Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Steve A. Schneider
@inproceedings{DBLP:conf/blocksys/DesaiMSSR23, author = {Nidhi Desai and Damiano Di Francesco Maesa and Nishanth Sastry and Steve Schneider and Laura Ricci}, title = {Preserving Privacy of Vulnerable Users across Heterogeneous Sensitive Sensor Data Streams using Smart Contracts}, booktitle = {Proceedings of the Fifth {ACM} International Workshop on Blockchain-enabled Networked Sensor Systems, BlockSys 2023, Istanbul, Turkiye, 12 November 2023}, pages = {2--8}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3628354.3629532}, doi = {10.1145/3628354.3629532}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/blocksys/DesaiMSSR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/BudykhoBWRLRRS23, author = {Ksenia Budykho and Ioana Boureanu and Stephan Wesemeyer and Daniel Romero and Matt Lewis and Yogaratnam Rahulan and Fortunat Rajaona and Steve Schneider}, title = {Fine-Grained Trackability in Protocol Executions}, booktitle = {30th Annual Network and Distributed System Security Symposium, {NDSS} 2023, San Diego, California, USA, February 27 - March 3, 2023}, publisher = {The Internet Society}, year = {2023}, url = {https://www.ndss-symposium.org/ndss-paper/fine-grained-trackability-in-protocol-executions/}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/BudykhoBWRLRRS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wisec/2023, editor = {Ioana Boureanu and Steve Schneider and Bradley Reaves and Nils Ole Tippenhauer}, title = {Proceedings of the 16th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom, 29 May 2023 - 1 June 2023}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3558482}, doi = {10.1145/3558482}, isbn = {978-1-4503-9859-6}, timestamp = {Mon, 03 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2311-03372, author = {Wojciech Jamroga and Peter Y. A. Ryan and Steve Schneider and Carsten Sch{\"{u}}rmann and Philip B. Stark}, title = {A Declaration of Software Independence}, journal = {CoRR}, volume = {abs/2311.03372}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2311.03372}, doi = {10.48550/ARXIV.2311.03372}, eprinttype = {arXiv}, eprint = {2311.03372}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2311-03372.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fac/KulikDLMSTW22, author = {Tomas Kulik and Brijesh Dongol and Peter Gorm Larsen and Hugo Daniel Macedo and Steve Schneider and Peter W. V. Tran{-}J{\o}rgensen and Jim Woodcock}, title = {A Survey of Practical Formal Methods for Security}, journal = {Formal Aspects Comput.}, volume = {34}, number = {1}, pages = {1--39}, year = {2022}, url = {https://doi.org/10.1145/3522582}, doi = {10.1145/3522582}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fac/KulikDLMSTW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HanCSTW21, author = {Jinguang Han and Liqun Chen and Steve Schneider and Helen Treharne and Stephan Wesemeyer}, title = {Privacy-Preserving Electronic Ticket Scheme with Attribute-Based Credentials}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {4}, pages = {1836--1849}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2019.2940946}, doi = {10.1109/TDSC.2019.2940946}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/HanCSTW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/JamrogaRSSS21, author = {Wojciech Jamroga and Peter Y. A. Ryan and Steve Schneider and Carsten Sch{\"{u}}rmann and Philip B. Stark}, editor = {Daniel Dougherty and Jos{\'{e}} Meseguer and Sebastian Alexander M{\"{o}}dersheim and Paul D. Rowe}, title = {A Declaration of Software Independence}, booktitle = {Protocols, Strands, and Logic - Essays Dedicated to Joshua Guttman on the Occasion of his 66.66th Birthday}, series = {Lecture Notes in Computer Science}, volume = {13066}, pages = {198--217}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-91631-2\_11}, doi = {10.1007/978-3-030-91631-2\_11}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/birthday/JamrogaRSSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2109-01362, author = {Tomas Kulik and Brijesh Dongol and Peter Gorm Larsen and Hugo Daniel Macedo and Steve Schneider and Peter W{\"{u}}rtz Vinther Tran{-}J{\o}rgensen and Jim Woodcock}, title = {A Survey of Practical Formal Methods for Security}, journal = {CoRR}, volume = {abs/2109.01362}, year = {2021}, url = {https://arxiv.org/abs/2109.01362}, eprinttype = {arXiv}, eprint = {2109.01362}, timestamp = {Fri, 17 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2109-01362.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fac/WilliamsDSM20, author = {David M. Williams and Salaheddin Darwish and Steve Schneider and David R. Michael}, title = {Legislation-driven development of a Gift Aid system using Event-B}, journal = {Formal Aspects Comput.}, volume = {32}, number = {2-3}, pages = {251--273}, year = {2020}, url = {https://doi.org/10.1007/s00165-020-00512-5}, doi = {10.1007/S00165-020-00512-5}, timestamp = {Fri, 14 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fac/WilliamsDSM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HanCSTWW20, author = {Jinguang Han and Liqun Chen and Steve A. Schneider and Helen Treharne and Stephan Wesemeyer and Nick Wilson}, title = {Anonymous Single Sign-On With Proxy Re-Verification}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {223--236}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2919926}, doi = {10.1109/TIFS.2019.2919926}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HanCSTWW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/accv/GittingsSC20, author = {Thomas Gittings and Steve Schneider and John P. Collomosse}, editor = {Hiroshi Ishikawa and Cheng{-}Lin Liu and Tom{\'{a}}s Pajdla and Jianbo Shi}, title = {Vax-a-Net: Training-Time Defence Against Adversarial Patch Attacks}, booktitle = {Computer Vision - {ACCV} 2020 - 15th Asian Conference on Computer Vision, Kyoto, Japan, November 30 - December 4, 2020, Revised Selected Papers, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {12625}, pages = {235--251}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-69538-5\_15}, doi = {10.1007/978-3-030-69538-5\_15}, timestamp = {Tue, 02 Mar 2021 08:39:09 +0100}, biburl = {https://dblp.org/rec/conf/accv/GittingsSC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/SallalSCDTDRW20, author = {Muntadher Sallal and Steve Schneider and Matthew Casey and Fran{\c{c}}ois Dupressoir and Helen Treharne and Constantin Catalin Dragan and Luke Riley and Phil Wright}, title = {Augmenting an Internet Voting System with Selene Verifiability using Permissioned Distributed Ledger}, booktitle = {40th {IEEE} International Conference on Distributed Computing Systems, {ICDCS} 2020, Singapore, November 29 - December 1, 2020}, pages = {1167--1168}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICDCS47774.2020.00124}, doi = {10.1109/ICDCS47774.2020.00124}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/SallalSCDTDRW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2020-1, editor = {Liqun Chen and Ninghui Li and Kaitai Liang and Steve A. Schneider}, title = {Computer Security - {ESORICS} 2020 - 25th European Symposium on Research in Computer Security, {ESORICS} 2020, Guildford, UK, September 14-18, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12308}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-58951-6}, doi = {10.1007/978-3-030-58951-6}, isbn = {978-3-030-58950-9}, timestamp = {Fri, 02 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/2020-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2020-2, editor = {Liqun Chen and Ninghui Li and Kaitai Liang and Steve A. Schneider}, title = {Computer Security - {ESORICS} 2020 - 25th European Symposium on Research in Computer Security, {ESORICS} 2020, Guildford, UK, September 14-18, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12309}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-59013-0}, doi = {10.1007/978-3-030-59013-0}, isbn = {978-3-030-59012-3}, timestamp = {Fri, 02 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/2020-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2009-08194, author = {Thomas Gittings and Steve A. Schneider and John P. Collomosse}, title = {Vax-a-Net: Training-time Defence Against Adversarial Patch Attacks}, journal = {CoRR}, volume = {abs/2009.08194}, year = {2020}, url = {https://arxiv.org/abs/2009.08194}, eprinttype = {arXiv}, eprint = {2009.08194}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2009-08194.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bmvc/GittingsSC19, author = {Thomas Gittings and Steve A. Schneider and John P. Collomosse}, title = {Robust Synthesis of Adversarial Visual Examples Using a Deep Image Prior}, booktitle = {30th British Machine Vision Conference 2019, {BMVC} 2019, Cardiff, UK, September 9-12, 2019}, pages = {283}, publisher = {{BMVA} Press}, year = {2019}, url = {https://bmvc2019.org/wp-content/uploads/papers/0165-paper.pdf}, timestamp = {Wed, 03 Feb 2021 08:35:59 +0100}, biburl = {https://dblp.org/rec/conf/bmvc/GittingsSC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/WhitefieldCSSTW19, author = {Jorden Whitefield and Liqun Chen and Ralf Sasse and Steve A. Schneider and Helen Treharne and Stephan Wesemeyer}, title = {A Symbolic Analysis of ECC-Based Direct Anonymous Attestation}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2019, Stockholm, Sweden, June 17-19, 2019}, pages = {127--141}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/EuroSP.2019.00019}, doi = {10.1109/EUROSP.2019.00019}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurosp/WhitefieldCSSTW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2019-1, editor = {Kazue Sako and Steve A. Schneider and Peter Y. A. Ryan}, title = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11735}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-29959-0}, doi = {10.1007/978-3-030-29959-0}, isbn = {978-3-030-29958-3}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/2019-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2019-2, editor = {Kazue Sako and Steve A. Schneider and Peter Y. A. Ryan}, title = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11736}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-29962-0}, doi = {10.1007/978-3-030-29962-0}, isbn = {978-3-030-29961-3}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/2019-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1907-01996, author = {Thomas Gittings and Steve A. Schneider and John P. Collomosse}, title = {Robust Synthesis of Adversarial Visual Examples Using a Deep Image Prior}, journal = {CoRR}, volume = {abs/1907.01996}, year = {2019}, url = {http://arxiv.org/abs/1907.01996}, eprinttype = {arXiv}, eprint = {1907.01996}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1907-01996.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1912-00288, author = {Muntadher Sallal and Steve A. Schneider and Matthew Casey and Constantin Catalin Dragan and Fran{\c{c}}ois Dupressoir and Luke Riley and Helen Treharne and Joe Wadsworth and Phil Wright}, title = {{VMV:} Augmenting an Internet Voting System with Selene Verifiability}, journal = {CoRR}, volume = {abs/1912.00288}, year = {2019}, url = {http://arxiv.org/abs/1912.00288}, eprinttype = {arXiv}, eprint = {1912.00288}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1912-00288.