University of Surrey

Test tubes in the lab Research in the ATI Dance Research

Items where Author is "Schneider, S"

Up a level
Export as [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | No Grouping
Number of items: 178.

Whitefield, Jorden, Chen, Liqun, Kargl, F, Paverd, A, Schneider, Steven, Treharne, Helen and Wesemeyer, Stephan (2017) Formal Analysis of V2X Revocation Protocols. Proceedings of STM’17. Lecture Notes in Computer Science., 10547. pp. 147-163.

Whitefield, Jorden, Chen, Liqun, Giannetsos, Athanasios, Schneider, Steven and Treharne, Helen (2017) Privacy-Enhanced Capabilities for VANETs using Direct Anonymous Attestation In: 2017 IEEE Vehicular Networking Conference (VNC), November 27-29 2017, Turino, Italy.

Hoang, TS, Schneider, SA, Treharne, H and Williams, DM (2016) Foundations for using Linear Temporal Logic in Event-B refinement Formal Aspects of Computing, 28 (6). pp. 909-935.

Burton, C, Culnane, C and Schneider, S (2016) vVote: Verifiable Electronic Voting in Practice IEEE Security & Privacy, 14 (4). pp. 64-73.

Alshehri, A and Schneider, SA (2015) A Formal Framework for Security Analysis of NFC Mobile Coupon Protocols Journal of Computer Security.

Schneider, S and Treharne, H (2015) Special issue on Automated Verification of Critical Systems (AVoCS 2013) SCIENCE OF COMPUTER PROGRAMMING, 111. p. 213.

Culnane, C, Ryan, PYA, Schneider, SA and Teague, V (2015) vVote: a Verifiable Voting System ACM Transactions on Information and System Security, 18 (1).

Ryan, PYA, Schneider, S and Teague, V (2015) End-to-End Verifiability in Voting Systems, from Theory to Practice IEEE SECURITY & PRIVACY, 13 (3). pp. 59-62.

Burton, C, Culnane, C and Schneider, S (2015) Secure and Verifiable Electronic Voting in Practice: the use of vVote in the Victorian State Election

Schneider, SA (2015) vVote evaluation survey [Dataset]

Stathakidis, S, Schneider, Steven and Heather, J (2014) Robustness Modelling and Verification of a Mix Net Protocol In: SSR 2014: Security Standardisation Research, 2014-12-16 - 2014-12-17.

James, P, Moller, F, Nga Nguyen, H, Roggenbach, M, Schneider, S and Treharne, H (2014) On modelling and verifying railway interlockings: Tracking train lengths Science of Computer Programming, 96 (P3). pp. 315-336.

Srinivasan, S, Culnane, C, Heather, J, Schneider, SA and Xia, Z (2014) Countering Ballot Stuffing and Incorporating Eligibility Verifiability in Helios In: Network and System Security, 2014-10-15 - 2014-10-17, Xi'an, China.

James, P, Moller, F, Nguyen, HN, Roggenbach, M, Schneider, S and Treharne, H (2014) Techniques for modelling and verifying railway interlockings International Journal on Software Tools for Technology Transfer, 16 (6). pp. 685-711.

Schneider, S, Treharne, H, Wehrheim, H and Williams, D (2014) Managing LTL properties in Event-B refinement Lecture Notes in Computer Science. pp. 221-237.

Schneider, SA, Treharne, HE and Wehrheim, H (2014) The Behavioural Semantics of Event-B Re finement Formal Aspects of Computing: applicable formal methods, 26. pp. 251-280.

Alshehri, A, Schneider, S, Francillon, A and Rohatgi, P (2014) Formal Security Analysis and Improvement of a Hash-Based NFC M-Coupon Protocol SMART CARD RESEARCH AND ADVANCED APPLICATIONS (CARDIS 2013), 8419. pp. 152-167.

Moran, M, Heather, J and Schneider, S (2014) Verifying anonymity in voting systems using CSP FORMAL ASPECTS OF COMPUTING, 26 (1). pp. 63-98.

Culnane, C, Heather, J, Joaquim, R, Ryan, PYA, Schneider, S and Teague, V (2014) Faster Print on Demand for Prêt à Voter.

Schneider, S, Treharne, H, Wehrheim, H and Williams, DM (2014) Managing LTL properties in Event-B refinement. CoRR, abs/14.

Culnane, C and Schneider, S (2014) A Peered Bulletin Board for Robust Use in Verifiable Voting Systems In: Computer Security Foundations Symposium (CSF), 2014 IEEE 27th, 19-22 July 2014, Vienna.

