Följ
Steve Schneider
Steve Schneider
Director of Computer Science Research Centre; Professor of Computing, University of Surrey
Verifierad e-postadress på surrey.ac.uk - Startsida
Titel
Citeras av
Citeras av
År
Concurrent and real-time systems: the CSP approach
S Schneider
John Wiley & Sons, 1999
8501999
The modelling and analysis of security protocols: the CSP approach
P Ryan, S Schneider, M Goldsmith, G Lowe, B Roscoe
Addison-Wesley Professional, 2001
7962001
A practical voter-verifiable election scheme
D Chaum, PYA Ryan, S Schneider
Computer Security–ESORICS 2005: 10th European Symposium on Research in …, 2005
5172005
Verifying authentication protocols in CSP
S Schneider
IEEE Transactions on software engineering 24 (9), 741-758, 1998
4301998
The B-method: An introduction
S Schneider
Palgrave, 2001
3762001
Security properties and CSP
S Schneider
Proceedings 1996 IEEE Symposium on Security and Privacy, 174-187, 1996
3601996
Process algebra and non-interference
PYA Ryan, SA Schneider
Journal of Computer Security 9 (1-2), 75-103, 2001
3222001
Real-Time Systems: specification, verification, and analysis
A Burns, A Welling, K Ramamritham, J Hooman, S Schneider, Z Liu, ...
prentice Hall, 1996
3181996
How to prevent type flaw attacks on security protocols
J Heather, G Lowe, S Schneider
Journal of computer Security 11 (2), 217-244, 2003
3092003
PrĘt Ā Voter:a Voter-Verifiable Voting System
PYA Ryan, D Bismark, J Heather, S Schneider, Z Xia
IEEE transactions on information forensics and security 4 (4), 662-673, 2009
291*2009
CSP and anonymity
S Schneider, A Sidiropoulos
Computer Security—ESORICS 96: 4th European Symposium on Research in …, 1996
2841996
An operational semantics for timed CSP
S Schneider
Information and computation 116 (2), 193-213, 1995
2731995
A brief history of Timed CSP
J Davies, S Schneider
Theoretical Computer Science 138 (2), 243-271, 1995
2541995
Springer International Publishing: Cham
L Chen, K Hosoda, E Menegatti, M Shimizu, H Wang
Switzerland 11765, 337-345, 2019
2002019
Formal analysis of a non-repudiation protocol
S Schneider
Proceedings. 11th IEEE Computer Security Foundations Workshop (Cat. No …, 1998
1971998
Pręt ā voter with re-encryption mixes
PYA Ryan, SA Schneider
Computer Security–ESORICS 2006: 11th European Symposium on Research in …, 2006
1932006
An attack on a recursive authentication protocol A cautionary tale
PYA Ryan, SA Schneider
Information Processing Letters 65 (1), 7-10, 1998
1481998
CSP theorems for communicating B machines
S Schneider, H Treharne
Formal Aspects of Computing 17 (4), 390-422, 2005
1312005
Timed CSP: Theory and practice
S Schneider, J Davies, DM Jackson, GM Reed, JN Reed, AW Roscoe
Proceedings of the Real-Time: Theory in Practice, REX Workshop, 640-675, 1991
1311991
Using a process algebra to control B operations
H Treharne, S Schneider
IFM’99: Proceedings of the 1st International Conference on Integrated Formal …, 1999
1171999
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20