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/HanCSTW18, author = {Jinguang Han and Liqun Chen and Steve A. Schneider and Helen Treharne and Stephan Wesemeyer}, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {Anonymous Single-Sign-On for n Designated Services with Traceability}, booktitle = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11098}, pages = {470--490}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99073-6\_23}, doi = {10.1007/978-3-319-99073-6\_23}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/HanCSTW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/isw/2018, editor = {Liqun Chen and Mark Manulis and Steve A. Schneider}, title = {Information Security - 21st International Conference, {ISC} 2018, Guildford, UK, September 9-12, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11060}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99136-8}, doi = {10.1007/978-3-319-99136-8}, isbn = {978-3-319-99135-1}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1804-07201, author = {Jinguang Han and Liqun Chen and Steve A. Schneider and Helen Treharne and Stephan Wesemeyer}, title = {Anonymous Single-Sign-On for n designated services with traceability}, journal = {CoRR}, volume = {abs/1804.07201}, year = {2018}, url = {http://arxiv.org/abs/1804.07201}, eprinttype = {arXiv}, eprint = {1804.07201}, timestamp = {Tue, 06 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1804-07201.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1811-07642, author = {Jinguang Han and Liqun Chen and Steve A. Schneider and Helen Treharne and Stephan Wesemeyer and Nick Wilson}, title = {Anonymous Single Sign-on with Proxy Re-Verification}, journal = {CoRR}, volume = {abs/1811.07642}, year = {2018}, url = {http://arxiv.org/abs/1811.07642}, eprinttype = {arXiv}, eprint = {1811.07642}, timestamp = {Tue, 06 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1811-07642.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/BenalohRST17, author = {Josh Benaloh and Peter Y. A. Ryan and Steve A. Schneider and Vanessa Teague}, title = {A Vote of Confidence?}, journal = {{IEEE} Secur. Priv.}, volume = {15}, number = {3}, pages = {12--13}, year = {2017}, url = {https://doi.org/10.1109/MSP.2017.53}, doi = {10.1109/MSP.2017.53}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/BenalohRST17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/WhitefieldCKPST17, author = {Jorden Whitefield and Liqun Chen and Frank Kargl and Andrew Paverd and Steve A. Schneider and Helen Treharne and Stephan Wesemeyer}, editor = {Giovanni Livraga and Chris J. Mitchell}, title = {Formal Analysis of {V2X} Revocation Protocols}, booktitle = {Security and Trust Management - 13th International Workshop, {STM} 2017, Oslo, Norway, September 14-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10547}, pages = {147--163}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68063-7\_10}, doi = {10.1007/978-3-319-68063-7\_10}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/WhitefieldCKPST17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vnc/WhitefieldCGST17, author = {Jorden Whitefield and Liqun Chen and Thanassis Giannetsos and Steve A. Schneider and Helen Treharne}, title = {Privacy-enhanced capabilities for VANETs using direct anonymous attestation}, booktitle = {2017 {IEEE} Vehicular Networking Conference, {VNC} 2017, Torino, Italy, November 27-29, 2017}, pages = {123--130}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/VNC.2017.8275615}, doi = {10.1109/VNC.2017.8275615}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vnc/WhitefieldCGST17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ifm/2017, editor = {Nadia Polikarpova and Steve A. Schneider}, title = {Integrated Formal Methods - 13th International Conference, {IFM} 2017, Turin, Italy, September 20-22, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10510}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66845-1}, doi = {10.1007/978-3-319-66845-1}, isbn = {978-3-319-66844-4}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifm/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/WhitefieldCKPST17, author = {Jorden Whitefield and Liqun Chen and Frank Kargl and Andrew Paverd and Steve A. Schneider and Helen Treharne and Stephan Wesemeyer}, title = {Formal Analysis of {V2X} Revocation Protocols}, journal = {CoRR}, volume = {abs/1704.07216}, year = {2017}, url = {http://arxiv.org/abs/1704.07216}, eprinttype = {arXiv}, eprint = {1704.07216}, timestamp = {Tue, 06 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/WhitefieldCKPST17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/HanCST17, author = {Jinguang Han and Liqun Chen and Steve A. Schneider and Helen Treharne}, title = {{PPETS-FGP:} Privacy-Preserving Electronic Ticket Scheme with Fine-Grained Pricing}, journal = {CoRR}, volume = {abs/1706.03016}, year = {2017}, url = {http://arxiv.org/abs/1706.03016}, eprinttype = {arXiv}, eprint = {1706.03016}, timestamp = {Tue, 06 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/HanCST17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fac/HoangSTW16, author = {Thai Son Hoang and Steve A. Schneider and Helen Treharne and David M. Williams}, title = {Foundations for using linear temporal logic in Event-B refinement}, journal = {Formal Aspects Comput.}, volume = {28}, number = {6}, pages = {909--935}, year = {2016}, url = {https://doi.org/10.1007/s00165-016-0376-0}, doi = {10.1007/S00165-016-0376-0}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fac/HoangSTW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/BurtonCS16, author = {Craig Burton and Chris Culnane and Steve A. Schneider}, title = {vVote: Verifiable Electronic Voting in Practice}, journal = {{IEEE} Secur. Priv.}, volume = {14}, number = {4}, pages = {64--73}, year = {2016}, url = {https://doi.org/10.1109/MSP.2016.69}, doi = {10.1109/MSP.2016.69}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/BurtonCS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sosym/MoranHS16, author = {Murat Moran and James Heather and Steve A. Schneider}, title = {Automated anonymity verification of the ThreeBallot and {VAV} voting systems}, journal = {Softw. Syst. Model.}, volume = {15}, number = {4}, pages = {1049--1062}, year = {2016}, url = {https://doi.org/10.1007/s10270-014-0445-x}, doi = {10.1007/S10270-014-0445-X}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sosym/MoranHS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/crc/p/SchneiderTW16, author = {Steve A. Schneider and Helen Treharne and David M. Williams}, editor = {Luigia Petre and Emil Sekerinski}, title = {Event-B and Linear Temporal Logic}, booktitle = {From Action Systems to Distributed Systems - The Refinement Approach}, pages = {113--123}, publisher = {Chapman and Hall/CRC}, year = {2016}, url = {https://doi.org/10.1201/b20053-12}, doi = {10.1201/B20053-12}, timestamp = {Tue, 16 May 2017 14:01:47 +0200}, biburl = {https://dblp.org/rec/books/crc/p/SchneiderTW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acns/2016, editor = {Mark Manulis and Ahmad{-}Reza Sadeghi and Steve A. Schneider}, title = {Applied Cryptography and Network Security - 14th International Conference, {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9696}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-39555-5}, doi = {10.1007/978-3-319-39555-5}, isbn = {978-3-319-39554-8}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/RyanST15, author = {Peter Y. A. Ryan and Steve A. Schneider and Vanessa Teague}, title = {End-to-End Verifiability in Voting Systems, from Theory to Practice}, journal = {{IEEE} Secur. Priv.}, volume = {13}, number = {3}, pages = {59--62}, year = {2015}, url = {https://doi.org/10.1109/MSP.2015.54}, doi = {10.1109/MSP.2015.54}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/RyanST15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/AlshehriS15, author = {Abdullah Ali Alshehri and Steve A. Schneider}, title = {A formal framework for security analysis of {NFC} mobile coupon protocols}, journal = {J. Comput. Secur.}, volume = {23}, number = {6}, pages = {685--707}, year = {2015}, url = {https://doi.org/10.3233/JCS-150531}, doi = {10.3233/JCS-150531}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/AlshehriS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scp/SchneiderT15, author = {Steve A. Schneider and Helen Treharne}, title = {Special issue on Automated Verification of Critical Systems (AVoCS 2013)}, journal = {Sci. Comput. Program.}, volume = {111}, pages = {213}, year = {2015}, url = {https://doi.org/10.1016/j.scico.2015.08.006}, doi = {10.1016/J.SCICO.2015.08.006}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scp/SchneiderT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/CulnaneRST15, author = {Chris Culnane and Peter Y. A. Ryan and Steve A. Schneider and Vanessa Teague}, title = {vVote: {A} Verifiable Voting System}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {18}, number = {1}, pages = {3:1--3:30}, year = {2015}, url = {https://doi.org/10.1145/2746338}, doi = {10.1145/2746338}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/CulnaneRST15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/BurtonCS15, author = {Craig Burton and Chris Culnane and Steve A. Schneider}, title = {Secure and Verifiable Electronic Voting in Practice: the use of vVote in the Victorian State Election}, journal = {CoRR}, volume = {abs/1504.07098}, year = {2015}, url = {http://arxiv.org/abs/1504.07098}, eprinttype = {arXiv}, eprint = {1504.07098}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/BurtonCS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fac/BoitenS14, author = {Eerke A. Boiten and Steve A. Schneider}, title = {Editorial}, journal = {Formal Aspects Comput.}, volume = {26}, number = {1}, pages = {1--2}, year = {2014}, url = {https://doi.org/10.1007/s00165-013-0290-7}, doi = {10.1007/S00165-013-0290-7}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fac/BoitenS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fac/HeatherST14, author = {James Heather and Steve A. Schneider and Vanessa Teague}, title = {Cryptographic protocols with everyday objects}, journal = {Formal Aspects Comput.}, volume = {26}, number = {1}, pages = {37--62}, year = {2014}, url = {https://doi.org/10.1007/s00165-013-0274-7}, doi = {10.1007/S00165-013-0274-7}, timestamp = {Mon, 09 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fac/HeatherST14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fac/MoranHS14, author = {Murat Moran and James Heather and Steve A. Schneider}, title = {Verifying anonymity in voting systems using {CSP}}, journal = {Formal Aspects Comput.}, volume = {26}, number = {1}, pages = {63--98}, year = {2014}, url = {https://doi.org/10.1007/s00165-012-0268-x}, doi = {10.1007/S00165-012-0268-X}, timestamp = {Mon, 09 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fac/MoranHS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fac/SchneiderTW14, author = {Steve A. Schneider and Helen Treharne and Heike Wehrheim}, title = {The behavioural semantics of Event-B refinement}, journal = {Formal Aspects Comput.}, volume = {26}, number = {2}, pages = {251--280}, year = {2014}, url = {https://doi.org/10.1007/s00165-012-0265-0}, doi = {10.1007/S00165-012-0265-0}, timestamp = {Mon, 09 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fac/SchneiderTW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SchneiderTCH14, author = {Steve A. Schneider and Vanessa Teague and Chris Culnane and James Heather}, title = {Special Section on Vote-ID 2013}, journal = {J. Inf. Secur. Appl.