Schneider, S, Teague, V, Culnane, C and Heather, J (2014) Special Section on Vote-ID 2013. J. Inf. Sec. Appl., 19, 2. pp. 103-104.

Abdelhalim, I, Schneider, SA and Treharne, H (2013) An integrated framework for checking the behaviour of fUML models using CSP International Journal on Software Tools for Technology Transfer, 15 (4). pp. 375-396.

Llewellyn, M, Schneider, SA, Xia, Z, Culnane, C, Heather, J, Ryan, PYA and Srinivasan, S (2013) Testing Voters’ Understanding of a Security Mechanism Used in Verifiable Voting The USENIX Journal of Election Technology and Systems, 1, 1. pp. 53-61.

Heather, JA, Schneider, SA and Teague, VJ (2013) Proceedings of Vote-ID 2013 Technical Report. (Unpublished)

Schneider, SA (2013) Proceedings of Vote-ID 2013: the fourth international conference on e-Voting and Identity [Report]

Moran, M, Heather, JA and Schneider, SA (2013) Automated Anonymity Verification of ThreeBallot Voting System In: 10th International Conference, IFM 2013, 2013-06-10 - 2013-06-14, Turku, Finland.

Moran, Murat, Heather, James and Schneider, Steve (2013) Automated Anonymity Verification of the ThreeBallot Voting System Integrated Formal Methods (iFM) Proceedings, 7940. pp. 94-108.

James, P, Moller, F, Nguyen, HN, Roggenbach, M, Schneider, SA and Treharne, H (2013) On Modelling and Verifying Railway Interlockings: Tracking Train Lengths Technical Report.

Culnane, C, Heather, J, Schneider, SA and Xia, Z (2013) Software Design for VEC vVote System Technical Report. University of Surrey.

Casey, M, Culnane, C, Heather, J and Schneider, SA (2013) Software Requirements Specification for VEC vVote System UNSPECIFIED.

Alshehri, AA, Briffa, JA, Schneider, SA and Wesemeyer, S (2013) Formal Security Analysis of NFC M-coupon Protocols using Casper/FDR In: NFC 2013 : 5th International Workshop On Near Field Communication, 2013-02-05 - 2013-02-05, Zurich.

Alshehri, A and Schneider, S (2013) Formally defining NFC M-coupon requirements, with a case study 2013 8TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST). pp. 52-58.

Moran, M, Heather, J and Schneider, S (2013) Automated Anonymity Verification of the ThreeBallot Voting System.

Heather, J, Schneider, S and Teague, V (2013) Cryptographic protocols with everyday objects Formal Aspects of Computing. pp. 1-26.

Moller, F, Nguyen, HN, Roggenbach, M, Schneider, S and Treharne, H (2013) Defining and model checking abstractions of complex railway models using CSP||B Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7857 L. pp. 193-208.

James, P, Trumble, M, Treharne, H, Roggenbach, M and Schneider, S (2013) OnTrack: An Open Tooling Environment for Railway Verification. NASA Formal Methods, 7871. pp. 435-440.

Aktoudianakis, E, Crampton, J, Schneider, S, Treharne, H and Waller, A (2013) Policy templates for relationship-based access control.

Heather, J, Culnane, C, Schneider, S, Srinivasan, S and Xia, Z (2013) Solving the Discrete Logarithm Problem for Packing Candidate Preferences.

Peacock, T, Ryan, PYA, Schneider, S and Xia, Z (2013) Verifiable Voting Systems Computer and Information Security Handbook. pp. 1103-1125.

James, P, Moller, F, Nguyen, HN, Roggenbach, M, Schneider, S, Treharne, H, Trumble, M and Williams, DM (2013) Verification of Scheme Plans Using CSP $$||$$ | | B. SEFM Workshops, 8368. pp. 189-204.

Moran, Murat, Heather, James and Schneider, Steve (2012) Verifying anonymity in voting systems using CSP Formal Aspects of Computing.

Schneider, SA, Treharne, HE and Wehrheim, H (2012) The Behavioural Semantics of Event-B Refinement Formal Aspects of Computing: applicable formal methods.

Burton, C, Culnane, C, Heather, JA, Peacock, T, Ryan, PYA, Schneider, SA, Srinivasan, S, Teague, V, Wen, R and Xia, Z (2012) Using Pret a Voter in Victorian State elections In: 2012 Electronic Voting Technology/Workshop on Electronic Voting, 2012-08-06 - 2012-08-07.

