Steve Schneider
Steve Schneider
Director of Surrey Centre for Cyber Security; Professor of Computing, University of Surrey
Bestätigte E-Mail-Adresse bei surrey.ac.uk - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Concurrent and Real-time systems
S Schneider
The CSP Approach, 2000
8032000
The modelling and analysis of security protocols: the CSP approach
P Ryan, S Schneider, M Goldsmith, G Lowe, B Roscoe
Addison-Wesley Professional, 2001
7442001
A practical voter-verifiable election scheme
D Chaum, PYA Ryan, S Schneider
European Symposium on Research in Computer Security, 118-139, 2005
4772005
Verifying authentication protocols in CSP
S Schneider
IEEE Transactions on software engineering 24 (9), 741-758, 1998
4211998
The B-method: An introduction
S Schneider
University of Surrey, 2001
3482001
Security properties and CSP
S Schneider
Proceedings 1996 IEEE Symposium on Security and Privacy, 174-187, 1996
3431996
Real-Time Systems: specification, verification, and analysis
A Burns, A Welling, K Ramamritham, J Hooman, S Schneider, Z Liu, ...
prentice Hall, 1996
3061996
Process algebra and non-interference
PYA Ryan, SA Schneider
Journal of Computer Security 9 (1-2), 75-103, 2001
3032001
How to prevent type flaw attacks on security protocols
J Heather, G Lowe, S Schneider
Journal of computer Security 11 (2), 217-244, 2003
2972003
CSP and anonymity
S Schneider, A Sidiropoulos
European Symposium on Research in Computer Security, 198-218, 1996
2651996
An operational semantics for timed CSP
S Schneider
Information and computation 116 (2), 193-213, 1995
2601995
PrÊt À Voter:a Voter-Verifiable Voting System
PYA Ryan, D Bismark, J Heather, S Schneider, Z Xia
IEEE transactions on information forensics and security 4 (4), 662-673, 2009
240*2009
A brief history of Timed CSP
J Davies, S Schneider
Theoretical Computer Science 138 (2), 243-271, 1995
2051995
Formal analysis of a non-repudiation protocol
S Schneider
Proceedings. 11th IEEE Computer Security Foundations Workshop (Cat. No …, 1998
1871998
Prêt à voter with re-encryption mixes
PYA Ryan, SA Schneider
European Symposium on Research in Computer Security, 313-326, 2006
1782006
An attack on a recursive authentication protocol A cautionary tale
PYA Ryan, SA Schneider
Information Processing Letters 65 (1), 7-10, 1998
1461998
Timed CSP: Theory and practice
S Schneider, J Davies, DM Jackson, GM Reed, JN Reed, AW Roscoe
Proceedings of the Real-Time: Theory in Practice, REX Workshop, 640-675, 1991
1231991
CSP theorems for communicating B machines
S Schneider, H Treharne
Formal Aspects of Computing 17 (4), 390-422, 2005
1182005
Using a process algebra to control B operations
H Treharne, S Schneider
IFM’99, 437-456, 1999
1171999
An Introduction to Timer CSP
J Davies, S Schneider
Oxford University Computing Laboratory, Programming Research Group, 1989
1091989
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20