To The Task? [Citation Graph (0, 0)][DBLP] ESORICS, 2002, pp:162-177 [Conf]
- Steve Schneider, Abraham Sidiropoulos
CSP and Anonymity. [Citation Graph (0, 0)][DBLP] ESORICS, 1996, pp:198-218 [Conf]
- Steve Schneider
Abstraction and Testing. [Citation Graph (0, 0)][DBLP] World Congress on Formal Methods, 1999, pp:738-757 [Conf]
- Steve Schneider
Verifying Authentication Protocol Implementations. [Citation Graph (0, 0)][DBLP] FMOODS, 2002, pp:5-24 [Conf]
- Jim Davies, Jeremy Bryans, Steve Schneider
Real-time LOTOS and Timed Observations. [Citation Graph (0, 0)][DBLP] FORTE, 1995, pp:383-397 [Conf]
- Jim Davies, Dave Jackson, Steve Schneider
Broadcast Communication for Real-time Processes. [Citation Graph (0, 0)][DBLP] FTRTFT, 1992, pp:149-169 [Conf]
- Steve Schneider, Helen Treharne
Verifying Controlled Components. [Citation Graph (0, 0)][DBLP] IFM, 2004, pp:87-107 [Conf]
- Helen Treharne, Steve Schneider
Using a Process Algebra to Control B Operations. [Citation Graph (0, 0)][DBLP] IFM, 1999, pp:437-456 [Conf]
- Jim Davies, Steve Schneider
Factorizing Proofs in Timed CSP. [Citation Graph (0, 0)][DBLP] Mathematical Foundations of Programming Semantics, 1989, pp:129-159 [Conf]
- Steve Schneider
Timewise Refinement for Communicating Processes. [Citation Graph (0, 0)][DBLP] MFPS, 1993, pp:177-214 [Conf]
- James Heather, Steve Schneider
To infinity and beyond or, avoiding the infinite in security protocol analysis. [Citation Graph (0, 0)][DBLP] SAC, 2006, pp:346-353 [Conf]
- Steve Schneider
Security Properties and CSP. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1996, pp:174-187 [Conf]
- Carl B. Adekunle, Steve Schneider
Detecting Feature Interactions in the Terrestrial Trunked Radio (TETRA) Network Using Promela and Xspin. [Citation Graph (0, 0)][DBLP] SPIN, 1999, pp:136-151 [Conf]
- Bruno Dutertre, Steve Schneider
Using a PVS Embedding of CSP to Verify Authentication Protocols. [Citation Graph (0, 0)][DBLP] TPHOLs, 1997, pp:121-136 [Conf]
- Steve Schneider, Helen Treharne
Communicating B Machines. [Citation Graph (0, 0)][DBLP] ZB, 2002, pp:416-435 [Conf]
- Helen Treharne, Steve Schneider
How to Drive a B Machine. [Citation Graph (0, 0)][DBLP] ZB, 2000, pp:188-208 [Conf]
- Helen Treharne, Steve Schneider, Marchia Bramble
Composing Specifications Using Communication. [Citation Graph (0, 0)][DBLP] ZB, 2003, pp:58-78 [Conf]
- Steve Schneider
May Testing, Non-interference, and Compositionality. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2000, v:40, n:, pp:- [Journal]
- Steve Schneider, Peter Ryan
Preface. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2000, v:32, n:, pp:- [Journal]
- Joël Ouaknine, Steve Schneider
Timed CSP: A Retrospective. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2006, v:162, n:, pp:273-276 [Journal]
- Jim Davies, Steve Schneider
Recursion Induction for Real-Time Processes. [Citation Graph (0, 0)][DBLP] Formal Asp. Comput., 1994, v:5, n:6, pp:530-553 [Journal]
- Steve Schneider
Abstraction and Testing in CSP. [Citation Graph (0, 0)][DBLP] Formal Asp. Comput., 2000, v:12, n:3, pp:165-181 [Journal]
- Steve Schneider, Helen Treharne