Burton, C, Culnane, C, Heather, J, Peacock, T, Ryan, P, Schneider, S, Srinivasan, S, Teague, V, Wen, R and Xia, Z (2012) A Supervised Verifiable Voting Protocol for the Victorian Electoral Commission In: EVOTE 2012, 2012-07-11 - 2012-07-14, Lochau/Bregenz, Austria.

Moler, F, Nguyen, HN, Roggenbach, M, Schneider, SA and Treharne, H (2012) Combining event-based and state-based modelling for railway verification Technical Report. (Unpublished)

Moller, F, Nguyen, HN, Roggenbach, M, Schneider, S and Treharne, H (2012) Defining and Model Checking Abstractions of Complex Railway Models Using CSP||B.

Abdelhalim, I, Schneider, S and Treharne, H (2012) An Optimization Approach for Effective Formalized fUML Model Checking.

Schneider, SA, Srinivasan, S, Culnane, C, Heather, JA and Xia, Z (2012) Prêt à Voter with Write-Ins In: VoteID 2011: Third International Conference, 2011-09-28 - 2011-09-29, Tallinn, Estonia.

Roggenbach, M, Moller, F, Schneider, S, Treharne, H and Nguyen, HN (2012) Railway modelling in CSP||B: the double junction case study. ECEASST, 53.

Schneider, SA, Treharne, HE and Wehrheim, H (2011) Bounded Retransmission in Event-B||CSP: a Case Study Electronic Notes in Theoretical Computer Science, 280. pp. 69-80.

Moran, M, Heather, JA and Schneider, SA (2011) Anonymity and CSP for Voting Systems In: CryptoForma 2011, 2011-06-21 - ?, Limerick.

Schneider, S and Treharne, H (2011) Changing system interfaces consistently: A new refinement strategy for CSP||B Science of Computer Programming, 76 (10). pp. 837-860.

Heather, James and Schneider, Steve A. (2011) A formal framework for modelling coercion resistance and receipt freeness Technical Report. Department of Computing, University of Surrey.

Schneider, Steve A., Treharne, Helen and Wehrheim, Heike (2011) Bounded Retransmission in Event-B||CSP: A Case Study Department of Computing, University of Surrey. (Unpublished)

Schneider, SA (2011) Security Analysis using Rank Functions in CSP In: Formal Models and Techniques for Analyzing Security Protocols. Cryptology and Information Security (10). IOS Press. ISBN 978-1-60750-713-0

Schneider, Steve, Treharne, Helen and Wehrheim, Heike (2011) Stepwise Refinement in Event-B CSP. Part 1: Safety Technical Report. Department of Computing, University of Surrey. (Unpublished)

Schneider, S, Treharne, H and Wehrheim, H (2011) A CSP Account of Event-B Refinement In: Refine 2011, 2011-06-20 - 2011-06-20, Limerick, Ireland.

Demirel, D, Henning, M, Ryan, PYA, Schneider, S and Volkamer, M (2011) Feasibility Analysis of Prêt à Voter for German Federal Elections.

Schneider, S, Llewellyn, M, Culnane, C, Heather, J, Srinivasan, S and Xia, Z (2011) Focus group views on Prêt à Voter 1.0

Abdelhalim, I, Schneider, S and Treharne, H (2011) Towards a practical approach to check UML/fUML models consistency using CSP In: 13th International Conference on Formal Engineering Methods, ICFEM 2011, 2011-10-26 - 2011-10-28, Durham, UK.

Culnane, Chris, Heather, James, Schneider, Steve, Srinivasan, Sriramkrishnan and Xia, Zhe (2010) Trustworthy Voting Systems Technical Report: System Design Technical Report. Department of Computing, University of Surrey. (Unpublished)

McEwan, AA and Schneider, S (2010) Modelling and analysis of the AMBA bus using CSP and B Concurrency and Computation: Practise and Experience, 22 (8). pp. 949-964.

Ifill, W and Schneider, S (2010) A step towards refining and translating B control annotations to Handel-C Concurrency and Computation: Practise and Experience, 22 (8). pp. 1023-1048.

Schneider, SA, Treharne, HE and Wehrheim, H (2010) A CSP approach to Control in Event-B Integrated Formal Methods/Lecture Notes in Computer Science, 6396. pp. 260-274.

