University of Surrey

Test tubes in the lab Research in the ATI Dance Research

Items where Author is "Schneider, S"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | No Grouping
Number of items: 53.

Article

Schneider, S, Treharne, H, Wehrheim, H and Williams, D (2014) Managing LTL properties in Event-B refinement Lecture Notes in Computer Science. 221 - 237.

Moran, M, Heather, J and Schneider, S (2014) Verifying anonymity in voting systems using CSP FORMAL ASPECTS OF COMPUTING, 26 (1). 63 - 98. ISSN 0934-5043

Alshehri, A and Schneider, S (2014) Formal security analysis and improvement of a hash-based NFC M-coupon protocol Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8419 L. 152 - 167. ISSN 0302-9743

Heather, J, Schneider, S and Teague, V (2013) Cryptographic protocols with everyday objects Formal Aspects of Computing. 1 - 26. ISSN 0934-5043

Moller, F, Nguyen, HN, Roggenbach, M, Schneider, S and Treharne, H (2013) Defining and model checking abstractions of complex railway models using CSP||B Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7857 L. 193 - 208. ISSN 0302-9743

James, P, Trumble, M, Treharne, H, Roggenbach, M and Schneider, S (2013) OnTrack: An Open Tooling Environment for Railway Verification. NASA Formal Methods, 7871. 435 - 440.

Peacock, T, Ryan, PYA, Schneider, S and Xia, Z (2013) Verifiable Voting Systems Computer and Information Security Handbook. 1103 - 1125.

Schneider, S and Treharne, H (2011) Changing system interfaces consistently: A new refinement strategy for CSP||B Science of Computer Programming, 76 (10). 837 - 860. ISSN 0167-6423

Delicata, R and Schneider, S (2007) An algebraic approach to the verification of a class of Diffie-Hellman protocols INT J INF SECUR, 6 (2-3). 183 - 196. ISSN 1615-5262

Schneider, S, Hoang, TS, Robinson, K and Treharne, H (2006) Tank monitoring: a pAMN case study Formal Aspects of Computing, 18 (3). 308 - 328. ISSN 0934-5043

Schneider, S and Treharne, H (2005) CSP theorems for communicating B machines FORMAL ASPECTS OF COMPUTING, 17 (4). 390 - 422. ISSN 0934-5043

Heather, J and Schneider, S (2005) A decision procedure for the existence of a rank function Journal of Computer Security, 13 (2). 317 - 344. ISSN 0926-227X

Heather, J and Schneider, S (2005) A decision procedure for the existence of a rank function Journal of Computer Security, 13 (2). 317 - 344. ISSN 0926-227X

Heather, J and Schneider, S (2005) A decision procedure for the existence of a rank function. Journal of Computer Security, 13 (2). 317 - 344. ISSN 0926-227X

Treharne, H, Schneider, S and Bramble, M (2003) Composing Specifications Using Communication. Lecture Notes in Computer Science, 2651. 58 - 78.

Heather, J, Lowe, G and Schneider, S (2003) How to Prevent Type Flaw Attacks on Security Protocols. Journal of Computer Security, 11 (2). 217 - 244. ISSN 0926-227X

Heather, J, Lowe, G and Schneider, S (2003) How to prevent type flaw attacks on security protocols Journal of Computer Security, 11 (2). 217 - 244. ISSN 0926-227X

Heather, J, Lowe, G and Schneider, S (2003) How to prevent type flaw attacks on security protocols Journal of Computer Security, 11 (2). 217 - 244. ISSN 0926-227X

Schneider, S and Treharne, H (2002) Communicating B Machines. Lecture Notes in Computer Science, 2272. 416 - 435.

Heather, J and Schneider, S (2000) Towards Automatic Verification of Authentication Protocols on an Unbounded Network. CSFW'00. 132 - 143.

Schneider, S (1997) Timewise Refinement for Communicating Processes. Science of Computer Programming, 28 (1). 43 - 90.

Book Section

Delicata, R and Schneider, S (2006) A formal approach for reasoning about a class of Diffle-Hellman protocols In: UNSPECIFIED UNSPECIFIED, 34 - 46.

Conference or Workshop Item

Moran, M, Heather, J and Schneider, S (2013) Automated Anonymity Verification of the ThreeBallot Voting System.

Burton, C, Culnane, C, Heather, J, Peacock, T, Ryan, P, Schneider, S, Srinivasan, S, Teague, V, Wen, R and Xia, Z (2012) A Supervised Verifiable Voting Protocol for the Victorian Electoral Commission In: EVOTE 2012, 2012-07-11 - 2012-07-14, Lochau/Bregenz, Austria.

Abdelhalim, I, Schneider, S and Treharne, H (2012) An Optimization Approach for Effective Formalized fUML Model Checking.

Schneider, S, Treharne, H and Wehrheim, H (2011) A CSP Account of Event-B Refinement In: Refine 2011, 2011-06-20 - 2011-06-20, Limerick, Ireland.

Demirel, D, Henning, M, Ryan, PYA, Schneider, S and Volkamer, M (2011) Feasibility Analysis of Prêt à Voter for German Federal Elections.

Schneider, S, Llewellyn, M, Culnane, C, Heather, J, Srinivasan, S and Xia, Z (2011) Focus group views on Prêt à Voter 1.0

Abdelhalim, I, Schneider, S and Treharne, H (2011) Towards a practical approach to check UML/fUML models consistency using CSP In: 13th International Conference on Formal Engineering Methods, ICFEM 2011, 2011-10-26 - 2011-10-28, Durham, UK.