}, volume = {19}, number = {2}, pages = {103--104}, year = {2014}, url = {https://doi.org/10.1016/j.jisa.2014.06.002}, doi = {10.1016/J.JISA.2014.06.002}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/SchneiderTCH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scp/JamesMNRST14, author = {Phillip James and Faron Moller and Hoang Nga Nguyen and Markus Roggenbach and Steve A. Schneider and Helen Treharne}, title = {On modelling and verifying railway interlockings: Tracking train lengths}, journal = {Sci. Comput. Program.}, volume = {96}, pages = {315--336}, year = {2014}, url = {https://doi.org/10.1016/j.scico.2014.04.005}, doi = {10.1016/J.SCICO.2014.04.005}, timestamp = {Wed, 19 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scp/JamesMNRST14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sttt/JamesMNRST14, author = {Phillip James and Faron Moller and Nguyen Hoang Nga and Markus Roggenbach and Steve A. Schneider and Helen Treharne}, title = {Techniques for modelling and verifying railway interlockings}, journal = {Int. J. Softw. Tools Technol. Transf.}, volume = {16}, number = {6}, pages = {685--711}, year = {2014}, url = {https://doi.org/10.1007/s10009-014-0304-7}, doi = {10.1007/S10009-014-0304-7}, timestamp = {Wed, 19 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sttt/JamesMNRST14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/CulnaneS14, author = {Chris Culnane and Steve A. Schneider}, title = {A Peered Bulletin Board for Robust Use in Verifiable Voting Systems}, booktitle = {{IEEE} 27th Computer Security Foundations Symposium, {CSF} 2014, Vienna, Austria, 19-22 July, 2014}, pages = {169--183}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CSF.2014.20}, doi = {10.1109/CSF.2014.20}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/CulnaneS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifm/SchneiderTWW14, author = {Steve A. Schneider and Helen Treharne and Heike Wehrheim and David M. Williams}, editor = {Elvira Albert and Emil Sekerinski}, title = {Managing {LTL} Properties in Event-B Refinement}, booktitle = {Integrated Formal Methods - 11th International Conference, {IFM} 2014, Bertinoro, Italy, September 9-11, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8739}, pages = {221--237}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10181-1\_14}, doi = {10.1007/978-3-319-10181-1\_14}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifm/SchneiderTWW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/SrinivasanCHSX14, author = {Sriramkrishnan Srinivasan and Chris Culnane and James Heather and Steve A. Schneider and Zhe Xia}, editor = {Man Ho Au and Barbara Carminati and C.{-}C. Jay Kuo}, title = {Countering Ballot Stuffing and Incorporating Eligibility Verifiability in Helios}, booktitle = {Network and System Security - 8th International Conference, {NSS} 2014, Xi'an, China, October 15-17, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8792}, pages = {335--348}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11698-3\_26}, doi = {10.1007/978-3-319-11698-3\_26}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nss/SrinivasanCHSX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secsr/StathakidisSH14, author = {Efstathios Stathakidis and Steve A. Schneider and James Heather}, editor = {Liqun Chen and Chris J. Mitchell}, title = {Robustness Modelling and Verification of a Mix Net Protocol}, booktitle = {Security Standardisation Research - First International Conference, {SSR} 2014, London, UK, December 16-17, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8893}, pages = {131--150}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-14054-4\_9}, doi = {10.1007/978-3-319-14054-4\_9}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secsr/StathakidisSH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/CulnaneHJRST14, author = {Chris Culnane and James Heather and Rui Joaquim and Peter Y. A. Ryan and Steve A. Schneider and Vanessa Teague}, title = {Faster Print on Demand for Pr{\^{e}}t {\`{a}} Voter}, booktitle = {2014 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections, {EVT/WOTE} '14, San Diego, CA, USA, August 18-19, 2014}, publisher = {{USENIX} Association}, year = {2014}, url = {https://www.usenix.org/conference/evtwote14/workshop-program/presentation/culnane}, timestamp = {Mon, 01 Feb 2021 08:42:52 +0100}, biburl = {https://dblp.org/rec/conf/uss/CulnaneHJRST14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/CulnaneS14, author = {Chris Culnane and Steve A. Schneider}, title = {A Peered Bulletin Board for Robust Use in Verifiable Voting Systems}, journal = {CoRR}, volume = {abs/1401.4151}, year = {2014}, url = {http://arxiv.org/abs/1401.4151}, eprinttype = {arXiv}, eprint = {1401.4151}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/CulnaneS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/CulnaneRST14, author = {Chris Culnane and Peter Y. A. Ryan and Steve A. Schneider and Vanessa Teague}, title = {vVote: a Verifiable Voting System {(DRAFT)}}, journal = {CoRR}, volume = {abs/1404.6822}, year = {2014}, url = {http://arxiv.org/abs/1404.6822}, eprinttype = {arXiv}, eprint = {1404.6822}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/CulnaneRST14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/SchneiderTWW14, author = {Steve A. Schneider and Helen Treharne and Heike Wehrheim and David M. Williams}, title = {Managing {LTL} properties in Event-B refinement}, journal = {CoRR}, volume = {abs/1406.6622}, year = {2014}, url = {http://arxiv.org/abs/1406.6622}, eprinttype = {arXiv}, eprint = {1406.6622}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/SchneiderTWW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sttt/AbdelhalimST13, author = {Islam Abdelhalim and Steve A. Schneider and Helen Treharne}, title = {An integrated framework for checking the behaviour of fUML models using {CSP}}, journal = {Int. J. Softw. Tools Technol. Transf.}, volume = {15}, number = {4}, pages = {375--396}, year = {2013}, url = {https://doi.org/10.1007/s10009-012-0243-0}, doi = {10.1007/S10009-012-0243-0}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sttt/AbdelhalimST13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/HeatherCSSX13, author = {James Heather and Chris Culnane and Steve A. Schneider and Sriramkrishnan Srinivasan and Zhe Xia}, editor = {Alfredo Cuzzocrea and Christian Kittl and Dimitris E. Simos and Edgar R. Weippl and Lida Xu}, title = {Solving the Discrete Logarithm Problem for Packing Candidate Preferences}, booktitle = {Security Engineering and Intelligence Informatics - {CD-ARES} 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8128}, pages = {209--221}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40588-4\_15}, doi = {10.1007/978-3-642-40588-4\_15}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/HeatherCSSX13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/AlshehriS13, author = {Abdullah Ali Alshehri and Steve A. Schneider}, editor = {Aur{\'{e}}lien Francillon and Pankaj Rohatgi}, title = {Formal Security Analysis and Improvement of a Hash-Based {NFC} M-Coupon Protocol}, booktitle = {Smart Card Research and Advanced Applications - 12th International Conference, {CARDIS} 2013, Berlin, Germany, November 27-29, 2013. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8419}, pages = {152--167}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-08302-5\_11}, doi = {10.1007/978-3-319-08302-5\_11}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cardis/AlshehriS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gil/Schneider13, author = {Steve A. Schneider}, editor = {Michael Clasen and Kurt Christian Kersebaum and Andreas Meyer{-}Aurich and Brigitte Theuvsen}, title = {Fuzzy-Systeme zur Unterst{\"{u}}tzung von Entscheidungen in land- und forstwirtschaftlichen Logistik-Prozessen}, booktitle = {Massendatenmanagement in der Agrar- und Ern{\"{a}}hrungswirtschaft, Erhebung - Verarbeitung - Nutzung, Referate der 33. GIL-Jahrestagung, 20. - 21. Februar 2013, Potsdam, Germany}, series = {{LNI}}, volume = {{P-211}}, pages = {307--310}, publisher = {{GI}}, year = {2013}, url = {https://dl.gi.de/handle/20.500.12116/17639}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gil/Schneider13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AlshehriS13, author = {Abdullah Ali Alshehri and Steve A. Schneider}, title = {Formally defining {NFC} M-coupon requirements, with a case study}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {52--58}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750161}, doi = {10.1109/ICITST.2013.6750161}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AlshehriS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifm/MoranHS13, author = {Murat Moran and James Heather and Steve A. Schneider}, editor = {Einar Broch Johnsen and Luigia Petre}, title = {Automated Anonymity Verification of the ThreeBallot Voting System}, booktitle = {Integrated Formal Methods, 10th International Conference, {IFM} 2013, Turku, Finland, June 10-14, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7940}, pages = {94--108}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38613-8\_7}, doi = {10.1007/978-3-642-38613-8\_7}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifm/MoranHS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nfm/JamesTTRS13, author = {Phillip James and Matthew Trumble and Helen Treharne and Markus Roggenbach and Steve A. Schneider}, editor = {Guillaume Brat and Neha Rungta and Arnaud Venet}, title = {OnTrack: An Open Tooling Environment for Railway Verification}, booktitle = {{NASA} Formal Methods, 5th International Symposium, {NFM} 2013, Moffett Field, CA, USA, May 14-16, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7871}, pages = {435--440}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38088-4\_30}, doi = {10.1007/978-3-642-38088-4\_30}, timestamp = {Wed, 19 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nfm/JamesTTRS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/AktoudianakisCSTW13, author = {Evangelos Aktoudianakis and Jason Crampton and Steve A. Schneider and Helen Treharne and Adrian Waller}, editor = {Jordi Castell{\`{a}}{-}Roca and Josep Domingo{-}Ferrer and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Ali A. Ghorbani and Christian Damsgaard Jensen and Jes{\'{u}}s A. Manj{\'{o}}n and Iosif{-}Viorel Onut and Natalia Stakhanova and Vicen{\c{c}} Torra and Jie Zhang}, title = {Policy templates for relationship-based access control}, booktitle = {Eleventh Annual International Conference on Privacy, Security and Trust, {PST} 2013, 10-12 July, 2013, Tarragona, Catalonia, Spain, July 10-12, 2013}, pages = {221--228}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/PST.2013.6596057}, doi = {10.1109/PST.2013.6596057}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/AktoudianakisCSTW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sefm/JamesMNRSTTW13, author = {Phillip James and Faron Moller and Hoang Nga Nguyen and Markus Roggenbach and Steve A. Schneider and Helen Treharne and Matthew Trumble and David M. Williams}, editor = {Steve Counsell and Manuel N{\'{u}}{\~{n}}ez}, title = {Verification of Scheme Plans Using {CSP} {\textdollar}{\textdollar}{\(\vert\)}{\(\vert\)}{\textdollar}{\textdollar} {\(\vert\)} {\(\vert\)} {B}}, booktitle = {Software Engineering and Formal Methods - {SEFM} 2013 Collocated Workshops: BEAT2, WS-FMDS, FM-RAIL-Bok, MoKMaSD, and