|
Search the dblp DataBase
Steve A. Schneider:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Wilson Ifill, Steve A. Schneider, Helen Treharne
Augmenting B with Control Annotations. [Citation Graph (0, 0)][DBLP] B, 2007, pp:34-48 [Conf]
- Steve A. Schneider, Rob Delicata
Verifying Security Protocols: An Application of CSP. [Citation Graph (0, 0)][DBLP] 25 Years Communicating Sequential Processes, 2004, pp:243-263 [Conf]
- Siraj A. Shaikh, Vicky J. Bush, Steve A. Schneider
Specifying Authentication Using Signal Events in CSP. [Citation Graph (0, 0)][DBLP] CISC, 2005, pp:63-74 [Conf]
- Rob Delicata, Steve A. Schneider
Temporal Rank Functions for Forward Secrecy. [Citation Graph (0, 0)][DBLP] CSFW, 2005, pp:126-139 [Conf]
- Peter Y. A. Ryan, Steve A. Schneider
Process Algebra and Non-Interference. [Citation Graph (0, 0)][DBLP] CSFW, 1999, pp:214-227 [Conf]
- David Chaum, Peter Y. A. Ryan, Steve A. Schneider
A Practical Voter-Verifiable Election Scheme. [Citation Graph (0, 0)][DBLP] ESORICS, 2005, pp:118-139 [Conf]
- Peter Y. A. Ryan, Steve A. Schneider
Prêt à Voter with Re-encryption Mixes. [Citation Graph (0, 0)][DBLP] ESORICS, 2006, pp:313-326 [Conf]
- Rob Delicata, Steve A. Schneider
A Formal Approach for Reasoning About a Class of Diffie-Hellman Protocols. [Citation Graph (0, 0)][DBLP] Formal Aspects in Security and Trust, 2005, pp:34-46 [Conf]
- Steve A. Schneider, Helen Treharne, Neil Evans
Chunks: Component Verification in CSP||B. [Citation Graph (0, 0)][DBLP] IFM, 2005, pp:89-108 [Conf]
- Steve A. Schneider, Thai Son Hoang, Ken Robinson, Helen Treharne
Tank Monitoring: A pAMN Case Study. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2005, v:137, n:2, pp:183-204 [Journal]
- Peter Y. A. Ryan, Steve A. Schneider
An Attack on a Recursive Authentication Protocol. A Cautionary Tale. [Citation Graph (0, 0)][DBLP] Inf. Process. Lett., 1998, v:65, n:1, pp:7-10 [Journal]
- Peter Y. A. Ryan, Steve A. Schneider
Process Algebra and Non-Interference. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2001, v:9, n:1/2, pp:75-103 [Journal]
- Neil Evans, Steve A. Schneider
Verifying security protocols with PVS: widening the rank function approach. [Citation Graph (0, 0)][DBLP] J. Log. Algebr. Program., 2005, v:64, n:2, pp:253-284 [Journal]
- Damien Karkinsky, Steve A. Schneider, Helen Treharne
Combining Mobility with State. [Citation Graph (0, 0)][DBLP] IFM, 2007, pp:373-392 [Conf]
Analysis, Improvement, and Simplification of Prêt à Voter with Paillier Encryption. [Citation Graph (, )][DBLP]
Specifying authentication using signal events in CSP. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.003secs
|