Items where Author is "Schneider, Steve A."
|Up a level|
Delicata, Rob and Schneider, Steve A. (2005) Temporal rank functions for forward secrecy 18th IEEE Workshop on Computer Security Foundations, 2005. pp. 126-139.
Gong, Li, Guttman, Joshua, Ryan, Peter and Schneider, Steve A. (2003) Guest Editorial - Overview the <i>IEEE Journal on Selected Areas in Communications</i>, Issue on Design and Analysis Techniques for Security Assurance, 21. pp. 1-4.
Ryan, P. Y. and Schneider, Steve A. (2001) Process algebra and non-interference Journal of Computer Security, 9. pp. 75-103.
Schneider, Steve A. (1998) Verifying authentication protocols in CSP IEEE Transactions on Software Engineering, 24. pp. 741-758.
Schneider, Steve A. (1998) Formal analysis of a non-repudiation protocol Proceedings of the 11th IEEE Computer Security Foundations Workshop. pp. 9-11.
Schneider, Steve A. (1996) Security properties and CSP Proceedings of the 1996 IEEE Symposium on Security and Privacy. pp. 174-187.
Heather, James and Schneider, Steve A. (2011) A formal framework for modelling coercion resistance and receipt freeness Technical Report. Department of Computing, University of Surrey.
Conference or Workshop Item
Schneider, Steve A. and Treharne, Helen (2004) Verifying controlled components
Treharne, Helen, Draper, J. and Schneider, Steve A. (1998) Test case preparation using a prototype
Schneider, Steve A., Treharne, Helen and Wehrheim, Heike (2011) Bounded Retransmission in Event-B||CSP: A Case Study Department of Computing, University of Surrey. (Unpublished)