OpenCert, Madrid, Spain, September 23-24, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8368}, pages = {189--204}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-05032-4\_15}, doi = {10.1007/978-3-319-05032-4\_15}, timestamp = {Wed, 19 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sefm/JamesMNRSTTW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/LlewellynSXCHRS13, author = {Morgan Llewellyn and Steve A. Schneider and Zhe Xia and Chris Culnane and James Heather and Peter Y. A. Ryan and Sriramkrishnan Srinivasan}, title = {Testing Voters' Understanding of a Security Mechanism Used in Verifiable Voting}, booktitle = {2013 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, {EVT/WOTE} '13, Washington, D.C., USA, August 12-13, 2013}, publisher = {{USENIX} Association}, year = {2013}, url = {https://www.usenix.org/conference/evtwote13/workshop-program/presentation/llewellyn}, timestamp = {Mon, 01 Feb 2021 08:42:58 +0100}, biburl = {https://dblp.org/rec/conf/uss/LlewellynSXCHRS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/voteid/2013, editor = {James Heather and Steve A. Schneider and Vanessa Teague}, title = {E-Voting and Identify - 4th International Conference, VoteID 2013, Guildford, UK, July 17-19, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7985}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39185-9}, doi = {10.1007/978-3-642-39185-9}, isbn = {978-3-642-39184-2}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/voteid/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eceasst/RoggenbachMSTN12, author = {Markus Roggenbach and Faron Moller and Steve A. Schneider and Helen Treharne and Hoang Nga Nguyen}, title = {Railway modelling in CSP{\(\vert\)}{\(\vert\)}B: the double junction case study}, journal = {Electron. Commun. Eur. Assoc. Softw. Sci. Technol.}, volume = {53}, year = {2012}, url = {https://doi.org/10.14279/tuj.eceasst.53.791}, doi = {10.14279/TUJ.ECEASST.53.791}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eceasst/RoggenbachMSTN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ev/BurtonCHPRSSTWX12, author = {Craig Burton and Chris Culnane and James Heather and Thea Peacock and Peter Y. A. Ryan and Steve A. Schneider and Sriramkrishnan Srinivasan and Vanessa Teague and Roland Wen and Zhe Xia}, editor = {Manuel J. Kripp and Melanie Volkamer and R{\"{u}}diger Grimm}, title = {A Supervised Verifiable Voting Protocol for the Victorian Electoral Commission}, booktitle = {5th International Conference on Electronic Voting 2012, {(EVOTE} 2012), Co-organized by the Council of Europe, Gesellschaft f{\"{u}}r Informatik and E-Voting.CC, July 11-14, 2012, Castle Hofen, Bregenz, Austria}, series = {{LNI}}, volume = {{P-205}}, pages = {81--94}, publisher = {{GI}}, year = {2012}, url = {https://dl.gi.de/handle/20.500.12116/18227}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ev/BurtonCHPRSSTWX12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fm/HeatherS12, author = {James Heather and Steve A. Schneider}, editor = {Dimitra Giannakopoulou and Dominique M{\'{e}}ry}, title = {A Formal Framework for Modelling Coercion Resistance and Receipt Freeness}, booktitle = {{FM} 2012: Formal Methods - 18th International Symposium, Paris, France, August 27-31, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7436}, pages = {217--231}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32759-9\_19}, doi = {10.1007/978-3-642-32759-9\_19}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fm/HeatherS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hvc/MollerNRST12, author = {Faron Moller and Hoang Nga Nguyen and Markus Roggenbach and Steve A. Schneider and Helen Treharne}, editor = {Armin Biere and Amir Nahir and Tanja E. J. Vos}, title = {Defining and Model Checking Abstractions of Complex Railway Models Using CSP{\(\vert\)}{\(\vert\)}B}, booktitle = {Hardware and Software: Verification and Testing - 8th International Haifa Verification Conference, {HVC} 2012, Haifa, Israel, November 6-8, 2012. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7857}, pages = {193--208}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-39611-3\_20}, doi = {10.1007/978-3-642-39611-3\_20}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hvc/MollerNRST12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sefm/AbdelhalimST12, author = {Islam Abdelhalim and Steve A. Schneider and Helen Treharne}, editor = {George Eleftherakis and Mike Hinchey and Mike Holcombe}, title = {An Optimization Approach for Effective Formalized fUML Model Checking}, booktitle = {Software Engineering and Formal Methods - 10th International Conference, {SEFM} 2012, Thessaloniki, Greece, October 1-5, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7504}, pages = {248--262}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33826-7\_17}, doi = {10.1007/978-3-642-33826-7\_17}, timestamp = {Sat, 05 Sep 2020 18:01:22 +0200}, biburl = {https://dblp.org/rec/conf/sefm/AbdelhalimST12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/BurtonCHPRSTWXS12, author = {Craig Burton and Chris Culnane and James Heather and Thea Peacock and Peter Y. A. Ryan and Steve A. Schneider and Vanessa Teague and Roland Wen and Zhe Xia and Sriramkrishnan Srinivasan}, editor = {J. Alex Halderman and Olivier Pereira}, title = {Using Pr{\^{e}}t {\`{a}} Voter in Victoria State Elections}, booktitle = {2012 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, {EVT/WOTE} '12, Bellevue, WA, USA, August 6-7, 2012}, publisher = {{USENIX} Association}, year = {2012}, url = {https://www.usenix.org/conference/evtwote12/workshop-program/presentation/burton}, timestamp = {Mon, 01 Feb 2021 08:43:08 +0100}, biburl = {https://dblp.org/rec/conf/uss/BurtonCHPRSTWXS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scp/SchneiderT11, author = {Steve A. Schneider and Helen Treharne}, title = {Changing system interfaces consistently: {A} new refinement strategy for CSP{\(\vert\)}{\(\vert\)}B}, journal = {Sci. Comput. Program.}, volume = {76}, number = {10}, pages = {837--860}, year = {2011}, url = {https://doi.org/10.1016/j.scico.2010.08.001}, doi = {10.1016/J.SCICO.2010.08.001}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scp/SchneiderT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icfem/AbdelhalimST11, author = {Islam Abdelhalim and Steve A. Schneider and Helen Treharne}, editor = {Shengchao Qin and Zongyan Qiu}, title = {Towards a Practical Approach to Check UML/fUML Models Consistency Using {CSP}}, booktitle = {Formal Methods and Software Engineering - 13th International Conference on Formal Engineering Methods, {ICFEM} 2011, Durham, UK, October 26-28, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6991}, pages = {33--48}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24559-6\_5}, doi = {10.1007/978-3-642-24559-6\_5}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icfem/AbdelhalimST11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/re/SchneiderLCHSX11, author = {Steve A. Schneider and Morgan Llewellyn and Chris Culnane and James Heather and Sriramkrishnan Srinivasan and Zhe Xia}, title = {Focus group views on Pr{\^{e}}t {\`{a}} Voter 1.0}, booktitle = {2011 International Workshop on Requirements Engineering for Electronic Voting Systems, {REVOTE} 2011, Trento, Italy, August 29, 2011}, pages = {56--65}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/REVOTE.2011.6045916}, doi = {10.1109/REVOTE.2011.6045916}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/re/SchneiderLCHSX11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/CulnaneBHSSX11, author = {Chris Culnane and David Bismark and James Heather and Steve A. Schneider and Sriramkrishnan Srinivasan and Zhe Xia}, editor = {Hovav Shacham and Vanessa Teague}, title = {Authentication Codes}, booktitle = {2011 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, {EVT/WOTE} '11, San Francisco, CA, USA, August 8-9, 2011}, publisher = {{USENIX} Association}, year = {2011}, url = {https://www.usenix.org/conference/evtwote-11/authentication-codes}, timestamp = {Mon, 01 Feb 2021 08:42:50 +0100}, biburl = {https://dblp.org/rec/conf/uss/CulnaneBHSSX11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/voteid/DemirelHRSV11, author = {Denise Demirel and Maria Henning and Peter Y. A. Ryan and Steve A. Schneider and Melanie Volkamer}, editor = {Aggelos Kiayias and Helger Lipmaa}, title = {Feasibility Analysis of Pr{\^{e}}t {\`{a}} Voter for German Federal Elections}, booktitle = {E-Voting and Identity - Third International Conference, VoteID 2011, Tallinn, Estonia, September 28-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7187}, pages = {158--173}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-32747-6\_10}, doi = {10.1007/978-3-642-32747-6\_10}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/voteid/DemirelHRSV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/voteid/SchneiderSCHX11, author = {Steve A. Schneider and Sriramkrishnan Srinivasan and Chris Culnane and James Heather and Zhe Xia}, editor = {Aggelos Kiayias and Helger Lipmaa}, title = {Pr{\^{e}}t {\'{a}} Voter with Write-Ins}, booktitle = {E-Voting and Identity - Third International Conference, VoteID 2011, Tallinn, Estonia, September 28-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7187}, pages = {174--189}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-32747-6\_11}, doi = {10.1007/978-3-642-32747-6\_11}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/voteid/SchneiderSCHX11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/corr/abs-1106-4098, author = {Steve A. Schneider and Helen Treharne and Heike Wehrheim}, editor = {John Derrick and Eerke A. Boiten and Steve Reeves}, title = {A {CSP} Account of Event-B Refinement}, booktitle = {Proceedings 15th International Refinement Workshop, Refine@FM 2011, Limerick, Ireland, 20th June 2011}, series = {{EPTCS}}, volume = {55}, pages = {139--154}, year = {2011}, url = {https://doi.org/10.4204/EPTCS.55.9}, doi = {10.4204/EPTCS.55.9}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1106-4098.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/SchneiderTW11, author = {Steve A. Schneider and Helen Treharne and Heike Wehrheim}, editor = {Marie{-}Laure Potet and Helen Treharne}, title = {Bounded Retransmission in Event-B{\(\parallel\)}CSP: a Case Study}, booktitle = {Proceedings of the {B} 2011 Workshop, a satellite event of the 17th International Symposium on Formal Methods, {FM} 2011, Limerick, Ireland, June 21, 2011}, series = {Electronic Notes in Theoretical Computer Science}, volume = {280}, pages = {69--80}, publisher = {Elsevier}, year = {2011}, url = {https://doi.org/10.1016/j.entcs.2011.11.019}, doi = {10.1016/J.ENTCS.2011.11.019}, timestamp = {Fri, 10 Mar 2023 15:49:46 +0100}, biburl = {https://dblp.org/rec/journals/entcs/SchneiderTW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/ios/11/Schneider11, author = {Steve A. Schneider}, editor = {V{\'{e}}ronique Cortier and Steve Kremer}, title = {Security Analysis using Rank Functions in {CSP}}, booktitle = {Formal Models and Techniques for Analyzing Security Protocols}, series = {Cryptology and Information Security Series}, volume = {5}, pages = {258--276}, publisher = {{IOS} Press}, year = {2011}, url = {https://doi.org/10.3233/978-1-60750-714-7-258}, doi = {10.3233/978-1-60750-714-7-258}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/ios/11/Schneider11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/McEwanS10, author = {Alistair A. McEwan and Steve A. Schneider}, title = {Modelling and analysis of the {AMBA} bus using {CSP} and {B}}, journal = {Concurr. Comput. Pract. Exp.