University of Surrey

Test tubes in the lab Research in the ATI Dance Research

Items where Author is "Schneider, S"

Up a level
Export as [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | No Grouping
Number of items: 178.

Article

Whitefield, Jorden, Chen, Liqun, Kargl, F, Paverd, A, Schneider, Steven, Treharne, Helen and Wesemeyer, Stephan (2017) Formal Analysis of V2X Revocation Protocols. Proceedings of STM’17. Lecture Notes in Computer Science..

Hoang, TS, Schneider, SA, Treharne, H and Williams, DM (2016) Foundations for using Linear Temporal Logic in Event-B refinement Formal Aspects of Computing, 28 (6). pp. 909-935.

Burton, C, Culnane, C and Schneider, S (2016) vVote: Verifiable Electronic Voting in Practice IEEE Security & Privacy, 14 (4). pp. 64-73.

Alshehri, A and Schneider, SA (2015) A Formal Framework for Security Analysis of NFC Mobile Coupon Protocols Journal of Computer Security.

Schneider, S and Treharne, H (2015) Special issue on Automated Verification of Critical Systems (AVoCS 2013) SCIENCE OF COMPUTER PROGRAMMING, 111. p. 213.

Culnane, C, Ryan, PYA, Schneider, SA and Teague, V (2015) vVote: a Verifiable Voting System ACM Transactions on Information and System Security, 18 (1).

Ryan, PYA, Schneider, S and Teague, V (2015) End-to-End Verifiability in Voting Systems, from Theory to Practice IEEE SECURITY & PRIVACY, 13 (3). pp. 59-62.

Burton, C, Culnane, C and Schneider, S (2015) Secure and Verifiable Electronic Voting in Practice: the use of vVote in the Victorian State Election

James, P, Moller, F, Nga Nguyen, H, Roggenbach, M, Schneider, S and Treharne, H (2014) On modelling and verifying railway interlockings: Tracking train lengths Science of Computer Programming, 96 (P3). pp. 315-336.

James, P, Moller, F, Nguyen, HN, Roggenbach, M, Schneider, S and Treharne, H (2014) Techniques for modelling and verifying railway interlockings International Journal on Software Tools for Technology Transfer, 16 (6). pp. 685-711.

Schneider, S, Treharne, H, Wehrheim, H and Williams, D (2014) Managing LTL properties in Event-B refinement Lecture Notes in Computer Science. pp. 221-237.

Schneider, SA, Treharne, HE and Wehrheim, H (2014) The Behavioural Semantics of Event-B Re finement Formal Aspects of Computing: applicable formal methods, 26. pp. 251-280.

Alshehri, A, Schneider, S, Francillon, A and Rohatgi, P (2014) Formal Security Analysis and Improvement of a Hash-Based NFC M-Coupon Protocol SMART CARD RESEARCH AND ADVANCED APPLICATIONS (CARDIS 2013), 8419. pp. 152-167.

Moran, M, Heather, J and Schneider, S (2014) Verifying anonymity in voting systems using CSP FORMAL ASPECTS OF COMPUTING, 26 (1). pp. 63-98.

Schneider, S, Treharne, H, Wehrheim, H and Williams, DM (2014) Managing LTL properties in Event-B refinement. CoRR, abs/14.

Schneider, S, Teague, V, Culnane, C and Heather, J (2014) Special Section on Vote-ID 2013. J. Inf. Sec. Appl., 19, 2. pp. 103-104.

Abdelhalim, I, Schneider, SA and Treharne, H (2013) An integrated framework for checking the behaviour of fUML models using CSP International Journal on Software Tools for Technology Transfer, 15 (4). pp. 375-396.

Llewellyn, M, Schneider, SA, Xia, Z, Culnane, C, Heather, J, Ryan, PYA and Srinivasan, S (2013) Testing Voters’ Understanding of a Security Mechanism Used in Verifiable Voting The USENIX Journal of Election Technology and Systems, 1, 1. pp. 53-61.

Moran, Murat, Heather, James and Schneider, Steve (2013) Automated Anonymity Verification of the ThreeBallot Voting System Integrated Formal Methods (iFM) Proceedings, 7940. pp. 94-108.

Alshehri, A and Schneider, S (2013) Formally defining NFC M-coupon requirements, with a case study 2013 8TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST). pp. 52-58.

Heather, J, Schneider, S and Teague, V (2013) Cryptographic protocols with everyday objects Formal Aspects of Computing. pp. 1-26.

