The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Steve A. Schneider: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Wilson Ifill, Steve A. Schneider, Helen Treharne
    Augmenting B with Control Annotations. [Citation Graph (0, 0)][DBLP]
    B, 2007, pp:34-48 [Conf]
  2. Steve A. Schneider, Rob Delicata
    Verifying Security Protocols: An Application of CSP. [Citation Graph (0, 0)][DBLP]
    25 Years Communicating Sequential Processes, 2004, pp:243-263 [Conf]
  3. Siraj A. Shaikh, Vicky J. Bush, Steve A. Schneider
    Specifying Authentication Using Signal Events in CSP. [Citation Graph (0, 0)][DBLP]
    CISC, 2005, pp:63-74 [Conf]
  4. Rob Delicata, Steve A. Schneider
    Temporal Rank Functions for Forward Secrecy. [Citation Graph (0, 0)][DBLP]
    CSFW, 2005, pp:126-139 [Conf]
  5. Peter Y. A. Ryan, Steve A. Schneider
    Process Algebra and Non-Interference. [Citation Graph (0, 0)][DBLP]
    CSFW, 1999, pp:214-227 [Conf]
  6. David Chaum, Peter Y. A. Ryan, Steve A. Schneider
    A Practical Voter-Verifiable Election Scheme. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2005, pp:118-139 [Conf]
  7. Peter Y. A. Ryan, Steve A. Schneider
    Prêt à Voter with Re-encryption Mixes. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2006, pp:313-326 [Conf]
  8. Rob Delicata, Steve A. Schneider
    A Formal Approach for Reasoning About a Class of Diffie-Hellman Protocols. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2005, pp:34-46 [Conf]
  9. Steve A. Schneider, Helen Treharne, Neil Evans
    Chunks: Component Verification in CSP||B. [Citation Graph (0, 0)][DBLP]
    IFM, 2005, pp:89-108 [Conf]
  10. Steve A. Schneider, Thai Son Hoang, Ken Robinson, Helen Treharne
    Tank Monitoring: A pAMN Case Study. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2005, v:137, n:2, pp:183-204 [Journal]
  11. Peter Y. A. Ryan, Steve A. Schneider
    An Attack on a Recursive Authentication Protocol. A Cautionary Tale. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1998, v:65, n:1, pp:7-10 [Journal]
  12. Peter Y. A. Ryan, Steve A. Schneider
    Process Algebra and Non-Interference. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2001, v:9, n:1/2, pp:75-103 [Journal]
  13. Neil Evans, Steve A. Schneider
    Verifying security protocols with PVS: widening the rank function approach. [Citation Graph (0, 0)][DBLP]
    J. Log. Algebr. Program., 2005, v:64, n:2, pp:253-284 [Journal]
  14. Damien Karkinsky, Steve A. Schneider, Helen Treharne
    Combining Mobility with State. [Citation Graph (0, 0)][DBLP]
    IFM, 2007, pp:373-392 [Conf]

  15. Analysis, Improvement, and Simplification of Prêt à Voter with Paillier Encryption. [Citation Graph (, )][DBLP]


  16. Specifying authentication using signal events in CSP. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002