Items where Author is "Schneider, Steve A."
|Up a level|
Delicata, Rob and Schneider, Steve A. (2005) Temporal rank functions for forward secrecy 18th IEEE Workshop on Computer Security Foundations, 2005 . pp. 126-139.
Gong, Li, Guttman, Joshua, Ryan, Peter and Schneider, Steve A. (2003) Guest Editorial - Overview the <i>IEEE Journal on Selected Areas in Communications</i>, Issue on Design and Analysis Techniques for Security Assurance, 21 . pp. 1-4.
Ryan, P. Y. and Schneider, Steve A. (2001) Process algebra and non-interference Journal of Computer Security, 9 . pp. 75-103.
Schneider, Steve A. (1998) Verifying authentication protocols in CSP IEEE Transactions on Software Engineering, 24 . pp. 741-758.
Schneider, Steve A. (1998) Formal analysis of a non-repudiation protocol Proceedings of the 11th IEEE Computer Security Foundations Workshop . pp. 9-11.
Schneider, Steve A. (1996) Security properties and CSP Proceedings of the 1996 IEEE Symposium on Security and Privacy . pp. 174-187.
Conference or Workshop Item
Schneider, Steve A. and Treharne, Helen (2004) Verifying controlled components
Treharne, Helen, Draper, J. and Schneider, Steve A. (1998) Test case preparation using a prototype
Heather, James and Schneider, Steve A. (2011) A formal framework for modelling coercion resistance and receipt freeness Technical Report. Department of Computing, University of Surrey.
Schneider, Steve A., Treharne, Helen and Wehrheim, Heike (2011) Bounded Retransmission in Event-B||CSP: A Case Study Department of Computing, University of Surrey. (Unpublished)