Moller, F, Nguyen, HN, Roggenbach, M, Schneider, S and Treharne, H (2013) Defining and model checking abstractions of complex railway models using CSP||B Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7857 L. pp. 193-208.

James, P, Trumble, M, Treharne, H, Roggenbach, M and Schneider, S (2013) OnTrack: An Open Tooling Environment for Railway Verification. NASA Formal Methods, 7871. pp. 435-440.

Peacock, T, Ryan, PYA, Schneider, S and Xia, Z (2013) Verifiable Voting Systems Computer and Information Security Handbook. pp. 1103-1125.

James, P, Moller, F, Nguyen, HN, Roggenbach, M, Schneider, S, Treharne, H, Trumble, M and Williams, DM (2013) Verification of Scheme Plans Using CSP $$||$$ | | B. SEFM Workshops, 8368. pp. 189-204.

Moran, Murat, Heather, James and Schneider, Steve (2012) Verifying anonymity in voting systems using CSP Formal Aspects of Computing.

Schneider, SA, Treharne, HE and Wehrheim, H (2012) The Behavioural Semantics of Event-B Refinement Formal Aspects of Computing: applicable formal methods.

Roggenbach, M, Moller, F, Schneider, S, Treharne, H and Nguyen, HN (2012) Railway modelling in CSP||B: the double junction case study. ECEASST, 53.

Schneider, SA, Treharne, HE and Wehrheim, H (2011) Bounded Retransmission in Event-B||CSP: a Case Study Electronic Notes in Theoretical Computer Science, 280. pp. 69-80.

Schneider, S and Treharne, H (2011) Changing system interfaces consistently: A new refinement strategy for CSP||B Science of Computer Programming, 76 (10). pp. 837-860.

McEwan, AA and Schneider, S (2010) Modelling and analysis of the AMBA bus using CSP and B Concurrency and Computation: Practise and Experience, 22 (8). pp. 949-964.

Ifill, W and Schneider, S (2010) A step towards refining and translating B control annotations to Handel-C Concurrency and Computation: Practise and Experience, 22 (8). pp. 1023-1048.

Schneider, SA, Treharne, HE and Wehrheim, H (2010) A CSP approach to Control in Event-B Integrated Formal Methods/Lecture Notes in Computer Science, 6396. pp. 260-274.

Ryan, PYA, Bismark, D, Heather, JA, Schneider, SA and Xia, Z (2009) The Prêt à Voter Verifiable Election System IEEE Transactions on Information Forensics and Security, 4 (4). pp. 662-673.

Shaikh, SA, Bush, VJ and Schneider, SA (2009) Specifying authentication using signal events in CSP Computers and Security, 28 (5). pp. 310-324.

Ryan, P.Y.A., Bismark, D., Heather, J., Schneider, S. and Xia, Z. (2009) Prêt à Voter: a voter-verifiable voting system Information Forensics and Security, IEEE Transactions on, 4 (4). pp. 662-673.

Treharne, H, Schneider, S, Grant, N, Evans, N and Ifill, W (2009) A step towards merging xUML and CSP ∥ B Lecture Notes in Computer Science: Rigorous Methods for Software Construction and Analysis, 5115. pp. 130-146.

McEwan, A, Schneider, S, Welch, P and Ifil, W (2007) Concurrent Systems Engineering Series: Preface Concurrent Systems Engineering Series, 65.

Dimitrakos, T, Martinelli, F, Ryan, PYA and Schneider, S (2007) Guest editors' preface INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 6 (2-3). pp. 65-66.

Delicata, R and Schneider, S (2007) An algebraic approach to the verification of a class of Diffie-Hellman protocols INT J INF SECUR, 6 (2-3). pp. 183-196.

Lundin, D, Treharne, H, Ryan, P, Schneider, S, Heather, J and Xia, Z (2007) Tear and Destroy: Chain voting and destruction problems shared by Pret a Voter and Punchscan and a solution using Visual Encryption Fundamenta Informaticae (2001). pp. 1001-1019.

Schneider, S, Hoang, TS, Robinson, K and Treharne, H (2006) Tank monitoring: a pAMN case study Formal Aspects of Computing, 18 (3). pp. 308-328.

Ouaknine, J and Schneider, S (2006) Timed CSP: A Retrospective. Electr. Notes Theor. Comput. Sci., 162. pp. 273-276.

Schneider, S and Treharne, H (2005) CSP theorems for communicating B machines FORMAL ASPECTS OF COMPUTING, 17 (4). pp. 390-422.

