The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Steve Schneider: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Steve Schneider, Jim Davies, D. M. Jackson, George M. Reed, Joy N. Reed, A. W. Roscoe
    Timed CSP: Theory and Practice. [Citation Graph (1, 0)][DBLP]
    REX Workshop, 1991, pp:640-675 [Conf]
  2. Steve Schneider
    Rigorous Specification of Real-Time Systems. [Citation Graph (0, 0)][DBLP]
    AMAST, 1993, pp:59-74 [Conf]
  3. Helen Treharne, J. Draper, Steve Schneider
    Test Case Preparation Using a Prototype. [Citation Graph (0, 0)][DBLP]
    B, 1998, pp:293-311 [Conf]
  4. Jim Davies, Steve Schneider
    Using CSP to Verify a Timed Protocol over a Fair Medium. [Citation Graph (0, 0)][DBLP]
    CONCUR, 1992, pp:355-369 [Conf]
  5. Jeremy Bryans, Jim Davies, Steve Schneider
    Towards a denotational semantics for ET-LOTOS. [Citation Graph (0, 0)][DBLP]
    CONCUR, 1995, pp:269-283 [Conf]
  6. Steve Schneider
    Process Algebra and Security. [Citation Graph (0, 0)][DBLP]
    CONCUR, 2001, pp:37-38 [Conf]
  7. James Heather, Gavin Lowe, Steve Schneider
    How to Prevent Type Flaw Attacks on Security Protocols. [Citation Graph (0, 0)][DBLP]
    CSFW, 2000, pp:255-268 [Conf]
  8. James Heather, Steve Schneider
    Towards Automatic Verification of Authentication Protocols on an Unbounded Network. [Citation Graph (0, 0)][DBLP]
    CSFW, 2000, pp:132-143 [Conf]
  9. Steve Schneider
    Verifying authentication protocols with CSP. [Citation Graph (0, 0)][DBLP]
    CSFW, 1997, pp:3-17 [Conf]
  10. Steve Schneider
    Formal Analysis of a Non-Repudiation Protocol. [Citation Graph (0, 0)][DBLP]
    CSFW, 1998, pp:54-65 [Conf]
  11. Neil Evans, Steve Schneider
    Analysing Time Dependent Security Properties in CSP Using PVS. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2000, pp:222-237 [Conf]
  12. James Heather, Steve Schneider
    Equal To The Task? [Citation Graph (0, 0)][DBLP]
    ESORICS, 2002, pp:162-177 [Conf]
  13. Steve Schneider, Abraham Sidiropoulos
    CSP and Anonymity. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1996, pp:198-218 [Conf]
  14. Steve Schneider
    Abstraction and Testing. [Citation Graph (0, 0)][DBLP]
    World Congress on Formal Methods, 1999, pp:738-757 [Conf]
  15. Steve Schneider
    Verifying Authentication Protocol Implementations. [Citation Graph (0, 0)][DBLP]
    FMOODS, 2002, pp:5-24 [Conf]
  16. Jim Davies, Jeremy Bryans, Steve Schneider
    Real-time LOTOS and Timed Observations. [Citation Graph (0, 0)][DBLP]
    FORTE, 1995, pp:383-397 [Conf]
  17. Jim Davies, Dave Jackson, Steve Schneider
    Broadcast Communication for Real-time Processes. [Citation Graph (0, 0)][DBLP]
    FTRTFT, 1992, pp:149-169 [Conf]
  18. Steve Schneider, Helen Treharne
    Verifying Controlled Components. [Citation Graph (0, 0)][DBLP]
    IFM, 2004, pp:87-107 [Conf]
  19. Helen Treharne, Steve Schneider
    Using a Process Algebra to Control B Operations. [Citation Graph (0, 0)][DBLP]
    IFM, 1999, pp:437-456 [Conf]
  20. Jim Davies, Steve Schneider
    Factorizing Proofs in Timed CSP. [Citation Graph (0, 0)][DBLP]
    Mathematical Foundations of Programming Semantics, 1989, pp:129-159 [Conf]
  21. Steve Schneider
    Timewise Refinement for Communicating Processes. [Citation Graph (0, 0)][DBLP]
    MFPS, 1993, pp:177-214 [Conf]
  22. James Heather, Steve Schneider
    To infinity and beyond or, avoiding the infinite in security protocol analysis. [Citation Graph (0, 0)][DBLP]
    SAC, 2006, pp:346-353 [Conf]
  23. Steve Schneider
    Security Properties and CSP. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1996, pp:174-187 [Conf]
  24. Carl B. Adekunle, Steve Schneider
    Detecting Feature Interactions in the Terrestrial Trunked Radio (TETRA) Network Using Promela and Xspin. [Citation Graph (0, 0)][DBLP]
    SPIN, 1999, pp:136-151 [Conf]
  25. Bruno Dutertre, Steve Schneider
    Using a PVS Embedding of CSP to Verify Authentication Protocols. [Citation Graph (0, 0)][DBLP]
    TPHOLs, 1997, pp:121-136 [Conf]
  26. Steve Schneider, Helen Treharne
    Communicating B Machines. [Citation Graph (0, 0)][DBLP]
    ZB, 2002, pp:416-435 [Conf]
  27. Helen Treharne, Steve Schneider
    How to Drive a B Machine. [Citation Graph (0, 0)][DBLP]
    ZB, 2000, pp:188-208 [Conf]
  28. Helen Treharne, Steve Schneider, Marchia Bramble
