Folgen
Steve Schneider
Steve Schneider
Director of Surrey Centre for Cyber Security; Professor of Computing, University of Surrey
Bestätigte E-Mail-Adresse bei surrey.ac.uk - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Concurrent and real-time systems: the CSP approach
S Schneider
John Wiley & Sons, 1999
8391999
The modelling and analysis of security protocols: the CSP approach
P Ryan, S Schneider, M Goldsmith, G Lowe, B Roscoe
Addison-Wesley Professional, 2001
7962001
Springer International Publishing: Cham
L Chen, N Li, K Liang, S Schneider
Switzerland 11765, 337-345, 2019
6272019
A practical voter-verifiable election scheme
D Chaum, PYA Ryan, S Schneider
Computer Security–ESORICS 2005: 10th European Symposium on Research in …, 2005
5102005
Verifying authentication protocols in CSP
S Schneider
IEEE Transactions on software engineering 24 (9), 741-758, 1998
4281998
The B-method: An introduction
S Schneider
Palgrave, 2001
3772001
Security properties and CSP
S Schneider
Proceedings 1996 IEEE Symposium on Security and Privacy, 174-187, 1996
3531996
Process algebra and non-interference
PYA Ryan, SA Schneider
Journal of Computer Security 9 (1-2), 75-103, 2001
3212001
Real-Time Systems: specification, verification, and analysis
A Burns, A Welling, K Ramamritham, J Hooman, S Schneider, Z Liu, ...
prentice Hall, 1996
3191996
How to prevent type flaw attacks on security protocols
J Heather, G Lowe, S Schneider
Journal of computer Security 11 (2), 217-244, 2003
3132003
PrÊt À Voter:a Voter-Verifiable Voting System
PYA Ryan, D Bismark, J Heather, S Schneider, Z Xia
IEEE transactions on information forensics and security 4 (4), 662-673, 2009
289*2009
CSP and anonymity
S Schneider, A Sidiropoulos
Computer Security—ESORICS 96: 4th European Symposium on Research in …, 1996
2821996
An operational semantics for timed CSP
S Schneider
Information and computation 116 (2), 193-213, 1995
2741995
A brief history of Timed CSP
J Davies, S Schneider
Theoretical Computer Science 138 (2), 243-271, 1995
2151995
Formal analysis of a non-repudiation protocol
S Schneider
Proceedings. 11th IEEE Computer Security Foundations Workshop (Cat. No …, 1998
1981998
Prêt à voter with re-encryption mixes
PYA Ryan, SA Schneider
Computer Security–ESORICS 2006: 11th European Symposium on Research in …, 2006
1942006
An attack on a recursive authentication protocol A cautionary tale
PYA Ryan, SA Schneider
Information Processing Letters 65 (1), 7-10, 1998
1461998
CSP theorems for communicating B machines
S Schneider, H Treharne
Formal Aspects of Computing 17, 390-422, 2005
1302005
Timed CSP: Theory and practice
S Schneider, J Davies, DM Jackson, GM Reed, JN Reed, AW Roscoe
Proceedings of the Real-Time: Theory in Practice, REX Workshop, 640-675, 1991
1291991
Using a process algebra to control B operations
H Treharne, S Schneider
IFM’99: Proceedings of the 1st International Conference on Integrated Formal …, 1999
1181999
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20