Schneider, Steve, Hoang, Thai Son, Robinson, Ken and Treharne, Helen (2005) Tank monitoring: a pAMN case study Electronic Notes in Theoretical Computer Science, 137 (2). pp. 183-204.

Yeung, WL and Schneider, SA (2005) Formal verification of fault-tolerant software design: the CSP approach MICROPROCESS MICROSY, 29 (5). pp. 197-209.

Yeung, WL and Schneider, SA (2005) Formal verification of fault-tolerant software design: the CSP approach MICROPROCESSORS AND MICROSYSTEMS, 29 (5). pp. 197-209.

Schneider, SA, Hoang, TS, Robinson, K and Treharne, H (2005) Tank Monitoring: A pAMN Case Study. Electronic Notes in Theoretical Computer Science, 2 (137). pp. 183-204.

Evans, N and Schneider, SA (2005) Verifying security protocols with PVS: widening the rank function approach. Journal of Logic and Algebraic Programming, 64 (2). pp. 253-284.

Heather, J and Schneider, S (2005) A decision procedure for the existence of a rank function Journal of Computer Security, 13 (2). pp. 317-344.

Heather, J and Schneider, S (2005) A decision procedure for the existence of a rank function. Journal of Computer Security, 13 (2). pp. 317-344.

Yeung, WL and Schneider, SA (2003) Design and verification of distributed recovery blocks with CSP FORMAL METHODS IN SYSTEM DESIGN, 22 (3). pp. 225-248.

Yeung, WL and Schneider, SA (2003) Design and verification of distributed recovery blocks with CSP FORM METHOD SYST DES, 22 (3). pp. 225-248.

Gong, Li, Guttman, Joshua, Ryan, Peter and Schneider, Steve A. (2003) Guest Editorial - Overview the <i>IEEE Journal on Selected Areas in Communications</i>, Issue on Design and Analysis Techniques for Security Assurance, 21. pp. 1-4.

Treharne, H, Schneider, S and Bramble, M (2003) Composing Specifications Using Communication. Lecture Notes in Computer Science, 2651. pp. 58-78.

Gong, L, Guttman, JD, Ryan, PYA and Schneider, SA (2003) Guest editorial overview IEEE Journal of Selected Papers in Communications, 21 (1). pp. 1-4.

Heather, J, Lowe, G and Schneider, S (2003) How to Prevent Type Flaw Attacks on Security Protocols. Journal of Computer Security, 11 (2). pp. 217-244.

Heather, J, Lowe, G and Schneider, S (2003) How to prevent type flaw attacks on security protocols Journal of Computer Security, 11 (2). pp. 217-244.

Heather, J, Lowe, G and Schneider, S (2003) How to prevent type flaw attacks on security protocols Journal of Computer Security, 11 (2). pp. 217-244.

Schneider, S and Treharne, H (2002) Communicating B Machines. Lecture Notes in Computer Science, 2272. pp. 416-435.

Ryan, P. Y. and Schneider, Steve A. (2001) Process algebra and non-interference Journal of Computer Security, 9. pp. 75-103.

Ryan, PYA and Schneider, SA (2001) Process Algebra and Non-Interference. Journal of Computer Security, 9 (1/2). pp. 75-103.

Schneider, S (2000) Abstraction and Testing in CSP. Formal Aspects of Computing, 12 (3). pp. 165-181.

Heather, J and Schneider, S (2000) Towards Automatic Verification of Authentication Protocols on an Unbounded Network. CSFW'00. pp. 132-143.

Schneider, Steve A. (1998) Verifying authentication protocols in CSP IEEE Transactions on Software Engineering, 24 (9). pp. 741-758.

Schneider, Steve A. (1998) Formal analysis of a non-repudiation protocol Proceedings of the 11th IEEE Computer Security Foundations Workshop. pp. 9-11.

Ryan, PYA and Schneider, SA (1998) An attack on a recursive authentication protocol. A cautionary tale INFORMATION PROCESSING LETTERS, 65 (1). pp. 7-10.

Schneider, S (1997) Timewise Refinement for Communicating Processes. Science of Computer Programming, 28 (1). pp. 43-90.

Schneider, Steve A. (1996) Security properties and CSP Proceedings of the 1996 IEEE Symposium on Security and Privacy. pp. 174-187.

Davies, J and Schneider, S (1995) A Brief History of Timed CSP. Theoretical Computer Science, 138 (2). pp. 243-271.