}, volume = {22}, number = {8}, pages = {949--964}, year = {2010}, url = {https://doi.org/10.1002/cpe.1432}, doi = {10.1002/CPE.1432}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/concurrency/McEwanS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/IfillS10, author = {Wilson Ifill and Steve A. Schneider}, title = {A step towards refining and translating {B} control annotations to Handel-C}, journal = {Concurr. Comput. Pract. Exp.}, volume = {22}, number = {8}, pages = {1023--1048}, year = {2010}, url = {https://doi.org/10.1002/cpe.1427}, doi = {10.1002/CPE.1427}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/concurrency/IfillS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icfem/AbdelhalimSST10, author = {Islam Abdelhalim and James Sharp and Steve A. Schneider and Helen Treharne}, editor = {Jin Song Dong and Huibiao Zhu}, title = {Formal Verification of Tokeneer Behaviours Modelled in fUML Using {CSP}}, booktitle = {Formal Methods and Software Engineering - 12th International Conference on Formal Engineering Methods, {ICFEM} 2010, Shanghai, China, November 17-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6447}, pages = {371--387}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16901-4\_25}, doi = {10.1007/978-3-642-16901-4\_25}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icfem/AbdelhalimSST10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifm/SchneiderTW10, author = {Steve A. Schneider and Helen Treharne and Heike Wehrheim}, editor = {Dominique M{\'{e}}ry and Stephan Merz}, title = {A {CSP} Approach to Control in Event-B}, booktitle = {Integrated Formal Methods - 8th International Conference, {IFM} 2010, Nancy, France, October 11-14, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6396}, pages = {260--274}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16265-7\_19}, doi = {10.1007/978-3-642-16265-7\_19}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifm/SchneiderTW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/XiaCHJRSS10, author = {Zhe Xia and Chris Culnane and James Heather and Hugo Jonker and Peter Y. A. Ryan and Steve A. Schneider and Sriramkrishnan Srinivasan}, editor = {Guang Gong and Kishan Chand Gupta}, title = {Versatile Pr{\^{e}}t {\`{a}} Voter: Handling Multiple Election Methods with a Unified Interface}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2010 - 11th International Conference on Cryptology in India, Hyderabad, India, December 12-15, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6498}, pages = {98--114}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17401-8\_8}, doi = {10.1007/978-3-642-17401-8\_8}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/XiaCHJRSS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ShaikhBS09, author = {Siraj A. Shaikh and Vicky J. Bush and Steve A. Schneider}, title = {Specifying authentication using signal events in {CSP}}, journal = {Comput. Secur.}, volume = {28}, number = {5}, pages = {310--324}, year = {2009}, url = {https://doi.org/10.1016/j.cose.2008.10.001}, doi = {10.1016/J.COSE.2008.10.001}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/ShaikhBS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eceasst/VajarST09, author = {Beeta Vajar and Steve A. Schneider and Helen Treharne}, title = {Mobile CSP{\(\vert\)}{\(\vert\)}B}, journal = {Electron. Commun. Eur. Assoc. Softw. Sci. Technol.}, volume = {23}, year = {2009}, url = {https://doi.org/10.14279/tuj.eceasst.23.338}, doi = {10.14279/TUJ.ECEASST.23.338}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eceasst/VajarST09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/RyanBHSX09, author = {Peter Y. A. Ryan and David Bismark and James Heather and Steve A. Schneider and Zhe Xia}, title = {Pr{\^{e}}t {\`{a}} voter: a voter-verifiable voting system}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {4}, pages = {662--673}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2009.2033233}, doi = {10.1109/TIFS.2009.2033233}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/RyanBHSX09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/TreharneSGEI09, author = {Helen Treharne and Steve A. Schneider and Neil Grant and Neil Evans and Wilson Ifill}, editor = {Jean{-}Raymond Abrial and Uwe Gl{\"{a}}sser}, title = {A Step towards Merging xUML and {CSP} {\(\vert\)}{\(\vert\)} \{{\textbackslash}{\(\vert\)} {\textbackslash} \}B}, booktitle = {Rigorous Methods for Software Construction and Analysis, Essays Dedicated to Egon B{\"{o}}rger on the Occasion of His 60th Birthday}, series = {Lecture Notes in Computer Science}, volume = {5115}, pages = {130--146}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-11447-2\_9}, doi = {10.1007/978-3-642-11447-2\_9}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/birthday/TreharneSGEI09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifm/SchneiderT09, author = {Steve A. Schneider and Helen Treharne}, editor = {Michael Leuschel and Heike Wehrheim}, title = {Changing System Interfaces Consistently: {A} New Refinement Strategy for CSP{\(\vert\)}{\(\vert\)}B}, booktitle = {Integrated Formal Methods, 7th International Conference, {IFM} 2009, D{\"{u}}sseldorf, Germany, February 16-19, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5423}, pages = {103--117}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00255-7\_8}, doi = {10.1007/978-3-642-00255-7\_8}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ifm/SchneiderT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/re/BismarkHPSXR09, author = {David Bismark and James Heather and Roger M. A. Peel and Steve A. Schneider and Zhe Xia and Peter Y. A. Ryan}, title = {Experiences Gained from the first Pr{\^{e}}t {\`{a}} Voter Implementation}, booktitle = {First International Workshop on Requirements Engineering for e-Voting Systems, {RE-VOTE} 2009, Atlanta, Georgia, USA, August 31, 2009}, pages = {19--28}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/RE-VOTE.2009.5}, doi = {10.1109/RE-VOTE.2009.5}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/re/BismarkHPSXR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asm/TreharneTSE08, author = {Helen Treharne and Edward Turner and Steve A. Schneider and Neil Evans}, editor = {Egon B{\"{o}}rger and Michael J. Butler and Jonathan P. Bowen and Paul Boca}, title = {Object Modelling in the SystemB Industrial Project}, booktitle = {Abstract State Machines, {B} and Z, First International Conference, {ABZ} 2008, London, UK, September 16-18, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5238}, pages = {359}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-87603-8\_46}, doi = {10.1007/978-3-540-87603-8\_46}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asm/TreharneTSE08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ictac/TurnerTSE08, author = {Edward Turner and Helen Treharne and Steve A. Schneider and Neil Evans}, editor = {John S. Fitzgerald and Anne E. Haxthausen and H{\"{u}}sn{\"{u}} Yenig{\"{u}}n}, title = {Automatic Generation of {CSP} {\(\vert\)}{\(\vert\)} {B} Skeletons from xUML Models}, booktitle = {Theoretical Aspects of Computing - {ICTAC} 2008, 5th International Colloquium, Istanbul, Turkey, September 1-3, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5160}, pages = {364--379}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85762-4\_25}, doi = {10.1007/978-3-540-85762-4\_25}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ictac/TurnerTSE08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/XiaSHT08, author = {Zhe Xia and Steve A. Schneider and James Heather and Jacques Traor{\'{e}}}, editor = {David L. Dill and Tadayoshi Kohno}, title = {Analysis, Improvement, and Simplification of Pr{\^{e}}t {\`{a}} Voter with Paillier Encryption}, booktitle = {2008 {USENIX/ACCURATE} Electronic Voting Workshop, {EVT} 2008, July 28-29, 2008, San Jose, CA, USA, Proceedings}, publisher = {{USENIX} Association}, year = {2008}, url = {http://www.usenix.org/events/evt08/tech/full\_papers/xia/xia.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/XiaSHT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wotug/SchneiderTMI08, author = {Steve A. Schneider and Helen Treharne and Alistair A. McEwan and Wilson Ifill}, editor = {Peter H. Welch and Susan Stepney and Fiona Polack and Fred R. M. Barnes and Alistair A. McEwan and Gardiner S. Stiles and Jan F. Broenink and Adam T. Sampson}, title = {Experiments in Translating {CSP} {\(\vert\)}{\(\vert\)} {B} to Handel-C}, booktitle = {The thirty-first Communicating Process Architectures Conference, {CPA} 2008, organised under the auspices of WoTUG and the Department of Computer Science of the University of York, York, Yorkshire, UK, 7-10 September 2008}, series = {Concurrent Systems Engineering Series}, volume = {66}, pages = {115--133}, publisher = {{IOS} Press}, year = {2008}, url = {https://doi.org/10.3233/978-1-58603-907-3-115}, doi = {10.3233/978-1-58603-907-3-115}, timestamp = {Sun, 18 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wotug/SchneiderTMI08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/DimitrakosMRS07, author = {Theodosis Dimitrakos and Fabio Martinelli and Peter Y. A. Ryan and Steve A. Schneider}, title = {Guest Editors' Preface}, journal = {Int. J. Inf. Sec.}, volume = {6}, number = {2-3}, pages = {65--66}, year = {2007}, url = {https://doi.org/10.1007/s10207-007-0012-3}, doi = {10.1007/S10207-007-0012-3}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/DimitrakosMRS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/DelicataS07, author = {Rob Delicata and Steve A. Schneider}, title = {An algebraic approach to the verification of a class of Diffie-Hellman protocols}, journal = {Int. J. Inf. Sec.