    Composing Specifications Using Communication. [Citation Graph (0, 0)][DBLP]
    ZB, 2003, pp:58-78 [Conf]
  29. Steve Schneider
    May Testing, Non-interference, and Compositionality. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2000, v:40, n:, pp:- [Journal]
  30. Steve Schneider, Peter Ryan
    Preface. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2000, v:32, n:, pp:- [Journal]
  31. Joël Ouaknine, Steve Schneider
    Timed CSP: A Retrospective. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2006, v:162, n:, pp:273-276 [Journal]
  32. Jim Davies, Steve Schneider
    Recursion Induction for Real-Time Processes. [Citation Graph (0, 0)][DBLP]
    Formal Asp. Comput., 1994, v:5, n:6, pp:530-553 [Journal]
  33. Steve Schneider
    Abstraction and Testing in CSP. [Citation Graph (0, 0)][DBLP]
    Formal Asp. Comput., 2000, v:12, n:3, pp:165-181 [Journal]
  34. Steve Schneider, Helen Treharne
    CSP theorems for communicating B machines. [Citation Graph (0, 0)][DBLP]
    Formal Asp. Comput., 2005, v:17, n:4, pp:390-422 [Journal]
  35. Steve Schneider, Thai Son Hoang, Ken Robinson, Helen Treharne
    Tank monitoring: a pAMN case study. [Citation Graph (0, 0)][DBLP]
    Formal Asp. Comput., 2006, v:18, n:3, pp:308-328 [Journal]
  36. Wing Lok Yeung, Steve Schneider
    Design and Verification of Distributed Recovery Blocks with CSP. [Citation Graph (0, 0)][DBLP]
    Formal Methods in System Design, 2003, v:22, n:3, pp:225-248 [Journal]
  37. Steve Schneider
    An Operational Semantics for Timed CSP [Citation Graph (0, 0)][DBLP]
    Inf. Comput., 1995, v:116, n:2, pp:193-213 [Journal]
  38. James Heather, Gavin Lowe, Steve Schneider
    How to Prevent Type Flaw Attacks on Security Protocols. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2003, v:11, n:2, pp:217-244 [Journal]
  39. James Heather, Steve Schneider
    A decision procedure for the existence of a rank function. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2005, v:13, n:2, pp:317-344 [Journal]
  40. Steve Schneider
    Timewise Refinement for Communicating Processes. [Citation Graph (0, 0)][DBLP]
    Sci. Comput. Program., 1997, v:28, n:1, pp:43-90 [Journal]
  41. Jim Davies, Steve Schneider
    A Brief History of Timed CSP. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 1995, v:138, n:2, pp:243-271 [Journal]
  42. Michael W. Mislove, A. W. Roscoe, Steve Schneider
    Fixed Points Without Completeness. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 1995, v:138, n:2, pp:273-314 [Journal]
  43. Steve Schneider
    Verifying Authentication Protocols in CSP. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1998, v:24, n:9, pp:741-758 [Journal]
  44. Steve Schneider, Helen Treharne, Ana Cavalcanti, Jim Woodcock
    A Layered Behavioural Model of Platelets. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2006, pp:98-106 [Conf]
  45. Alistair A. McEwan, S. Schneider
    A verified development of hardware using CSP/spl par/B. [Citation Graph (0, 0)][DBLP]
    MEMOCODE, 2006, pp:81- [Conf]
  46. Theodosis Dimitrakos, Fabio Martinelli, Peter Y. A. Ryan, Steve Schneider
    Guest Editors' Preface. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2007, v:6, n:2-3, pp:65-66 [Journal]
  47. Rob Delicata, Steve Schneider
    An algebraic approach to the verification of a class of Diffie-Hellman protocols. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2007, v:6, n:2-3, pp:183-196 [Journal]

  48. Object Modelling in the SystemB Industrial Project. [Citation Graph (, )][DBLP]


  49. A Step towards Merging xUML and CSP || {\| \ }B. [Citation Graph (, )][DBLP]


  50. Automatic Generation of CSP || B Skeletons from xUML Models. [Citation Graph (, )][DBLP]


  51. Changing System Interfaces Consistently: A New Refinement Strategy for CSP||B. [Citation Graph (, )][DBLP]


  52. Threat Analysis of a Practical Voting Scheme with Receipts. [Citation Graph (, )][DBLP]


  53. Experiments in Translating CSP || B to Handel-C. [Citation Graph (, )][DBLP]


  54. Modeling and Analysis of the AMBA Bus Using CSP and B. [Citation Graph (, )][DBLP]


  55. A Step Towards Refining and Translating B Control Annotations to Handel-C. [Citation Graph (, )][DBLP]


Search in 0.020secs, Finished in 0.023secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002