Mislove, MW, Roscoe, AW and Schneider, SA (1995) Fixed points without Completeness Theoretical Computer Science, 138. pp. 273-314.

Schneider, S (1995) An Operational Semantics for Timed CSP Information and Computation, 116. pp. 193-213.

Davies, J and Schneider, S (1994) Recursion Induction for Real-Time Processes. Formal Aspects of Computing, 5 (6). pp. 530-553.

Book Section

Schneider, SA (2011) Security Analysis using Rank Functions in CSP In: Formal Models and Techniques for Analyzing Security Protocols. Cryptology and Information Security (10). IOS Press. ISBN 978-1-60750-713-0

Delicata, R and Schneider, S (2006) A formal approach for reasoning about a class of Diffle-Hellman protocols In: UNSPECIFIED UNSPECIFIED, pp. 34-46.

Schneider, Steve and Delicata, Robert (2005) Verifying Security Protocols: An Application of CSP In: UNSPECIFIED UNSPECIFIED, pp. 243-263.

Schneider, SA (1996) Specification and Verification in Timed CSP In: Real-time systems. UNSPECIFIED, pp. 147-181.

Monograph

Heather, JA, Schneider, SA and Teague, VJ (2013) Proceedings of Vote-ID 2013 Technical Report. (Unpublished)

James, P, Moller, F, Nguyen, HN, Roggenbach, M, Schneider, SA and Treharne, H (2013) On Modelling and Verifying Railway Interlockings: Tracking Train Lengths Technical Report.

Culnane, C, Heather, J, Schneider, SA and Xia, Z (2013) Software Design for VEC vVote System Technical Report. University of Surrey.

Casey, M, Culnane, C, Heather, J and Schneider, SA (2013) Software Requirements Specification for VEC vVote System UNSPECIFIED.

Moler, F, Nguyen, HN, Roggenbach, M, Schneider, SA and Treharne, H (2012) Combining event-based and state-based modelling for railway verification Technical Report. (Unpublished)

Heather, James and Schneider, Steve A. (2011) A formal framework for modelling coercion resistance and receipt freeness Technical Report. Department of Computing, University of Surrey.

Schneider, Steve, Treharne, Helen and Wehrheim, Heike (2011) Stepwise Refinement in Event-B CSP. Part 1: Safety Technical Report. Department of Computing, University of Surrey. (Unpublished)

Culnane, Chris, Heather, James, Schneider, Steve, Srinivasan, Sriramkrishnan and Xia, Zhe (2010) Trustworthy Voting Systems Technical Report: System Design Technical Report. Department of Computing, University of Surrey. (Unpublished)

Report

Schneider, SA (2013) Proceedings of Vote-ID 2013: the fourth international conference on e-Voting and Identity [Report]

Conference or Workshop Item

Whitefield, Jorden, Chen, Liqun, Giannetsos, Athanasios, Schneider, Steven and Treharne, Helen (2017) Privacy-Enhanced Capabilities for VANETs using Direct Anonymous Attestation In: 2017 IEEE Vehicular Networking Conference (VNC), November 27-29 2017, Turino, Italy.

Stathakidis, S, Schneider, Steven and Heather, J (2014) Robustness Modelling and Verification of a Mix Net Protocol In: SSR 2014: Security Standardisation Research, 2014-12-16 - 2014-12-17.

Srinivasan, S, Culnane, C, Heather, J, Schneider, SA and Xia, Z (2014) Countering Ballot Stuffing and Incorporating Eligibility Verifiability in Helios In: Network and System Security, 2014-10-15 - 2014-10-17, Xi'an, China.

Culnane, C, Heather, J, Joaquim, R, Ryan, PYA, Schneider, S and Teague, V (2014) Faster Print on Demand for Prêt à Voter.

Culnane, C and Schneider, S (2014) A Peered Bulletin Board for Robust Use in Verifiable Voting Systems In: Computer Security Foundations Symposium (CSF), 2014 IEEE 27th, 19-22 July 2014, Vienna.

Moran, M, Heather, JA and Schneider, SA (2013) Automated Anonymity Verification of ThreeBallot Voting System In: 10th International Conference, IFM 2013, 2013-06-10 - 2013-06-14, Turku, Finland.

Alshehri, AA, Briffa, JA, Schneider, SA and Wesemeyer, S (2013) Formal Security Analysis of NFC M-coupon Protocols using Casper/FDR In: NFC 2013 : 5th International Workshop On Near Field Communication, 2013-02-05 - 2013-02-05, Zurich.