Abdel Halim, I, Sharp, J, Schneider, S and Treharne, H (2010) Formal Verification of Tokeneer Behaviours Modelled in fUML Using CSP In: 12th International Conference on Formal Engineering Methods, 2010-11-17 - 2010-11-19, Shanghai, China.

Schneider, S and Treharne, H (2009) Changing System Interfaces Consistently: A New Refinement Strategy for CSP||B In: 7th International Conference on Integrated Formal Methods, 2009-02-16 - 2009-02-19, Dusseldorf, GERMANY.

Turner, E, Treharne, H, Schneider, S and Evans, N (2008) Automatic generation of CSP||B skeletons from xUML models In: 5th International Colloquium on Theoretical Aspects of Computing (ICTAC 2008), 2008-09-01 - 2008-09-03, Sabanci Univ, Istanbul, TURKEY.

Schneider, S, Treharne, H, McEwan, A and Ifill, W (2008) Experiments in Translating CSP||B to Handel-C In: Communicating Process Architectures 2008 - WoTUG-31, 2008-09-07 - 2008-09-10, York, UK.

Ifill, W, Schneider, S and Treharne, H (2007) Augmenting B with control annotations In: 7th International Conference of B Users, 2007-01-17 - 2007-01-19, Univ Franche Comte, Besancon, FRANCE.

Foulle, S, Schneider, S, Traoré, J and Xia, Z (2007) Threat analysis of a practical voting scheme with receipts In: First International Conference VOTE-ID 2007, 2007-10-04 - 2007-10-05, Bochum, Germany.

Schneider, S, Cavalcanti, A, Treharne, H and Woodcock, J (2006) A layered behavioural model of platelets In: 11th IEEE International Conference on Engineering of Complex Computer Systems, 2006-08-15 - 2006-08-17, Stanford, CA.

McEwan, AA and Schneider, S (2006) A verified development of hardware using CSP||B In: 4th ACM/IEEE International Conference on Formal Methods and Models for Co-Design, 2006-07-27 - 2006-07-30, Napa Valley, CA.

Schneider, S, Treharne, H and Evans, N (2005) Chunks: Component verification in CSP||B In: 5th International Conference on Integrated Formal Methods, 2005-11-29 - 2005-12-02, Eindhoven, Netherlands.

Schneider, S and Treharne, H (2004) Verifying Controlled Components. In: 4th International Conference on Integrated Formal Methods, 2004 - ?.

Heather, J and Schneider, S (2002) Equal To The Task? In: European Symposium on Research on Computer Security.

Schneider, S (2001) May Testing, Non-interference, and Compositionality. In: The First Irish Conference on the Mathematical Foundations of Computer Science and Information Technology (MFCSIT2000), 2000-07-20 - 2000-07-21, Cork, ireland.

Evans, N and Schneider, S (2000) Analysing Time Dependent Security Properties in CSP Using PVS. In: European Symposium on Research in Computer Security, 2000-10-04 - 2000-10-06, Toulouse, France.

Treharne, H and Schneider, S (2000) How to Drive a B Machine. In: ZB 2000: Formal Specification and Development in Z and B, First International Conference of B and Z Users, 2000-08-29 - 2000-09-02, York, UK.

Schneider, S (1999) Abstraction and Testing.

Schneider, S (1998) Formal Analysis of a Non-Repudiation Protocol. In: IEEE Computer Security Foundations Workshop, 1998-06-09 - 1998-06-11, Rockport, MA, USA.

Treharne, H, Draper, J and Schneider, S (1998) Test Case Preparation Using a Prototype. In: B’98: Recent Advances in the Development and Use of the B Method, 1998 - ?.

Dutertre, B and Schneider, S (1997) Using a PVS Embedding of CSP to Verify Authentication Protocols. In: 10th International Conference on Theorem Proving in Higher Order Logics, 1997-08-19 - 1997-08-22, Murray Hill, NJ, USA.

Schneider, S (1997) Verifying authentication protocols with CSP. In: IEEE Computer Security Foundations Workshop, 1997-06-10 - 1997-06-12, Rockport, MA , USA.

Schneider, S and Sidiropoulos, A (1996) CSP and Anonymity. In: European Symposium on Research in Computer Security, 1996-09-25 - 1996-09-27, Rome, Italy.

Schneider, S (1993) Timewise Refinement for Communicating Processes. In: Mathematical Foundations of Programming Semantics, 1993-04-07 - 1993-04-10.

Vajar, B, Schneider, S and Treharne, H Mobile CSP||B In: 9th International Workshop on Automated Verification of Critical Systems, 2009-09-23 - 2009-09-25.

Xia, Z and Schneider, S A New Receipt-Free E-Voting Scheme Based on Blind Signature In: WOTE: Workshop on Trustworthy Elections, 2006-06-29 - 2006-06-30, Cambridge, UK.

Xia, Z, Culnane, C, Heather, J, Jonker, H, Ryan, P, Schneider, S and Srinivasan, S Versatile Pret a Voter: Handling multiple election methods with a unified interface In: IndoCrypt 2010, 2010-12-12 - 2010-12-15, Hyderabad, India.

This list was generated on Thu Nov 20 15:40:38 2014 GMT.

Information about this web site

© The University of Surrey, Guildford, Surrey, GU2 7XH, United Kingdom.
+44 (0)1483 300800