}, volume = {6}, number = {2-3}, pages = {183--196}, year = {2007}, url = {https://doi.org/10.1007/s10207-007-0013-2}, doi = {10.1007/S10207-007-0013-2}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/DelicataS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/b/IfillST07, author = {Wilson Ifill and Steve A. Schneider and Helen Treharne}, editor = {Jacques Julliand and Olga Kouchnarenko}, title = {Augmenting {B} with Control Annotations}, booktitle = {B 2007: Formal Specification and Development in B, 7th International Conference of {B} Users, Besan{\c{c}}on, France, January 17-19, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4355}, pages = {34--48}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/11955757\_6}, doi = {10.1007/11955757\_6}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/b/IfillST07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifm/KarkinskyST07, author = {Damien Karkinsky and Steve A. Schneider and Helen Treharne}, editor = {Jim Davies and Jeremy Gibbons}, title = {Combining Mobility with State}, booktitle = {Integrated Formal Methods, 6th International Conference, {IFM} 2007, Oxford, UK, July 2-5, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4591}, pages = {373--392}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73210-5\_20}, doi = {10.1007/978-3-540-73210-5\_20}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/ifm/KarkinskyST07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/voteid/FoulleSTX07, author = {S{\'{e}}bastien Foulle and Steve A. Schneider and Jacques Traor{\'{e}} and Zhe Xia}, editor = {Ammar Alkassar and Melanie Volkamer}, title = {Threat Analysis of a Practical Voting Scheme with Receipts}, booktitle = {E-Voting and Identity, First International Conference, {VOTE-ID} 2007, Bochum, Germany, October 4-5, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4896}, pages = {156--165}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77493-8\_14}, doi = {10.1007/978-3-540-77493-8\_14}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/voteid/FoulleSTX07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wotug/McEwanS07, author = {Alistair A. McEwan and Steve A. Schneider}, editor = {Alistair A. McEwan and Steve A. Schneider and Wilson Ifill and Peter H. Welch}, title = {Modeling and Analysis of the {AMBA} Bus Using {CSP} and {B}}, booktitle = {The 30th Communicating Process Architectures Conference, {CPA} 2007, organised under the auspices of WoTUG and the University of Surrey, Guildford, Surrey, UK, 8-11 July 2007}, series = {Concurrent Systems Engineering Series}, volume = {65}, pages = {379--398}, publisher = {{IOS} Press}, year = {2007}, url = {http://www.booksonline.iospress.nl/Content/View.aspx?piid=5984}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wotug/McEwanS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wotug/IfillS07, author = {Wilson Ifill and Steve A. Schneider}, editor = {Alistair A. McEwan and Steve A. Schneider and Wilson Ifill and Peter H. Welch}, title = {A Step Towards Refining and Translating {B} Control Annotations to Handel-C}, booktitle = {The 30th Communicating Process Architectures Conference, {CPA} 2007, organised under the auspices of WoTUG and the University of Surrey, Guildford, Surrey, UK, 8-11 July 2007}, series = {Concurrent Systems Engineering Series}, volume = {65}, pages = {399--424}, publisher = {{IOS} Press}, year = {2007}, url = {http://www.booksonline.iospress.nl/Content/View.aspx?piid=5985}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wotug/IfillS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ifip1-7/2006, editor = {Theodosis Dimitrakos and Fabio Martinelli and Peter Y. A. Ryan and Steve A. Schneider}, title = {Formal Aspects in Security and Trust, Fourth International Workshop, {FAST} 2006, Hamilton, Ontario, Canada, August 26-27, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4691}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75227-1}, doi = {10.1007/978-3-540-75227-1}, isbn = {978-3-540-75226-4}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wotug/2007, editor = {Alistair A. McEwan and Steve A. Schneider and Wilson Ifill and Peter H. Welch}, title = {The 30th Communicating Process Architectures Conference, {CPA} 2007, organised under the auspices of WoTUG and the University of Surrey, Guildford, Surrey, UK, 8-11 July 2007}, series = {Concurrent Systems Engineering Series}, volume = {65}, publisher = {{IOS} Press}, year = {2007}, url = {http://www.booksonline.iospress.nl/Content/View.aspx?piid=5962}, isbn = {978-1-58603-767-3}, timestamp = {Tue, 03 Mar 2009 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wotug/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fac/SchneiderHRT06, author = {Steve A. Schneider and Thai Son Hoang and Ken Robinson and Helen Treharne}, title = {Tank monitoring: a pAMN case study}, journal = {Formal Aspects Comput.}, volume = {18}, number = {3}, pages = {308--328}, year = {2006}, url = {https://doi.org/10.1007/s00165-006-0004-5}, doi = {10.1007/S00165-006-0004-5}, timestamp = {Mon, 09 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fac/SchneiderHRT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/RyanS06, author = {Peter Y. A. Ryan and Steve A. Schneider}, editor = {Dieter Gollmann and Jan Meier and Andrei Sabelfeld}, title = {Pr{\^{e}}t {\`{a}} Voter with Re-encryption Mixes}, booktitle = {Computer Security - {ESORICS} 2006, 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4189}, pages = {313--326}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11863908\_20}, doi = {10.1007/11863908\_20}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/RyanS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iceccs/SchneiderTCW06, author = {Steve A. Schneider and Helen Treharne and Ana Cavalcanti and Jim Woodcock}, title = {A Layered Behavioural Model of Platelets}, booktitle = {11th International Conference on Engineering of Complex Computer Systems {(ICECCS} 2006), 15-17 August 2006, Stanford, California, {USA}}, pages = {98--106}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.ieeecomputersociety.org/10.1109/ICECCS.2006.80}, doi = {10.1109/ICECCS.2006.80}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iceccs/SchneiderTCW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/memocode/McEwanS06, author = {Alistair A. McEwan and Steve A. Schneider}, title = {A verified development of hardware using CSP{\(\parallel\)}B}, booktitle = {4th {ACM} {\&} {IEEE} International Conference on Formal Methods and Models for Co-Design {(MEMOCODE} 2006), 27-29 July 2006, Embassy Suites, Napa, California, {USA}}, pages = {81}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/MEMCOD.2006.1695904}, doi = {10.1109/MEMCOD.2006.1695904}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/memocode/McEwanS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/HeatherS06, author = {James Heather and Steve A. Schneider}, editor = {Hisham Haddad}, title = {To infinity and beyond or, avoiding the infinite in security protocol analysis}, booktitle = {Proceedings of the 2006 {ACM} Symposium on Applied Computing (SAC), Dijon, France, April 23-27, 2006}, pages = {346--353}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1141277.1141359}, doi = {10.1145/1141277.1141359}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sac/HeatherS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ifip1-7/2005, editor = {Theodosis Dimitrakos and Fabio Martinelli and Peter Y. A. Ryan and Steve A. Schneider}, title = {Formal Aspects in Security and Trust, Third International Workshop, {FAST} 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3866}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11679219}, doi = {10.1007/11679219}, isbn = {3-540-32628-6}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fac/SchneiderT05, author = {Steve A. Schneider and Helen Treharne}, title = {{CSP} theorems for communicating {B} machines}, journal = {Formal Aspects Comput.}, volume = {17}, number = {4}, pages = {390--422}, year = {2005}, url = {https://doi.org/10.1007/s00165-005-0076-7}, doi = {10.1007/S00165-005-0076-7}, timestamp = {Mon, 09 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fac/SchneiderT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/HeatherS05, author = {James Heather and Steve A. Schneider}, title = {A decision procedure for the existence of a rank function}, journal = {J. Comput. Secur.}, volume = {13}, number = {2}, pages = {317--344}, year = {2005}, url = {https://doi.org/10.3233/jcs-2005-13204}, doi = {10.3233/JCS-2005-13204}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/HeatherS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jlp/EvansS05, author = {Neil Evans and Steve A. Schneider}, title = {Verifying security protocols with {PVS:} widening the rank function approach}, journal = {J. Log. Algebraic Methods Program.}, volume = {64}, number = {2}, pages = {253--284}, year = {2005}, url = {https://doi.org/10.1016/j.jlap.2004.09.005}, doi = {10.1016/J.JLAP.2004.09.005}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jlp/EvansS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/polity/JankowskiFKS05, author = {Nicholas W. Jankowski and Kirsten Foot and Randy Kluver and Steve Schneider}, title = {The Web and the 2004 {EP} election: Comparing political actor Web sites in 11 {EU} Member States}, journal = {Inf. Polity}, volume = {10}, number = {3-4}, pages = {165--176}, year = {2005}, url = {https://doi.org/10.3233/ip-2005-0076}, doi = {10.3233/IP-2005-0076}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/polity/JankowskiFKS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/ShaikhBS05, author = {Siraj A. Shaikh and Vicky J. Bush and Steve A. Schneider}, editor = {Dengguo Feng and Dongdai Lin and Moti Yung}, title = {Specifying Authentication Using Signal Events in {CSP}}, booktitle = {Information Security and Cryptology, First {SKLOIS} Conference, {CISC} 2005, Beijing, China, December 15-17, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3822}, pages = {63--74}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11599548\_6}, doi = {10.1007/11599548\_6}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cisc/ShaikhBS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/DelicataS05, author = {Rob Delicata and Steve A. Schneider}, title = {Temporal Rank Functions for Forward Secrecy}, booktitle = {18th {IEEE} Computer Security Foundations Workshop, {(CSFW-18} 2005), 20-22 June 2005, Aix-en-Provence, France}, pages = {126--139}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/CSFW.2005.26}, doi = {10.1109/CSFW.2005.26}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/DelicataS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/ChaumRS05, author = {David Chaum and Peter Y. A. Ryan and Steve A. Schneider}, editor = {Sabrina De Capitani di Vimercati and Paul F. Syverson and Dieter Gollmann}, title = {A Practical Voter-Verifiable Election Scheme}, booktitle = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3679}, pages = {118--139}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11555827\_8}, doi = {10.1007/11555827\_8}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/ChaumRS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/DelicataS05, author = {Rob Delicata and Steve A. Schneider}, editor = {Theodosis Dimitrakos and Fabio Martinelli and Peter Y. A. Ryan and Steve A. Schneider}, title = {A Formal Approach for Reasoning About a Class of Diffie-Hellman Protocols}, booktitle = {Formal Aspects in Security and Trust, Third International Workshop, {FAST} 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3866}, pages = {34--46}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11679219\_4}, doi = {10.1007/11679219\_4}, timestamp = {Sun, 02 Oct 2022 16:07:30 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/DelicataS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifm/SchneiderTE05, author = {Steve A. Schneider and Helen Treharne and Neil Evans}, editor = {Judi Romijn and Graeme Smith and Jaco van de Pol}, title = {Chunks: Component Verification in CSP{\(\vert\)}{\(\vert\)}B}, booktitle = {Integrated Formal Methods, 5th International Conference, {IFM} 2005, Eindhoven, The Netherlands, November 29 - December 2, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3771}, pages = {89--108}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11589976\_7}, doi = {10.1007/11589976\_7}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifm/SchneiderTE05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/SchneiderHRT05, author = {Steve A. Schneider and Thai Son Hoang and Ken Robinson and Helen Treharne}, editor = {John Derrick and Eerke A. Boiten}, title = {Tank Monitoring: {A} pAMN Case Study}, booktitle = {Proceedings of the {REFINE} 2005 Workshop, {REFINE} 2005, Guildford, UK, April 2005}, series = {Electronic Notes in Theoretical Computer Science}, volume = {137}, number = {2}, pages = {183--204}, publisher = {Elsevier}, year = {2005}, url = {https://doi.org/10.1016/j.entcs.2005.04.031}, doi = {10.1016/J.ENTCS.2005.04.031}, timestamp = {Mon, 12 Dec 2022 16:45:39 +0100}, biburl = {https://dblp.org/rec/journals/entcs/SchneiderHRT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/OuaknineS06, author = {Jo{\"{e}}l Ouaknine and Steve A. Schneider}, editor = {Luca Aceto and Andrew D. Gordon}, title = {Timed {CSP:} {A} Retrospective}, booktitle = {Proceedings of the Workshop "Essays on Algebraic Process Calculi", {APC} 25, Bertinoro, Italy, August 1-5, 2005}, series = {Electronic Notes in Theoretical Computer Science}, volume = {162}, pages = {273--276}, publisher = {Elsevier}, year = {2005}, url = {https://doi.org/10.1016/j.entcs.2005.12.093}, doi = {10.1016/J.ENTCS.2005.12.093}, timestamp = {Fri, 20 Jan 2023 12:38:53 +0100}, biburl = {https://dblp.org/rec/journals/entcs/OuaknineS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/zum/2005, editor = {Helen Treharne and Steve King and Martin C. Henson and Steve A. Schneider}, title = {{ZB} 2005: Formal Specification and Development in {Z} and B, 4th International Conference of {B} and {Z} Users, Guildford, UK, April 13-15, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3455}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/b135596}, doi = {10.1007/B135596}, isbn = {3-540-25559-1}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/zum/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/SchneiderD04, author = {Steve A. Schneider and Rob Delicata}, editor = {Ali E. Abdallah and Cliff B. Jones and Jeff W. Sanders}, title = {Verifying Security Protocols: An Application of {CSP}}, booktitle = {Communicating Sequential Processes: The First 25 Years, Symposium on the Occasion of 25 Years of CSP, London, UK, July 7-8, 2004, Revised Invited Papers}, series = {Lecture Notes in Computer Science}, volume = {3525}, pages = {243--263}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11423348\_14}, doi = {10.1007/11423348\_14}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/birthday/SchneiderD04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifm/SchneiderT04, author = {Steve A. Schneider and Helen Treharne}, editor = {Eerke A. Boiten and John Derrick and Graeme Smith}, title = {Verifying Controlled Components}, booktitle = {Integrated Formal Methods, 4th International Conference, {IFM} 2004, Canterbury, UK, April 4-7, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2999}, pages = {87--107}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24756-2\_6}, doi = {10.1007/978-3-540-24756-2\_6}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ifm/SchneiderT04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fmsd/YeungS03, author = {Wing Lok Yeung and Steve A. Schneider}, title = {Design and Verification of Distributed Recovery Blocks with {CSP}}, journal = {Formal Methods Syst. Des.}, volume = {22}, number = {3}, pages = {225--248}, year = {2003}, url = {https://doi.org/10.1023/A:1022997110855}, doi = {10.1023/A:1022997110855}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fmsd/YeungS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/HeatherLS03, author = {James Heather and Gavin Lowe and Steve A. Schneider}, title = {How to Prevent Type Flaw Attacks on Security Protocols}, journal = {J. Comput. Secur.}, volume = {11}, number = {2}, pages = {217--244}, year = {2003}, url = {https://doi.org/10.3233/jcs-2003-11204}, doi = {10.3233/JCS-2003-11204}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/HeatherLS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/GongGRS03, author = {Li Gong and Joshua D. Guttman and Peter Y. A. Ryan and Steve A. Schneider}, title = {Guest editorial overview}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {21}, number = {1}, pages = {1--4}, year = {2003}, url = {https://doi.org/10.1109/JSAC.2002.806120}, doi = {10.1109/JSAC.2002.806120}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsac/GongGRS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/zum/TreharneSB03, author = {Helen Treharne and Steve A. Schneider and Marchia Bramble}, editor = {Didier Bert and Jonathan P. Bowen and Steve King and Marina Wald{\'{e}}n}, title = {Composing Specifications Using Communication}, booktitle = {{ZB} 2003: Formal Specification and Development in {Z} and B, Third International Conference of {B} and {Z} Users, Turku, Finland, June 4-6, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2651}, pages = {58--78}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-44880-2\_5}, doi = {10.1007/3-540-44880-2\_5}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/zum/TreharneSB03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fasec/2002, editor = {Ali E. Abdallah and Peter Y. A. Ryan and Steve A. Schneider}, title = {Formal Aspects of Security, First International Conference, FASec 2002, London, UK, December 16-18, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2629}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/b94774}, doi = {10.1007/B94774}, isbn = {3-540-20693-0}, timestamp = {Wed, 15 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fasec/2002.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/HeatherS02, author = {James Heather and Steve A. Schneider}, editor = {Dieter Gollmann and G{\"{u}}nter Karjoth and Michael Waidner}, title = {Equal To The Task?}, booktitle = {Computer Security - {ESORICS} 2002, 7th European Symposium on Research in Computer Security, Zurich, Switzerland, October 14-16, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2502}, pages = {162--177}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45853-0\_10}, doi = {10.1007/3-540-45853-0\_10}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/HeatherS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fmoods/Schneider02, author = {Steve A. Schneider}, editor = {Bart Jacobs and Arend Rensink}, title = {Verifying Authentication Protocol Implementations}, booktitle = {Formal Methods for Open Object-Based Distributed Systems V, {IFIP} {TC6/WG6.1} Fifth International Conference on Formal Methods for Open Object-Based Distributed Systems {(FMOODS} 2002), March 20-22, 2002, Enschede, The Netherlands}, series = {{IFIP} Conference Proceedings}, volume = {209}, pages = {5--24}, publisher = {Kluwer}, year = {2002}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fmoods/Schneider02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/zum/SchneiderT02, author = {Steve A. Schneider and Helen Treharne}, editor = {Didier Bert and Jonathan P. Bowen and Martin C. Henson and Ken Robinson}, title = {Communicating {B} Machines}, booktitle = {{ZB} 2002: Formal Specification and Development in {Z} and B, 2nd International Conference of {B} and {Z} Users, Grenoble, France, January 23-25, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2272}, pages = {416--435}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45648-1\_22}, doi = {10.1007/3-540-45648-1\_22}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/zum/SchneiderT02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/daglib/0015710, author = {Steve A. Schneider}, title = {The B-method - an introduction}, series = {The cornerstones of computing series}, publisher = {Macmillan Publ.}, year = {2001}, isbn = {978-0-333-79284-1}, timestamp = {Mon, 22 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/daglib/0015710.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/daglib/0009544, author = {Peter Y. A. Ryan and Steve A. Schneider}, title = {Modelling and analysis of security protocols}, publisher = {Addison-Wesley-Longman}, year = {2001}, isbn = {978-0-201-67471-2}, timestamp = {Fri, 25 Mar 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/daglib/0009544.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/RyanS01, author = {Peter Y. A. Ryan and Steve A. Schneider}, title = {Process Algebra and Non-Interference}, journal = {J. Comput. Secur.}, volume = {9}, number = {1/2}, pages = {75--103}, year = {2001}, url = {https://doi.org/10.3233/jcs-2001-91-204}, doi = {10.3233/JCS-2001-91-204}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/RyanS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/concur/Schneider01, author = {Steve A. Schneider}, editor = {Kim Guldstrand Larsen and Mogens Nielsen}, title = {Process Algebra and Security}, booktitle = {{CONCUR} 2001 - Concurrency Theory, 12th International Conference, Aalborg, Denmark, August 20-25, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2154}, pages = {37--38}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44685-0\_4}, doi = {10.1007/3-540-44685-0\_4}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/concur/Schneider01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fac/Schneider00, author = {Steve A. Schneider}, title = {Abstraction and Testing in {CSP}}, journal = {Formal Aspects Comput.}, volume = {12}, number = {3}, pages = {165--181}, year = {2000}, url = {https://doi.org/10.1007/s001650070027}, doi = {10.1007/S001650070027}, timestamp = {Mon, 09 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fac/Schneider00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/HeatherS00, author = {James Heather and Steve A. Schneider}, title = {Towards Automatic Verification of Authentication Protocols on an Unbounded Network}, booktitle = {Proceedings of the 13th {IEEE} Computer Security Foundations Workshop, {CSFW} '00, Cambridge, England, UK, July 3-5, 2000}, pages = {132--143}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/CSFW.2000.856932}, doi = {10.1109/CSFW.2000.856932}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/HeatherS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/HeatherLS00, author = {James Heather and Gavin Lowe and Steve A. Schneider}, title = {How to Prevent Type Flaw Attacks on Security Protocols}, booktitle = {Proceedings of the 13th {IEEE} Computer Security Foundations Workshop, {CSFW} '00, Cambridge, England, UK, July 3-5, 2000}, pages = {255--268}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/CSFW.2000.856942}, doi = {10.1109/CSFW.2000.856942}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/HeatherLS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/EvansS00, author = {Neil Evans and Steve A. Schneider}, editor = {Fr{\'{e}}d{\'{e}}ric Cuppens and Yves Deswarte and Dieter Gollmann and Michael Waidner}, title = {Analysing Time Dependent Security Properties in {CSP} Using {PVS}}, booktitle = {Computer Security - {ESORICS} 2000, 6th European Symposium on Research in Computer Security, Toulouse, France, October 4-6, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1895}, pages = {222--237}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/10722599\_14}, doi = {10.1007/10722599\_14}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/EvansS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/zum/TreharneS00, author = {Helen Treharne and Steve A. Schneider}, editor = {Jonathan P. Bowen and Steve Dunne and Andy Galloway and Steve King}, title = {How to Drive a {B} Machine}, booktitle = {{ZB} 2000: Formal Specification and Development in {Z} and B, First International Conference of {B} and {Z} Users, York, UK, August 29 - September 2, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1878}, pages = {188--208}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44525-0\_12}, doi = {10.1007/3-540-44525-0\_12}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/zum/TreharneS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/Schneider00, author = {Steve A. Schneider}, editor = {Ted Hurley and M{\'{\i}}che{\'{a}}l Mac an Airchinnigh and Michel P. Schellekens and Anthony Karel Seda}, title = {May Testing, Non-interference, and Compositionality}, booktitle = {First Irish Conference on the Mathematical Foundations of Computer Science and Information Technology, {MFCSIT} 2000, Cork, Ireland, July 20-21, 2000}, series = {Electronic Notes in Theoretical Computer Science}, volume = {40}, pages = {361--391}, publisher = {Elsevier}, year = {2000}, url = {https://doi.org/10.1016/S1571-0661(05)80064-7}, doi = {10.1016/S1571-0661(05)80064-7}, timestamp = {Wed, 30 Nov 2022 10:58:03 +0100}, biburl = {https://dblp.org/rec/journals/entcs/Schneider00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wsaif/1999, editor = {Steve A. Schneider and Peter Ryan}, title = {Workshop on Secure Architectures and Information Flow 1999, Royal Holloway, London, UK, December 1-3, 1999}, series = {Electronic Notes in Theoretical Computer Science}, volume = {32}, publisher = {Elsevier}, year = {2000}, url = {https://www.sciencedirect.com/journal/electronic-notes-in-theoretical-computer-science/vol/32/suppl/C}, timestamp = {Wed, 30 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wsaif/1999.