Moran, M, Heather, J and Schneider, S (2013) Automated Anonymity Verification of the ThreeBallot Voting System.

Aktoudianakis, E, Crampton, J, Schneider, S, Treharne, H and Waller, A (2013) Policy templates for relationship-based access control.

Heather, J, Culnane, C, Schneider, S, Srinivasan, S and Xia, Z (2013) Solving the Discrete Logarithm Problem for Packing Candidate Preferences.

Burton, C, Culnane, C, Heather, JA, Peacock, T, Ryan, PYA, Schneider, SA, Srinivasan, S, Teague, V, Wen, R and Xia, Z (2012) Using Pret a Voter in Victorian State elections In: 2012 Electronic Voting Technology/Workshop on Electronic Voting, 2012-08-06 - 2012-08-07.

Burton, C, Culnane, C, Heather, J, Peacock, T, Ryan, P, Schneider, S, Srinivasan, S, Teague, V, Wen, R and Xia, Z (2012) A Supervised Verifiable Voting Protocol for the Victorian Electoral Commission In: EVOTE 2012, 2012-07-11 - 2012-07-14, Lochau/Bregenz, Austria.

Moller, F, Nguyen, HN, Roggenbach, M, Schneider, S and Treharne, H (2012) Defining and Model Checking Abstractions of Complex Railway Models Using CSP||B.

Abdelhalim, I, Schneider, S and Treharne, H (2012) An Optimization Approach for Effective Formalized fUML Model Checking.

Schneider, SA, Srinivasan, S, Culnane, C, Heather, JA and Xia, Z (2012) Prêt à Voter with Write-Ins In: VoteID 2011: Third International Conference, 2011-09-28 - 2011-09-29, Tallinn, Estonia.

Moran, M, Heather, JA and Schneider, SA (2011) Anonymity and CSP for Voting Systems In: CryptoForma 2011, 2011-06-21 - ?, Limerick.

Schneider, S, Treharne, H and Wehrheim, H (2011) A CSP Account of Event-B Refinement In: Refine 2011, 2011-06-20 - 2011-06-20, Limerick, Ireland.

Demirel, D, Henning, M, Ryan, PYA, Schneider, S and Volkamer, M (2011) Feasibility Analysis of Prêt à Voter for German Federal Elections.

Schneider, S, Llewellyn, M, Culnane, C, Heather, J, Srinivasan, S and Xia, Z (2011) Focus group views on Prêt à Voter 1.0

Abdelhalim, I, Schneider, S and Treharne, H (2011) Towards a practical approach to check UML/fUML models consistency using CSP In: 13th International Conference on Formal Engineering Methods, ICFEM 2011, 2011-10-26 - 2011-10-28, Durham, UK.

Abdel Halim, I, Sharp, J, Schneider, S and Treharne, H (2010) Formal Verification of Tokeneer Behaviours Modelled in fUML Using CSP In: 12th International Conference on Formal Engineering Methods, 2010-11-17 - 2010-11-19, Shanghai, China.

Xia, Z, Culnane, C, Heather, JA, Jonker, H, Ryan, PYA, Schneider, SA and Srinivasan, S (2010) Versatile Pret a Voter: Handling Multiple Election Methods with a Unified Interface In: Indocrypt, 2010-12-12 - 2010-12-15, Hyderabad, India.

Bismark, D, Heather, JA, Peel, RMA, Schneider, SA, Xia, Z and Ryan, PYA (2009) Experiences Gained from the first Prêt à Voter Implementation In: First International Workshop on Requirements Engineering for e-Voting Systems (RE-VOTE), 2009, 2010-08-31 - 2010-08-31, Atlanta, GA.

Schneider, S and Treharne, H (2009) Changing System Interfaces Consistently: A New Refinement Strategy for CSP||B In: 7th International Conference on Integrated Formal Methods, 2009-02-16 - 2009-02-19, Dusseldorf, GERMANY.

Vajar, B, Schneider, S and Treharne, H (2009) Mobile CSP||B. In: Automated Verification of Critical Systems, ? - ?.

Xia, Z, Schneider, SA, Heather, JA and Traoré, J (2008) Analysis, improvement and simplification of the Prêt à Voter with Paillier encryption

Treharne, H, Turner, E, Schneider, S and Evans, N (2008) Object Modelling in the SystemB Industrial Project In: 1st International Conference of Abstract State Machines, B and Z, 2008-09-16 - 2008-09-18, London, ENGLAND.