Abdel Halim, I, Sharp, J, Schneider, S and Treharne, H (2010) Formal Verification of Tokeneer Behaviours Modelled in fUML Using CSP In: 12th International Conference on Formal Engineering Methods, 2010-11-17 - 2010-11-19, Shanghai, China.

Xia, Z, Culnane, C, Heather, JA, Jonker, H, Ryan, PYA, Schneider, SA and Srinivasan, S (2010) Versatile Pret a Voter: Handling Multiple Election Methods with a Unified Interface In: Indocrypt, 2010-12-12 - 2010-12-15, Hyderabad, India.

Ryan, PYA, Bismark, D, Heather, JA, Schneider, SA and Xia, Z (2009) The Prêt à Voter Verifiable Election System IEEE Transactions on Information Forensics and Security, 4 (4). pp. 662-673.

Bismark, D, Heather, JA, Peel, RMA, Schneider, SA, Xia, Z and Ryan, PYA (2009) Experiences Gained from the first Prêt à Voter Implementation In: First International Workshop on Requirements Engineering for e-Voting Systems (RE-VOTE), 2009, 2010-08-31 - 2010-08-31, Atlanta, GA.

Shaikh, SA, Bush, VJ and Schneider, SA (2009) Specifying authentication using signal events in CSP Computers and Security, 28 (5). pp. 310-324.

Schneider, S and Treharne, H (2009) Changing System Interfaces Consistently: A New Refinement Strategy for CSP||B In: 7th International Conference on Integrated Formal Methods, 2009-02-16 - 2009-02-19, Dusseldorf, GERMANY.

Vajar, B, Schneider, S and Treharne, H (2009) Mobile CSP||B. In: Automated Verification of Critical Systems, ? - ?.

Ryan, P.Y.A., Bismark, D., Heather, J., Schneider, S. and Xia, Z. (2009) Prêt à Voter: a voter-verifiable voting system Information Forensics and Security, IEEE Transactions on, 4 (4). pp. 662-673.

Treharne, H, Schneider, S, Grant, N, Evans, N and Ifill, W (2009) A step towards merging xUML and CSP ∥ B Lecture Notes in Computer Science: Rigorous Methods for Software Construction and Analysis, 5115. pp. 130-146.

Xia, Z, Schneider, SA, Heather, JA and Traoré, J (2008) Analysis, improvement and simplification of the Prêt à Voter with Paillier encryption

Treharne, H, Turner, E, Schneider, S and Evans, N (2008) Object Modelling in the SystemB Industrial Project In: 1st International Conference of Abstract State Machines, B and Z, 2008-09-16 - 2008-09-18, London, ENGLAND.

Xia, Z, Schneider, SA, Heather, J and Traoré, J (2008) Analysis, Improvement, and Simplification of Prêt à Voter with Paillier Encryption. In: USENIX/ACCURATE Electronic Voting Workshop, 2008-07-28 - 2008-07-29, San Jose, USA.

Turner, E, Treharne, H, Schneider, S and Evans, N (2008) Automatic generation of CSP || B skeletons from xUML models In: ICTAC 2008: 5th International Colloquium, 2008-09-01 - 2008-09-03, Istanbul, Turkey.

Turner, E, Treharne, H, Schneider, S and Evans, N (2008) Automatic generation of CSP||B skeletons from xUML models In: 5th International Colloquium on Theoretical Aspects of Computing (ICTAC 2008), 2008-09-01 - 2008-09-03, Sabanci Univ, Istanbul, TURKEY.

Schneider, S, Treharne, H, McEwan, A and Ifill, W (2008) Experiments in Translating CSP||B to Handel-C In: Communicating Process Architectures 2008 - WoTUG-31, 2008-09-07 - 2008-09-10, York, UK.

McEwan, A, Schneider, S, Welch, P and Ifil, W (2007) Concurrent Systems Engineering Series: Preface Concurrent Systems Engineering Series, 65.

Dimitrakos, T, Martinelli, F, Ryan, PYA and Schneider, S (2007) Guest editors' preface INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 6 (2-3). pp. 65-66.

Delicata, R and Schneider, S (2007) An algebraic approach to the verification of a class of Diffie-Hellman protocols INT J INF SECUR, 6 (2-3). pp. 183-196.

Karkinsky, D, Schneider, S and Treharne, H (2007) Combining mobility with state In: 6th International Conference on Integrated Formal Methods, 2007-07-02 - 2007-07-05, Oxford, ENGLAND.

