University of Surrey

Test tubes in the lab Research in the ATI Dance Research

Items where Author is "Heather, J"

Up a level
Export as [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | No Grouping
Number of items: 64.

Article

Oakes, T, Heather, JM, Best, K, Byng-Maddick, R, Husovsky, C, Ismail, M, Joshi, K, Maxwell, G, Noursadeghi, M, Riddell, Natalie, Ruehl, T, Turner, CT, Uddin, I and Chain, B (2017) Quantitative Characterization of the t Cell Receptor Repertoire of Naïve and Memory subsets Using an Integrated experimental and Computational Pipeline Which Is Robust, economical, and Versatile Frontiers in Immunology, 8, 1267.

Moran, M, Heather, J and Schneider, S (2014) Verifying anonymity in voting systems using CSP FORMAL ASPECTS OF COMPUTING, 26 (1). pp. 63-98.

Schneider, S, Teague, V, Culnane, C and Heather, J (2014) Special Section on Vote-ID 2013. J. Inf. Sec. Appl., 19, 2. pp. 103-104.

Llewellyn, M, Schneider, SA, Xia, Z, Culnane, C, Heather, J, Ryan, PYA and Srinivasan, S (2013) Testing Voters’ Understanding of a Security Mechanism Used in Verifiable Voting The USENIX Journal of Election Technology and Systems, 1, 1. pp. 53-61.

Moran, Murat, Heather, James and Schneider, Steve (2013) Automated Anonymity Verification of the ThreeBallot Voting System Integrated Formal Methods (iFM) Proceedings, 7940. pp. 94-108.

Heather, J, Schneider, S and Teague, V (2013) Cryptographic protocols with everyday objects Formal Aspects of Computing. pp. 1-26.

Moran, Murat, Heather, James and Schneider, Steve (2012) Verifying anonymity in voting systems using CSP Formal Aspects of Computing.

Heather, JA (2010) Turnitoff: identifying and fixing a hole in current plagiarism detection software Journal of Assessment and Evaluation in Higher Education, 35 (6). pp. 647-660.

Ryan, PYA, Bismark, D, Heather, JA, Schneider, SA and Xia, Z (2009) The Prêt à Voter Verifiable Election System IEEE Transactions on Information Forensics and Security, 4 (4). pp. 662-673.

Ryan, P.Y.A., Bismark, D., Heather, J., Schneider, S. and Xia, Z. (2009) Prêt à Voter: a voter-verifiable voting system Information Forensics and Security, IEEE Transactions on, 4 (4). pp. 662-673.

Heather, J and Wei, K (2009) Where next for formal methods? Lecture Notes in Computer Science, 5087. pp. 52-58.

Heather, JA (2007) Implementing STV Securely in Prêt à Voter Proceedings of the 20th IEEE Computer Security Foundations Symposium. pp. 157-169.

Lundin, D, Treharne, H, Ryan, P, Schneider, S, Heather, J and Xia, Z (2007) Tear and Destroy: Chain voting and destruction problems shared by Pret a Voter and Punchscan and a solution using Visual Encryption Fundamenta Informaticae (2001). pp. 1001-1019.

Wei, K and Heather, J (2007) A theorem-proving approach to verification of fair non-repudiation protocols Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 4691 L. pp. 202-219.

Antonopoulos, N, Heather, J and Peel, R (2005) Programmable agents for generic distributed authorisation Proceedings of the 2005 International Conference on Internet Computing, ICOMP'05. pp. 174-180.

Wei, K and Heather, J (2005) Embedding the stable failures model of CSP in PVS Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3771 L. pp. 246-265.

Heather, J. and Clark, J. (2005) Family Secrets Formal Aspects in Security and Trust. pp. 99-114.

Heather, Jamie P and Smith, Moira I (2005) Multimodal Image Registration with Applications to Image Fusion 7th IEEE International Conference on Information Fusion (FUSION) Vols 1 and 2. pp. 372-379.

Heather, J and Schneider, S (2005) A decision procedure for the existence of a rank function Journal of Computer Security, 13 (2). pp. 317-344.

Heather, J and Schneider, S (2005) A decision procedure for the existence of a rank function. Journal of Computer Security, 13 (2). pp. 317-344.

Heather, J, Lowe, G and Schneider, S (2003) How to Prevent Type Flaw Attacks on Security Protocols. Journal of Computer Security, 11 (2). pp. 217-244.

Heather, J, Lowe, G and Schneider, S (2003) How to prevent type flaw attacks on security protocols Journal of Computer Security, 11 (2). pp. 217-244.