Xia, Z, Schneider, SA, Heather, J and Traoré, J (2008) Analysis, Improvement, and Simplification of Prêt à Voter with Paillier Encryption. In: USENIX/ACCURATE Electronic Voting Workshop, 2008-07-28 - 2008-07-29, San Jose, USA.

Turner, E, Treharne, H, Schneider, S and Evans, N (2008) Automatic generation of CSP || B skeletons from xUML models In: ICTAC 2008: 5th International Colloquium, 2008-09-01 - 2008-09-03, Istanbul, Turkey.

Turner, E, Treharne, H, Schneider, S and Evans, N (2008) Automatic generation of CSP||B skeletons from xUML models In: 5th International Colloquium on Theoretical Aspects of Computing (ICTAC 2008), 2008-09-01 - 2008-09-03, Sabanci Univ, Istanbul, TURKEY.

Schneider, S, Treharne, H, McEwan, A and Ifill, W (2008) Experiments in Translating CSP||B to Handel-C In: Communicating Process Architectures 2008 - WoTUG-31, 2008-09-07 - 2008-09-10, York, UK.

Karkinsky, D, Schneider, S and Treharne, H (2007) Combining mobility with state In: 6th International Conference on Integrated Formal Methods, 2007-07-02 - 2007-07-05, Oxford, ENGLAND.

Ifill, W, Schneider, S and Treharne, H (2007) Augmenting B with control annotations In: 7th International Conference of B Users, 2007-01-17 - 2007-01-19, Univ Franche Comte, Besancon, FRANCE.

Xia, Z, Schneider, SA, Heather, J, Ryan, PYA, Lundin, D and Howard, P (2007) Pret a Voter: All-in-one In: WOTE: Workshop on Trustworthy Elections, 2007-06-20 - 2007-06-22, Ottawa, Canada.

Xia, Z, Schneider, SA, Heather, JA, Ryan, PYA, Lundin, D, Peel, RMA and Howard, PJ (2007) Prêt à Voter: All-in-one In: IAVoSS Workshop On Trustworthy Elections (WOTE 2007), 2007-06-20 - 2007-06-21, Ottawa, Canada.

Foulle, S, Schneider, S, Traoré, J and Xia, Z (2007) Threat analysis of a practical voting scheme with receipts In: First International Conference VOTE-ID 2007, 2007-10-04 - 2007-10-05, Bochum, Germany.

Schneider, S, Cavalcanti, A, Treharne, H and Woodcock, J (2006) A layered behavioural model of platelets In: 11th IEEE International Conference on Engineering of Complex Computer Systems, 2006-08-15 - 2006-08-17, Stanford, CA.

McEwan, AA and Schneider, S (2006) A verified development of hardware using CSP||B In: 4th ACM/IEEE International Conference on Formal Methods and Models for Co-Design, 2006-07-27 - 2006-07-30, Napa Valley, CA.

Lundin, D, Treharne, HE, Ryan, PYA, Schneider, SA and Heather, JA (2006) Distributed Creation of the Ballot Form in Prêt à Voter using an element of Visual Encryption In: IAVoSS Workshop On Trustworthy Elections (WOTE 2006), 2006-06-28 - ?.

Ryan, PYA, Schneider, SA, Gollmann, D, Meier, J and Sabelfeld, A (2006) Pret a Voter with Re-encryption Mixes In: 11th European Symposium on Research in Computer Security, 2006-09-18 - 2006-09-20, Hamburg, GERMANY.

Treharne, H, Schneider, S, Grant, N, Evans, N and Ifill, W (2006) A Step towards Merging xUML and CSP||B In: Seminar on Rigorous Methods for Software Construction and Analysis, 2006-05-07 - 2006-05-12, Schloss Dagstuhl, GERMANY.

Heather, J and Schneider, S (2006) To infinity and beyond or, avoiding the infinite in security protocol analysis

Delicata, Rob and Schneider, Steve A. (2005) Temporal rank functions for forward secrecy In: 18th IEEE Workshop on Computer Security Foundations, 2005, 20-22 Jun 2005, Aix-en-Provence, France.

Shaikh, SA, Bush, VJ and Schneider, SA (2005) Specifying authentication using signal events in CSP In: 1st SKLOIS Conference on Information Security and Cryptology, 2005-12-15 - 2005-12-17, Beijing, PEOPLES R CHINA.

Schneider, S, Treharne, H and Evans, N (2005) Chunks: Component verification in CSP||B In: 5th International Conference on Integrated Formal Methods, 2005-11-29 - 2005-12-02, Eindhoven, Netherlands.