Ifill, W, Schneider, S and Treharne, H (2007) Augmenting B with control annotations In: 7th International Conference of B Users, 2007-01-17 - 2007-01-19, Univ Franche Comte, Besancon, FRANCE.

Xia, Z, Schneider, SA, Heather, J, Ryan, PYA, Lundin, D and Howard, P (2007) Pret a Voter: All-in-one In: WOTE: Workshop on Trustworthy Elections, 2007-06-20 - 2007-06-22, Ottawa, Canada.

Xia, Z, Schneider, SA, Heather, JA, Ryan, PYA, Lundin, D, Peel, RMA and Howard, PJ (2007) Prêt à Voter: All-in-one In: IAVoSS Workshop On Trustworthy Elections (WOTE 2007), 2007-06-20 - 2007-06-21, Ottawa, Canada.

Lundin, D, Treharne, H, Ryan, P, Schneider, S, Heather, J and Xia, Z (2007) Tear and Destroy: Chain voting and destruction problems shared by Pret a Voter and Punchscan and a solution using Visual Encryption Fundamenta Informaticae (2001). pp. 1001-1019.

Foulle, S, Schneider, S, Traoré, J and Xia, Z (2007) Threat analysis of a practical voting scheme with receipts In: First International Conference VOTE-ID 2007, 2007-10-04 - 2007-10-05, Bochum, Germany.

Schneider, S, Cavalcanti, A, Treharne, H and Woodcock, J (2006) A layered behavioural model of platelets In: 11th IEEE International Conference on Engineering of Complex Computer Systems, 2006-08-15 - 2006-08-17, Stanford, CA.

McEwan, AA and Schneider, S (2006) A verified development of hardware using CSP||B In: 4th ACM/IEEE International Conference on Formal Methods and Models for Co-Design, 2006-07-27 - 2006-07-30, Napa Valley, CA.

Lundin, D, Treharne, HE, Ryan, PYA, Schneider, SA and Heather, JA (2006) Distributed Creation of the Ballot Form in Prêt à Voter using an element of Visual Encryption In: IAVoSS Workshop On Trustworthy Elections (WOTE 2006), 2006-06-28 - ?.

Ryan, PYA, Schneider, SA, Gollmann, D, Meier, J and Sabelfeld, A (2006) Pret a Voter with Re-encryption Mixes In: 11th European Symposium on Research in Computer Security, 2006-09-18 - 2006-09-20, Hamburg, GERMANY.

Treharne, H, Schneider, S, Grant, N, Evans, N and Ifill, W (2006) A Step towards Merging xUML and CSP||B In: Seminar on Rigorous Methods for Software Construction and Analysis, 2006-05-07 - 2006-05-12, Schloss Dagstuhl, GERMANY.

Schneider, S, Hoang, TS, Robinson, K and Treharne, H (2006) Tank monitoring: a pAMN case study Formal Aspects of Computing, 18 (3). pp. 308-328.

Ouaknine, J and Schneider, S (2006) Timed CSP: A Retrospective. Electr. Notes Theor. Comput. Sci., 162. pp. 273-276.

Heather, J and Schneider, S (2006) To infinity and beyond or, avoiding the infinite in security protocol analysis

Delicata, R and Schneider, S (2006) A formal approach for reasoning about a class of Diffle-Hellman protocols In: UNSPECIFIED UNSPECIFIED, pp. 34-46.

Schneider, S and Treharne, H (2005) CSP theorems for communicating B machines FORMAL ASPECTS OF COMPUTING, 17 (4). pp. 390-422.

Schneider, Steve, Hoang, Thai Son, Robinson, Ken and Treharne, Helen (2005) Tank monitoring: a pAMN case study Electronic Notes in Theoretical Computer Science, 137 (2). pp. 183-204.

Delicata, Rob and Schneider, Steve A. (2005) Temporal rank functions for forward secrecy In: 18th IEEE Workshop on Computer Security Foundations, 2005, 20-22 Jun 2005, Aix-en-Provence, France.

Yeung, WL and Schneider, SA (2005) Formal verification of fault-tolerant software design: the CSP approach MICROPROCESS MICROSY, 29 (5). pp. 197-209.

Yeung, WL and Schneider, SA (2005) Formal verification of fault-tolerant software design: the CSP approach MICROPROCESSORS AND MICROSYSTEMS, 29 (5). pp. 197-209.

Schneider, Steve and Delicata, Robert (2005) Verifying Security Protocols: An Application of CSP In: UNSPECIFIED UNSPECIFIED, pp. 243-263.

