Items where Author is "Schneider, Steve A."
|Up a level|
Heather, James and Schneider, Steve A. (2011) A formal framework for modelling coercion resistance and receipt freeness Technical Report. Department of Computing, University of Surrey.
Schneider, Steve A., Treharne, Helen and Wehrheim, Heike (2011) Bounded Retransmission in Event-B||CSP: A Case Study Department of Computing, University of Surrey. (Unpublished)
Delicata, Rob and Schneider, Steve A. (2005) Temporal rank functions for forward secrecy 18th IEEE Workshop on Computer Security Foundations, 2005. pp. 126-139.
Schneider, Steve A. and Treharne, Helen (2004) Verifying controlled components
Gong, Li, Guttman, Joshua, Ryan, Peter and Schneider, Steve A. (2003) Guest Editorial - Overview the <i>IEEE Journal on Selected Areas in Communications</i>, Issue on Design and Analysis Techniques for Security Assurance, 21. pp. 1-4.
Ryan, P. Y. and Schneider, Steve A. (2001) Process algebra and non-interference Journal of Computer Security, 9. pp. 75-103.
Schneider, Steve A. (1998) Verifying authentication protocols in CSP IEEE Transactions on Software Engineering, 24. pp. 741-758.
Schneider, Steve A. (1998) Formal analysis of a non-repudiation protocol Proceedings of the 11th IEEE Computer Security Foundations Workshop. pp. 9-11.
Treharne, Helen, Draper, J. and Schneider, Steve A. (1998) Test case preparation using a prototype
Schneider, Steve A. (1996) Security properties and CSP Proceedings of the 1996 IEEE Symposium on Security and Privacy. pp. 174-187.