Chaum, D, Ryan, PYA and Schneider, SA (2005) A Practical Voter-Verifiable Election Scheme. In: European Symposium on Research in Computer Security, 2005-09-12 - 2005-09-14, Milan, Italy.

Delicata, Robert and Schneider, Steve (2004) Towards the Rank Function Verification of protocols that use Temporary Secrets

Schneider, Steve A. and Treharne, Helen (2004) Verifying controlled components

Schneider, S and Treharne, H (2004) Verifying Controlled Components. In: 4th International Conference on Integrated Formal Methods, 2004 - ?.

Schneider, SA and Delicata, R (2004) Verifying Security Protocols: An Application of CSP. In: Communicating Sequential Processes: The First 25 Years, Symposium on the Occasion of 25 Years of CSP, 2004-07-07 - 2004-07-08, London.

Schneider, Steve A (2002) Verifying authentication protocol implementations In: 5th International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOODS 2002), 20 - 22 March 2002, Enschede, The Netherlands.

Heather, J and Schneider, S (2002) Equal To The Task? In: European Symposium on Research on Computer Security.

Schneider, S (2001) May Testing, Non-interference, and Compositionality. In: The First Irish Conference on the Mathematical Foundations of Computer Science and Information Technology (MFCSIT2000), 2000-07-20 - 2000-07-21, Cork, ireland.

Schneider, S (2001) Process Algebra and Security. In: 12th International Conference on Concurrency Theory, 2001 - ?.

Evans, N and Schneider, S (2000) Analysing Time Dependent Security Properties in CSP Using PVS. In: European Symposium on Research in Computer Security, 2000-10-04 - 2000-10-06, Toulouse, France.

Treharne, H and Schneider, S (2000) How to Drive a B Machine. In: ZB 2000: Formal Specification and Development in Z and B, First International Conference of B and Z Users, 2000-08-29 - 2000-09-02, York, UK.

Schneider, S (1999) Abstraction and Testing.

Adekunle, CB and Schneider, S (1999) Detecting Feature Interactions in the Terrestrial Trunked Radio (TETRA) Network Using Promela and Xspin. In: Theoretical and Practical Aspects of SPIN Model Checking, 5th and 6th International SPIN Workshops, ? - ?.

Ryan, PYA and Schneider, SA (1999) Process Algebra and Non-Interference. In: IEEE Computer Security Foundations Workshop, 1999-06-28 - 1999-06-30, Mordano, Italy.

Treharne, H and Schneider, S (1999) Using a Process Algebra to Control B Operations. In: 1st International Conference on Integrated Formal Methods, ? - ?.

Treharne, Helen, Draper, J. and Schneider, Steve A. (1998) Test case preparation using a prototype

Schneider, S (1998) Formal Analysis of a Non-Repudiation Protocol. In: IEEE Computer Security Foundations Workshop, 1998-06-09 - 1998-06-11, Rockport, MA, USA.

Treharne, H, Draper, J and Schneider, S (1998) Test Case Preparation Using a Prototype. In: B’98: Recent Advances in the Development and Use of the B Method, 1998 - ?.

Dutertre, B and Schneider, S (1997) Using a PVS Embedding of CSP to Verify Authentication Protocols. In: 10th International Conference on Theorem Proving in Higher Order Logics, 1997-08-19 - 1997-08-22, Murray Hill, NJ, USA.

Schneider, S (1997) Verifying authentication protocols with CSP. In: IEEE Computer Security Foundations Workshop, 1997-06-10 - 1997-06-12, Rockport, MA , USA.

Schneider, S and Sidiropoulos, A (1996) CSP and Anonymity. In: European Symposium on Research in Computer Security, 1996-09-25 - 1996-09-27, Rome, Italy.

Davies, J, Bryans, J and Schneider, S (1995) Real-time LOTOS and Timed Observations. In: 8th International Conference on Formal Description Techniques, ? - ?.

Bryans, J, Davies, J and Schneider, S (1995) Towards a denotational semantics for ET-LOTOS. In: 6th International Conference in Concurrency Theory, ? - ?.

Schneider, S (1993) Rigorous Specification of Real-Time Systems. In: Algebraic Methodology and Software Technology, ? - ?.

Schneider, S (1993) Timewise Refinement for Communicating Processes. In: Mathematical Foundations of Programming Semantics, 1993-04-07 - 1993-04-10.