Shaikh, SA, Bush, VJ and Schneider, SA (2005) Specifying authentication using signal events in CSP In: 1st SKLOIS Conference on Information Security and Cryptology, 2005-12-15 - 2005-12-17, Beijing, PEOPLES R CHINA.

Schneider, S, Treharne, H and Evans, N (2005) Chunks: Component verification in CSP||B In: 5th International Conference on Integrated Formal Methods, 2005-11-29 - 2005-12-02, Eindhoven, Netherlands.

Chaum, D, Ryan, PYA and Schneider, SA (2005) A Practical Voter-Verifiable Election Scheme. In: European Symposium on Research in Computer Security, 2005-09-12 - 2005-09-14, Milan, Italy.

Schneider, SA, Hoang, TS, Robinson, K and Treharne, H (2005) Tank Monitoring: A pAMN Case Study. Electronic Notes in Theoretical Computer Science, 2 (137). pp. 183-204.

Evans, N and Schneider, SA (2005) Verifying security protocols with PVS: widening the rank function approach. Journal of Logic and Algebraic Programming, 64 (2). pp. 253-284.

Heather, J and Schneider, S (2005) A decision procedure for the existence of a rank function Journal of Computer Security, 13 (2). pp. 317-344.

Heather, J and Schneider, S (2005) A decision procedure for the existence of a rank function. Journal of Computer Security, 13 (2). pp. 317-344.

Delicata, Robert and Schneider, Steve (2004) Towards the Rank Function Verification of protocols that use Temporary Secrets

Schneider, Steve A. and Treharne, Helen (2004) Verifying controlled components

Schneider, S and Treharne, H (2004) Verifying Controlled Components. In: 4th International Conference on Integrated Formal Methods, 2004 - ?.

Schneider, SA and Delicata, R (2004) Verifying Security Protocols: An Application of CSP. In: Communicating Sequential Processes: The First 25 Years, Symposium on the Occasion of 25 Years of CSP, 2004-07-07 - 2004-07-08, London.

Yeung, WL and Schneider, SA (2003) Design and verification of distributed recovery blocks with CSP FORMAL METHODS IN SYSTEM DESIGN, 22 (3). pp. 225-248.

Yeung, WL and Schneider, SA (2003) Design and verification of distributed recovery blocks with CSP FORM METHOD SYST DES, 22 (3). pp. 225-248.

Gong, Li, Guttman, Joshua, Ryan, Peter and Schneider, Steve A. (2003) Guest Editorial - Overview the <i>IEEE Journal on Selected Areas in Communications</i>, Issue on Design and Analysis Techniques for Security Assurance, 21. pp. 1-4.

Treharne, H, Schneider, S and Bramble, M (2003) Composing Specifications Using Communication. Lecture Notes in Computer Science, 2651. pp. 58-78.

Gong, L, Guttman, JD, Ryan, PYA and Schneider, SA (2003) Guest editorial overview IEEE Journal of Selected Papers in Communications, 21 (1). pp. 1-4.

Heather, J, Lowe, G and Schneider, S (2003) How to Prevent Type Flaw Attacks on Security Protocols. Journal of Computer Security, 11 (2). pp. 217-244.

Heather, J, Lowe, G and Schneider, S (2003) How to prevent type flaw attacks on security protocols Journal of Computer Security, 11 (2). pp. 217-244.

Heather, J, Lowe, G and Schneider, S (2003) How to prevent type flaw attacks on security protocols Journal of Computer Security, 11 (2). pp. 217-244.

Schneider, Steve A (2002) Verifying authentication protocol implementations In: 5th International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOODS 2002), 20 - 22 March 2002, Enschede, The Netherlands.

Schneider, S and Treharne, H (2002) Communicating B Machines. Lecture Notes in Computer Science, 2272. pp. 416-435.

Heather, J and Schneider, S (2002) Equal To The Task? In: European Symposium on Research on Computer Security.

Ryan, P. Y. and Schneider, Steve A. (2001) Process algebra and non-interference Journal of Computer Security, 9. pp. 75-103.

Schneider, S (2001) May Testing, Non-interference, and Compositionality. In: The First Irish Conference on the Mathematical Foundations of Computer Science and Information Technology (MFCSIT2000), 2000-07-20 - 2000-07-21, Cork, ireland.