Heather, J, Lowe, G and Schneider, S (2003) How to prevent type flaw attacks on security protocols Journal of Computer Security, 11 (2). pp. 217-244.

Heather, J. and Hill, D. (2003) I'm not signing that Proceedings of the 1st International Workshop on Formal Aspects in Security and Trust (FAST 2003), Pisa, Italy. pp. 71-81.

Heather, J and Schneider, S (2000) Towards Automatic Verification of Authentication Protocols on an Unbounded Network. CSFW'00. pp. 132-143.

Monograph

Heather, JA, Schneider, SA and Teague, VJ (2013) Proceedings of Vote-ID 2013 Technical Report. (Unpublished)

Culnane, C, Heather, J, Schneider, SA and Xia, Z (2013) Software Design for VEC vVote System Technical Report. University of Surrey.

Casey, M, Culnane, C, Heather, J and Schneider, SA (2013) Software Requirements Specification for VEC vVote System UNSPECIFIED.

Heather, James and Schneider, Steve A. (2011) A formal framework for modelling coercion resistance and receipt freeness Technical Report. Department of Computing, University of Surrey.

Culnane, Chris, Heather, James, Schneider, Steve, Srinivasan, Sriramkrishnan and Xia, Zhe (2010) Trustworthy Voting Systems Technical Report: System Design Technical Report. Department of Computing, University of Surrey. (Unpublished)

Conference or Workshop Item

Stathakidis, S, Schneider, Steven and Heather, J (2014) Robustness Modelling and Verification of a Mix Net Protocol In: SSR 2014: Security Standardisation Research, 2014-12-16 - 2014-12-17.

Srinivasan, S, Culnane, C, Heather, J, Schneider, SA and Xia, Z (2014) Countering Ballot Stuffing and Incorporating Eligibility Verifiability in Helios In: Network and System Security, 2014-10-15 - 2014-10-17, Xi'an, China.

Culnane, C, Heather, J, Joaquim, R, Ryan, PYA, Schneider, S and Teague, V (2014) Faster Print on Demand for Prêt à Voter.

Moran, Murat and Heather, James (2013) Automated Analysis of Voting Systems with Dolev-Yao Intruder Model In: 13th International Workshop on Automated Verification of Critical Systems (AVoCS), 11-13 Sept 2013, University of Surrey.

Stathakidis, E, Williams, DM and Heather, JA (2013) Verifying a Mix Net in CSP

Moran, M, Heather, JA and Schneider, SA (2013) Automated Anonymity Verification of ThreeBallot Voting System In: 10th International Conference, IFM 2013, 2013-06-10 - 2013-06-14, Turku, Finland.

Moran, M, Heather, J and Schneider, S (2013) Automated Anonymity Verification of the ThreeBallot Voting System.

Heather, J, Culnane, C, Schneider, S, Srinivasan, S and Xia, Z (2013) Solving the Discrete Logarithm Problem for Packing Candidate Preferences.

Burton, C, Culnane, C, Heather, JA, Peacock, T, Ryan, PYA, Schneider, SA, Srinivasan, S, Teague, V, Wen, R and Xia, Z (2012) Using Pret a Voter in Victorian State elections In: 2012 Electronic Voting Technology/Workshop on Electronic Voting, 2012-08-06 - 2012-08-07.

Burton, C, Culnane, C, Heather, J, Peacock, T, Ryan, P, Schneider, S, Srinivasan, S, Teague, V, Wen, R and Xia, Z (2012) A Supervised Verifiable Voting Protocol for the Victorian Electoral Commission In: EVOTE 2012, 2012-07-11 - 2012-07-14, Lochau/Bregenz, Austria.

Heather, JA, Llewellyn, MH, Teague, VJ and Wen, R (2012) On the Side-Effects of Introducing E-voting In: VoteID 2011: Third International Conference, 2011-09-28 - 2011-09-29, Tallinn, Estonia.

Schneider, SA, Srinivasan, S, Culnane, C, Heather, JA and Xia, Z (2012) Prêt à Voter with Write-Ins In: VoteID 2011: Third International Conference, 2011-09-28 - 2011-09-29, Tallinn, Estonia.

Moran, M, Heather, JA and Schneider, SA (2011) Anonymity and CSP for Voting Systems In: CryptoForma 2011, 2011-06-21 - ?, Limerick.

Schneider, S, Llewellyn, M, Culnane, C, Heather, J, Srinivasan, S and Xia, Z (2011) Focus group views on Prêt à Voter 1.0

Heather, J, Ryan, PYA and Teague, V (2010) Pretty good democracy for more expressive voting schemes In: 15th European Symposium on Research in Computer Security, 2010-09-20 - 2010-09-22, Athens, Greece.