Davies, J, Jackson, D and Schneider, S (1992) Broadcast Communication for Real-time Processes. In: Formal Techniques in Real-Time and Fault-Tolerant Systems, ? - ?.

Davies, J and Schneider, S (1992) Using CSP to Verify a Timed Protocol over a Fair Medium. In: 3rd International Conference on Concurrency Theory, ? - ?.

Schneider, S, Davies, J, Jackson, DM, Reed, GM, Reed, JN and Roscoe, AW (1991) Timed CSP: Theory and Practice. In: Real-time: Theory in Practice, ? - ?.

Davies, J and Schneider, S (1989) Factorizing Proofs in Timed CSP. In: Mathematical Foundations of Programming Semantics, ? - ?.

Culnane, C, Bismark, D, Heather, JA, Schneider, SA, Srinivasan, S and Xia, Z Authentication Codes In: EVT/WOTE 2011, 2011-08-08 - 2011-08-09, San Francisco, USA.

Bryans, J and Schneider, SA CSP, PVS and a recursive authentication protocol In: DIMACS Workshop on Design and Formal Verification of Security Protocols, 1997-09-03 - ?, Rutgers University.

Schneider, SA and Heather, JA A Formal Framework for Modelling Coercion Resistance and Receipt Freeness In: FM 2012: 18th International Symposium on Formal Methods, 2012-08-27 - 2012-08-31.

Schneider, SA, Treharne, H and Vajar, B Introducing mobility into CSP||B In: 7th International Workshop on Automated Verification of Critical Systems, 2007-09-10 - 2007-09-12, Oxford, UK.

Vajar, B, Schneider, S and Treharne, H Mobile CSP||B In: 9th International Workshop on Automated Verification of Critical Systems, 2009-09-23 - 2009-09-25.

Xia, Z and Schneider, S A New Receipt-Free E-Voting Scheme Based on Blind Signature In: WOTE: Workshop on Trustworthy Elections, 2006-06-29 - 2006-06-30, Cambridge, UK.

Lundin, D, Treharne, HE, Ryan, PYA, Schneider, SA, Heather, JA and Xia, Z Tear and Destroy: Chain voting and destruction problems shared by Prêt à Voter and Punchscan and a solution using Visual Encryption In: IAVoSS Workshop on Frontiers in Electronic Elections (FEE 2006), 2006-09-19 - 2006-09-19, Hamburg, Germany.

Dutertre, B and Schneider, SA Using a PVS embedding of CSP to verify authentication protocols In: 10th International Theorem Proving in Higher Order Logic Conference, 1997 - ?.

Xia, Z, Culnane, C, Heather, J, Jonker, H, Ryan, P, Schneider, S and Srinivasan, S Versatile Pret a Voter: Handling multiple election methods with a unified interface In: IndoCrypt 2010, 2010-12-12 - 2010-12-15, Hyderabad, India.

Roscoe, AW, Reed, GM and Schneider, SA CSP and Timewise Refinement In: BCS-FACS Refinement Workshop, 1991 - ?, Cambridge.

Lundin, D, Treharne, H, Ryan, PYA, Schneider, S and Heather, J Distributed creation of the ballot form in Pret a Voter using an element of Visual Encryption In: WOTE: Workshop on Trustworthy Elections, 2006 - ?, Cambridge, UK.

Schneider, SA Formal Methods at Royal Holloway: perspectives and pitfalls In: Teaching Formal Methods, 2003 - ?, Oxford.

Schneider, SA Teaching B at Royal Holloway, In: Second International B Conference, Education session, 1998 - ?, Montpellier, France.

Book

Schneider, S (2001) The B-Method: an Introduction Cornerstones of Computing . Palgrave. ISBN 033379284X

Ryan, P, Schneider, S, Goldsmith, M, Lowe, G and Roscoe, B (2001) Modelling and Analysis of Security Protocols Addison-Wesley. ISBN 0201674718

Schneider, S (2000) Concurrent and real-time systems: the CSP approach Wiley. ISBN 0-471-62373-3

Dataset

Schneider, SA (2015) vVote evaluation survey [Dataset]

Other

Schneider, Steve A., Treharne, Helen and Wehrheim, Heike (2011) Bounded Retransmission in Event-B||CSP: A Case Study Department of Computing, University of Surrey. (Unpublished)

This list was generated on Tue Nov 21 02:59:57 2017 UTC.

Information about this web site

© The University of Surrey, Guildford, Surrey, GU2 7XH, United Kingdom.
+44 (0)1483 300800