Schneider, S (2001) The B-Method: an Introduction Cornerstones of Computing . Palgrave. ISBN 033379284X

Ryan, P, Schneider, S, Goldsmith, M, Lowe, G and Roscoe, B (2001) Modelling and Analysis of Security Protocols Addison-Wesley. ISBN 0201674718

Ryan, PYA and Schneider, SA (2001) Process Algebra and Non-Interference. Journal of Computer Security, 9 (1/2). pp. 75-103.

Schneider, S (2001) Process Algebra and Security. In: 12th International Conference on Concurrency Theory, 2001 - ?.

Schneider, S (2000) Abstraction and Testing in CSP. Formal Aspects of Computing, 12 (3). pp. 165-181.

Evans, N and Schneider, S (2000) Analysing Time Dependent Security Properties in CSP Using PVS. In: European Symposium on Research in Computer Security, 2000-10-04 - 2000-10-06, Toulouse, France.

Schneider, S (2000) Concurrent and real-time systems: the CSP approach Wiley. ISBN 0-471-62373-3

Treharne, H and Schneider, S (2000) How to Drive a B Machine. In: ZB 2000: Formal Specification and Development in Z and B, First International Conference of B and Z Users, 2000-08-29 - 2000-09-02, York, UK.

Heather, J and Schneider, S (2000) Towards Automatic Verification of Authentication Protocols on an Unbounded Network. CSFW'00. pp. 132-143.

Schneider, S (1999) Abstraction and Testing.

Adekunle, CB and Schneider, S (1999) Detecting Feature Interactions in the Terrestrial Trunked Radio (TETRA) Network Using Promela and Xspin. In: Theoretical and Practical Aspects of SPIN Model Checking, 5th and 6th International SPIN Workshops, ? - ?.

Ryan, PYA and Schneider, SA (1999) Process Algebra and Non-Interference. In: IEEE Computer Security Foundations Workshop, 1999-06-28 - 1999-06-30, Mordano, Italy.

Treharne, H and Schneider, S (1999) Using a Process Algebra to Control B Operations. In: 1st International Conference on Integrated Formal Methods, ? - ?.

Schneider, Steve A. (1998) Verifying authentication protocols in CSP IEEE Transactions on Software Engineering, 24 (9). pp. 741-758.

Schneider, Steve A. (1998) Formal analysis of a non-repudiation protocol Proceedings of the 11th IEEE Computer Security Foundations Workshop. pp. 9-11.

Treharne, Helen, Draper, J. and Schneider, Steve A. (1998) Test case preparation using a prototype

Ryan, PYA and Schneider, SA (1998) An attack on a recursive authentication protocol. A cautionary tale INFORMATION PROCESSING LETTERS, 65 (1). pp. 7-10.

Schneider, S (1998) Formal Analysis of a Non-Repudiation Protocol. In: IEEE Computer Security Foundations Workshop, 1998-06-09 - 1998-06-11, Rockport, MA, USA.

Treharne, H, Draper, J and Schneider, S (1998) Test Case Preparation Using a Prototype. In: B’98: Recent Advances in the Development and Use of the B Method, 1998 - ?.

Schneider, S (1997) Timewise Refinement for Communicating Processes. Science of Computer Programming, 28 (1). pp. 43-90.

Dutertre, B and Schneider, S (1997) Using a PVS Embedding of CSP to Verify Authentication Protocols. In: 10th International Conference on Theorem Proving in Higher Order Logics, 1997-08-19 - 1997-08-22, Murray Hill, NJ, USA.

Schneider, S (1997) Verifying authentication protocols with CSP. In: IEEE Computer Security Foundations Workshop, 1997-06-10 - 1997-06-12, Rockport, MA , USA.

Schneider, Steve A. (1996) Security properties and CSP Proceedings of the 1996 IEEE Symposium on Security and Privacy. pp. 174-187.

Schneider, S and Sidiropoulos, A (1996) CSP and Anonymity. In: European Symposium on Research in Computer Security, 1996-09-25 - 1996-09-27, Rome, Italy.

Schneider, SA (1996) Specification and Verification in Timed CSP In: Real-time systems. UNSPECIFIED, pp. 147-181.

Davies, J and Schneider, S (1995) A Brief History of Timed CSP. Theoretical Computer Science, 138 (2). pp. 243-271.

Mislove, MW, Roscoe, AW and Schneider, SA (1995) Fixed points without Completeness Theoretical Computer Science, 138. pp. 273-314.

Schneider, S (1995) An Operational Semantics for Timed CSP Information and Computation, 116. pp. 193-213.

Davies, J, Bryans, J and Schneider, S (1995) Real-time LOTOS and Timed Observations. In: 8th International Conference on Formal Description Techniques, ? - ?.