CSP theorems for communicating B machines. [Citation Graph (0, 0)][DBLP] Formal Asp. Comput., 2005, v:17, n:4, pp:390-422 [Journal]
- Steve Schneider, Thai Son Hoang, Ken Robinson, Helen Treharne
Tank monitoring: a pAMN case study. [Citation Graph (0, 0)][DBLP] Formal Asp. Comput., 2006, v:18, n:3, pp:308-328 [Journal]
- Wing Lok Yeung, Steve Schneider
Design and Verification of Distributed Recovery Blocks with CSP. [Citation Graph (0, 0)][DBLP] Formal Methods in System Design, 2003, v:22, n:3, pp:225-248 [Journal]
- Steve Schneider
An Operational Semantics for Timed CSP [Citation Graph (0, 0)][DBLP] Inf. Comput., 1995, v:116, n:2, pp:193-213 [Journal]
- James Heather, Gavin Lowe, Steve Schneider
How to Prevent Type Flaw Attacks on Security Protocols. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2003, v:11, n:2, pp:217-244 [Journal]
- James Heather, Steve Schneider
A decision procedure for the existence of a rank function. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2005, v:13, n:2, pp:317-344 [Journal]
- Steve Schneider
Timewise Refinement for Communicating Processes. [Citation Graph (0, 0)][DBLP] Sci. Comput. Program., 1997, v:28, n:1, pp:43-90 [Journal]
- Jim Davies, Steve Schneider
A Brief History of Timed CSP. [Citation Graph (0, 0)][DBLP] Theor. Comput. Sci., 1995, v:138, n:2, pp:243-271 [Journal]
- Michael W. Mislove, A. W. Roscoe, Steve Schneider
Fixed Points Without Completeness. [Citation Graph (0, 0)][DBLP] Theor. Comput. Sci., 1995, v:138, n:2, pp:273-314 [Journal]
- Steve Schneider
Verifying Authentication Protocols in CSP. [Citation Graph (0, 0)][DBLP] IEEE Trans. Software Eng., 1998, v:24, n:9, pp:741-758 [Journal]
- Steve Schneider, Helen Treharne, Ana Cavalcanti, Jim Woodcock
A Layered Behavioural Model of Platelets. [Citation Graph (0, 0)][DBLP] ICECCS, 2006, pp:98-106 [Conf]
- Alistair A. McEwan, S. Schneider
A verified development of hardware using CSP/spl par/B. [Citation Graph (0, 0)][DBLP] MEMOCODE, 2006, pp:81- [Conf]
- Theodosis Dimitrakos, Fabio Martinelli, Peter Y. A. Ryan, Steve Schneider
Guest Editors' Preface. [Citation Graph (0, 0)][DBLP] Int. J. Inf. Sec., 2007, v:6, n:2-3, pp:65-66 [Journal]
- Rob Delicata, Steve Schneider
An algebraic approach to the verification of a class of Diffie-Hellman protocols. [Citation Graph (0, 0)][DBLP] Int. J. Inf. Sec., 2007, v:6, n:2-3, pp:183-196 [Journal]
Object Modelling in the SystemB Industrial Project. [Citation Graph (, )][DBLP]
A Step towards Merging xUML and CSP || {\| \ }B. [Citation Graph (, )][DBLP]
Automatic Generation of CSP || B Skeletons from xUML Models. [Citation Graph (, )][DBLP]
Changing System Interfaces Consistently: A New Refinement Strategy for CSP||B. [Citation Graph (, )][DBLP]
Threat Analysis of a Practical Voting Scheme with Receipts. [Citation Graph (, )][DBLP]
Experiments in Translating CSP || B to Handel-C. [Citation Graph (, )][DBLP]
Modeling and Analysis of the AMBA Bus Using CSP and B. [Citation Graph (, )][DBLP]
A Step Towards Refining and Translating B Control Annotations to Handel-C. [Citation Graph (, )][DBLP]
Search in 0.005secs, Finished in 0.009secs
|