Xia, Z, Culnane, C, Heather, JA, Jonker, H, Ryan, PYA, Schneider, SA and Srinivasan, S (2010) Versatile Pret a Voter: Handling Multiple Election Methods with a Unified Interface In: Indocrypt, 2010-12-12 - 2010-12-15, Hyderabad, India.

Bismark, D, Heather, JA, Peel, RMA, Schneider, SA, Xia, Z and Ryan, PYA (2009) Experiences Gained from the first Prêt à Voter Implementation In: First International Workshop on Requirements Engineering for e-Voting Systems (RE-VOTE), 2009, 2010-08-31 - 2010-08-31, Atlanta, GA.

Heather, JA and Lundin, D (2009) The Append-only Web Bulletin Board In: Formal Aspects in Security and Trust 5th International Workshop (FAST 2008), 9-10 Oct 2008, Malaga, Spain.

Xia, Z, Schneider, SA, Heather, JA and Traoré, J (2008) Analysis, improvement and simplification of the Prêt à Voter with Paillier encryption

Xia, Z, Schneider, SA, Heather, J and Traoré, J (2008) Analysis, Improvement, and Simplification of Prêt à Voter with Paillier Encryption. In: USENIX/ACCURATE Electronic Voting Workshop, 2008-07-28 - 2008-07-29, San Jose, USA.

Xia, Z, Schneider, SA, Heather, J, Ryan, PYA, Lundin, D and Howard, P (2007) Pret a Voter: All-in-one In: WOTE: Workshop on Trustworthy Elections, 2007-06-20 - 2007-06-22, Ottawa, Canada.

Xia, Z, Schneider, SA, Heather, JA, Ryan, PYA, Lundin, D, Peel, RMA and Howard, PJ (2007) Prêt à Voter: All-in-one In: IAVoSS Workshop On Trustworthy Elections (WOTE 2007), 2007-06-20 - 2007-06-21, Ottawa, Canada.

Lundin, D, Treharne, HE, Ryan, PYA, Schneider, SA and Heather, JA (2006) Distributed Creation of the Ballot Form in Prêt à Voter using an element of Visual Encryption In: IAVoSS Workshop On Trustworthy Elections (WOTE 2006), 2006-06-28 - ?.

Heather, J and Schneider, S (2006) To infinity and beyond or, avoiding the infinite in security protocol analysis

Heather, J and Clark, JY (2005) Family secrets In: 2nd International Workshop on Formal Aspects in Security and Trust held at the 18th World Computer Congress, 2004-08-26 - 2004-08-27, Toulouse, FRANCE.

Heather, James (2002) Strand spaces and rank functions:more than distant cousins

Heather, J and Schneider, S (2002) Equal To The Task? In: European Symposium on Research on Computer Security.

Culnane, C, Bismark, D, Heather, JA, Schneider, SA, Srinivasan, S and Xia, Z Authentication Codes In: EVT/WOTE 2011, 2011-08-08 - 2011-08-09, San Francisco, USA.

Schneider, SA and Heather, JA A Formal Framework for Modelling Coercion Resistance and Receipt Freeness In: FM 2012: 18th International Symposium on Formal Methods, 2012-08-27 - 2012-08-31.

Lundin, D, Treharne, HE, Ryan, PYA, Schneider, SA, Heather, JA and Xia, Z Tear and Destroy: Chain voting and destruction problems shared by Prêt à Voter and Punchscan and a solution using Visual Encryption In: IAVoSS Workshop on Frontiers in Electronic Elections (FEE 2006), 2006-09-19 - 2006-09-19, Hamburg, Germany.

Xia, Z, Culnane, C, Heather, J, Jonker, H, Ryan, P, Schneider, S and Srinivasan, S Versatile Pret a Voter: Handling multiple election methods with a unified interface In: IndoCrypt 2010, 2010-12-12 - 2010-12-15, Hyderabad, India.

Lundin, D, Treharne, H, Ryan, PYA, Schneider, S and Heather, J Distributed creation of the ballot form in Pret a Voter using an element of Visual Encryption In: WOTE: Workshop on Trustworthy Elections, 2006 - ?, Cambridge, UK.

Thesis

Heather, J. (2000) Oh!... Is it really you? Using rank functions to verify authentication protocols Doctoral thesis, Royal Holloway, University of London.

Heather, James (1997) Exploiting a weakness of RSA Masters thesis, Oxford University.

This list was generated on Tue Nov 21 15:58:07 2017 UTC.

Information about this web site

© The University of Surrey, Guildford, Surrey, GU2 7XH, United Kingdom.
+44 (0)1483 300800