Bryans, J, Davies, J and Schneider, S (1995) Towards a denotational semantics for ET-LOTOS. In: 6th International Conference in Concurrency Theory, ? - ?.

Davies, J and Schneider, S (1994) Recursion Induction for Real-Time Processes. Formal Aspects of Computing, 5 (6). pp. 530-553.

Schneider, S (1993) Rigorous Specification of Real-Time Systems. In: Algebraic Methodology and Software Technology, ? - ?.

Schneider, S (1993) Timewise Refinement for Communicating Processes. In: Mathematical Foundations of Programming Semantics, 1993-04-07 - 1993-04-10.

Davies, J, Jackson, D and Schneider, S (1992) Broadcast Communication for Real-time Processes. In: Formal Techniques in Real-Time and Fault-Tolerant Systems, ? - ?.

Davies, J and Schneider, S (1992) Using CSP to Verify a Timed Protocol over a Fair Medium. In: 3rd International Conference on Concurrency Theory, ? - ?.

Schneider, S, Davies, J, Jackson, DM, Reed, GM, Reed, JN and Roscoe, AW (1991) Timed CSP: Theory and Practice. In: Real-time: Theory in Practice, ? - ?.

Davies, J and Schneider, S (1989) Factorizing Proofs in Timed CSP. In: Mathematical Foundations of Programming Semantics, ? - ?.

Culnane, C, Bismark, D, Heather, JA, Schneider, SA, Srinivasan, S and Xia, Z Authentication Codes In: EVT/WOTE 2011, 2011-08-08 - 2011-08-09, San Francisco, USA.

Bryans, J and Schneider, SA CSP, PVS and a recursive authentication protocol In: DIMACS Workshop on Design and Formal Verification of Security Protocols, 1997-09-03 - ?, Rutgers University.

Schneider, SA and Heather, JA A Formal Framework for Modelling Coercion Resistance and Receipt Freeness In: FM 2012: 18th International Symposium on Formal Methods, 2012-08-27 - 2012-08-31.

Schneider, SA, Treharne, H and Vajar, B Introducing mobility into CSP||B In: 7th International Workshop on Automated Verification of Critical Systems, 2007-09-10 - 2007-09-12, Oxford, UK.

Vajar, B, Schneider, S and Treharne, H Mobile CSP||B In: 9th International Workshop on Automated Verification of Critical Systems, 2009-09-23 - 2009-09-25.

Xia, Z and Schneider, S A New Receipt-Free E-Voting Scheme Based on Blind Signature In: WOTE: Workshop on Trustworthy Elections, 2006-06-29 - 2006-06-30, Cambridge, UK.

Lundin, D, Treharne, HE, Ryan, PYA, Schneider, SA, Heather, JA and Xia, Z Tear and Destroy: Chain voting and destruction problems shared by Prêt à Voter and Punchscan and a solution using Visual Encryption In: IAVoSS Workshop on Frontiers in Electronic Elections (FEE 2006), 2006-09-19 - 2006-09-19, Hamburg, Germany.

Dutertre, B and Schneider, SA Using a PVS embedding of CSP to verify authentication protocols In: 10th International Theorem Proving in Higher Order Logic Conference, 1997 - ?.

Xia, Z, Culnane, C, Heather, J, Jonker, H, Ryan, P, Schneider, S and Srinivasan, S Versatile Pret a Voter: Handling multiple election methods with a unified interface In: IndoCrypt 2010, 2010-12-12 - 2010-12-15, Hyderabad, India.

Roscoe, AW, Reed, GM and Schneider, SA CSP and Timewise Refinement In: BCS-FACS Refinement Workshop, 1991 - ?, Cambridge.

Lundin, D, Treharne, H, Ryan, PYA, Schneider, S and Heather, J Distributed creation of the ballot form in Pret a Voter using an element of Visual Encryption In: WOTE: Workshop on Trustworthy Elections, 2006 - ?, Cambridge, UK.

Schneider, SA Formal Methods at Royal Holloway: perspectives and pitfalls In: Teaching Formal Methods, 2003 - ?, Oxford.

Schneider, SA Teaching B at Royal Holloway, In: Second International B Conference, Education session, 1998 - ?, Montpellier, France.

This list was generated on Sun Jul 15 18:46:41 2018 UTC.

Information about this web site

© The University of Surrey, Guildford, Surrey, GU2 7XH, United Kingdom.
+44 (0)1483 300800