University of Surrey

Test tubes in the lab Research in the ATI Dance Research

Items where Author is "Schneider, Steve A."

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | No Grouping
Number of items: 10.


Delicata, Rob and Schneider, Steve A. (2005) Temporal rank functions for forward secrecy 18th IEEE Workshop on Computer Security Foundations, 2005. pp. 126-139.

Gong, Li, Guttman, Joshua, Ryan, Peter and Schneider, Steve A. (2003) Guest Editorial - Overview the <i>IEEE Journal on Selected Areas in Communications</i>, Issue on Design and Analysis Techniques for Security Assurance, 21. pp. 1-4.

Ryan, P. Y. and Schneider, Steve A. (2001) Process algebra and non-interference Journal of Computer Security, 9. pp. 75-103.

Schneider, Steve A. (1998) Verifying authentication protocols in CSP IEEE Transactions on Software Engineering, 24. pp. 741-758.

Schneider, Steve A. (1998) Formal analysis of a non-repudiation protocol Proceedings of the 11th IEEE Computer Security Foundations Workshop. pp. 9-11.

Schneider, Steve A. (1996) Security properties and CSP Proceedings of the 1996 IEEE Symposium on Security and Privacy. pp. 174-187.


Heather, James and Schneider, Steve A. (2011) A formal framework for modelling coercion resistance and receipt freeness Technical Report. Department of Computing, University of Surrey.

Conference or Workshop Item

Schneider, Steve A. and Treharne, Helen (2004) Verifying controlled components

Treharne, Helen, Draper, J. and Schneider, Steve A. (1998) Test case preparation using a prototype


Schneider, Steve A., Treharne, Helen and Wehrheim, Heike (2011) Bounded Retransmission in Event-B||CSP: A Case Study Department of Computing, University of Surrey. (Unpublished)

This list was generated on Thu Nov 20 15:46:44 2014 GMT.

Information about this web site

© The University of Surrey, Guildford, Surrey, GU2 7XH, United Kingdom.
+44 (0)1483 300800