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/RyanS99, author = {Peter Y. A. Ryan and Steve A. Schneider}, title = {Process Algebra and Non-Interference}, booktitle = {Proceedings of the 12th {IEEE} Computer Security Foundations Workshop, {CSFW} 1999, Mordano, Italy, June 28-30, 1999}, pages = {214--227}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/CSFW.1999.779775}, doi = {10.1109/CSFW.1999.779775}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/RyanS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fm/Schneider99, author = {Steve A. Schneider}, editor = {Jeannette M. Wing and Jim Woodcock and Jim Davies}, title = {Abstraction and Testing}, booktitle = {FM'99 - Formal Methods, World Congress on Formal Methods in the Development of Computing Systems, Toulouse, France, September 20-24, 1999, Proceedings, Volume {I}}, series = {Lecture Notes in Computer Science}, volume = {1708}, pages = {738--757}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48119-2\_41}, doi = {10.1007/3-540-48119-2\_41}, timestamp = {Fri, 17 Feb 2023 09:02:00 +0100}, biburl = {https://dblp.org/rec/conf/fm/Schneider99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifm/TreharneS99, author = {Helen Treharne and Steve A. Schneider}, editor = {Keijiro Araki and Andy Galloway and Kenji Taguchi}, title = {Using a Process Algebra to Control {B} Operations}, booktitle = {Integrated Formal Methods, Proceedings of the 1st International Conference on Integrated Formal Methods, {IFM} 99, York, UK, 28-29 June 1999}, pages = {437--456}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/978-1-4471-0851-1\_23}, doi = {10.1007/978-1-4471-0851-1\_23}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifm/TreharneS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spin/AdekunleS99, author = {Carl B. Adekunle and Steve A. Schneider}, editor = {Dennis Dams and Rob Gerth and Stefan Leue and Mieke Massink}, title = {Detecting Feature Interactions in the Terrestrial Trunked Radio {(TETRA)} Network Using Promela and Xspin}, booktitle = {Theoretical and Practical Aspects of {SPIN} Model Checking, 5th and 6th International {SPIN} Workshops, Trento, Italy, July 5, 1999, Toulouse, France, September 21 and 24 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1680}, pages = {136--151}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48234-2\_10}, doi = {10.1007/3-540-48234-2\_10}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spin/AdekunleS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/SchneiderR00, author = {Steve A. Schneider and Peter Ryan}, editor = {Steve A. Schneider and Peter Ryan}, title = {Preface}, booktitle = {Workshop on Secure Architectures and Information Flow 1999, Royal Holloway, London, UK, December 1-3, 1999}, series = {Electronic Notes in Theoretical Computer Science}, volume = {32}, pages = {113--114}, publisher = {Elsevier}, year = {1999}, url = {https://doi.org/10.1016/S1571-0661(05)80565-1}, doi = {10.1016/S1571-0661(05)80565-1}, timestamp = {Wed, 30 Nov 2022 10:28:30 +0100}, biburl = {https://dblp.org/rec/journals/entcs/SchneiderR00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/RyanS98, author = {Peter Y. A. Ryan and Steve A. Schneider}, title = {An Attack on a Recursive Authentication Protocol. {A} Cautionary Tale}, journal = {Inf. Process. Lett.}, volume = {65}, number = {1}, pages = {7--10}, year = {1998}, url = {https://doi.org/10.1016/S0020-0190(97)00180-4}, doi = {10.1016/S0020-0190(97)00180-4}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ipl/RyanS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tse/Schneider98, author = {Steve A. Schneider}, title = {Verifying Authentication Protocols in {CSP}}, journal = {{IEEE} Trans. Software Eng.}, volume = {24}, number = {9}, pages = {741--758}, year = {1998}, url = {https://doi.org/10.1109/32.713329}, doi = {10.1109/32.713329}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tse/Schneider98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/b/TreharneDS98, author = {Helen Treharne and J. Draper and Steve A. Schneider}, editor = {Didier Bert}, title = {Test Case Preparation Using a Prototype}, booktitle = {B'98: Recent Advances in the Development and Use of the {B} Method, Second International {B} Conference, Montpellier, France, April 22-24, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1393}, pages = {293--311}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0053368}, doi = {10.1007/BFB0053368}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/b/TreharneDS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/Schneider98, author = {Steve A. Schneider}, title = {Formal Analysis of a Non-Repudiation Protocol}, booktitle = {Proceedings of the 11th {IEEE} Computer Security Foundations Workshop, Rockport, Massachusetts, USA, June 9-11, 1998}, pages = {54--65}, publisher = {{IEEE} Computer Society}, year = {1998}, url = {https://doi.org/10.1109/CSFW.1998.683155}, doi = {10.1109/CSFW.1998.683155}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/Schneider98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scp/Schneider97, author = {Steve A. Schneider}, title = {Timewise Refinement for Communicating Processes}, journal = {Sci. Comput. Program.}, volume = {28}, number = {1}, pages = {43--90}, year = {1997}, url = {https://doi.org/10.1016/S0167-6423(96)00016-0}, doi = {10.1016/S0167-6423(96)00016-0}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scp/Schneider97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/Schneider97, author = {Steve A. Schneider}, title = {Verifying authentication protocols with {CSP}}, booktitle = {10th Computer Security Foundations Workshop {(CSFW} '97), June 10-12, 1997, Rockport, Massachusetts, {USA}}, pages = {3--17}, publisher = {{IEEE} Computer Society}, year = {1997}, url = {https://doi.org/10.1109/CSFW.1997.596775}, doi = {10.1109/CSFW.1997.596775}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/Schneider97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tphol/DutertreS97, author = {Bruno Dutertre and Steve A. Schneider}, editor = {Elsa L. Gunter and Amy P. Felty}, title = {Using a {PVS} Embedding of {CSP} to Verify Authentication Protocols}, booktitle = {Theorem Proving in Higher Order Logics, 10th International Conference, TPHOLs'97, Murray Hill, NJ, USA, August 19-22, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1275}, pages = {121--136}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0028390}, doi = {10.1007/BFB0028390}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tphol/DutertreS97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/SchneiderS96, author = {Steve A. Schneider and Abraham Sidiropoulos}, editor = {Elisa Bertino and Helmut Kurth and Giancarlo Martella and Emilio Montolivo}, title = {{CSP} and Anonymity}, booktitle = {Computer Security - {ESORICS} 96, 4th European Symposium on Research in Computer Security, Rome, Italy, September 25-27, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1146}, pages = {198--218}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-61770-1\_38}, doi = {10.1007/3-540-61770-1\_38}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/SchneiderS96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Schneider96, author = {Steve A. Schneider}, title = {Security Properties and {CSP}}, booktitle = {1996 {IEEE} Symposium on Security and Privacy, May 6-8, 1996, Oakland, CA, {USA}}, pages = {174--187}, publisher = {{IEEE} Computer Society}, year = {1996}, url = {https://doi.org/10.1109/SECPRI.1996.502680}, doi = {10.1109/SECPRI.1996.502680}, timestamp = {Thu, 21 Sep 2023 15:57:36 +0200}, biburl = {https://dblp.org/rec/conf/sp/Schneider96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/Schneider95, author = {Steve A. Schneider}, title = {An Operational Semantics for Timed {CSP}}, journal = {Inf. Comput.}, volume = {116}, number = {2}, pages = {193--213}, year = {1995}, url = {https://doi.org/10.1006/inco.1995.1014}, doi = {10.1006/INCO.1995.1014}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iandc/Schneider95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/DaviesS95, author = {Jim Davies and Steve A. Schneider}, title = {A Brief History of Timed {CSP}}, journal = {Theor. Comput. Sci.}, volume = {138}, number = {2}, pages = {243--271}, year = {1995}, url = {https://doi.org/10.1016/0304-3975(94)00169-J}, doi = {10.1016/0304-3975(94)00169-J}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/DaviesS95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/MisloveRS95, author = {Michael W. Mislove and A. W. Roscoe and Steve A. Schneider}, title = {Fixed Points Without Completeness}, journal = {Theor. Comput. Sci.}, volume = {138}, number = {2}, pages = {273--314}, year = {1995}, url = {https://doi.org/10.1016/0304-3975(94)00170-N}, doi = {10.1016/0304-3975(94)00170-N}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/MisloveRS95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/concur/BryansDS95, author = {Jeremy W. Bryans and Jim Davies and Steve A. Schneider}, editor = {Insup Lee and Scott A. Smolka}, title = {Towards a denotational semantics for {ET-LOTOS}}, booktitle = {{CONCUR} '95: Concurrency Theory, 6th International Conference, Philadelphia, PA, USA, August 21-24, 1995, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {962}, pages = {269--283}, publisher = {Springer}, year = {1995}, url = {https://doi.org/10.1007/3-540-60218-6\_20}, doi = {10.1007/3-540-60218-6\_20}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/concur/BryansDS95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/forte/DaviesBS95, author = {Jim Davies and Jeremy W. Bryans and Steve A. Schneider}, editor = {Gregor von Bochmann and Rachida Dssouli and Omar Rafiq}, title = {Real-time {LOTOS} and Timed Observations}, booktitle = {Formal Description Techniques VIII, Proceedings of the {IFIP} {TC6} Eighth International Conference on Formal Description Techniques, Montreal, Canada, October 1995}, series = {{IFIP} Conference Proceedings}, volume = {43}, pages = {383--397}, publisher = {Chapman {\&} Hall}, year = {1995}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/forte/DaviesBS95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fac/DaviesS94, author = {Jim Davies and Steve A. Schneider}, title = {Recursion Induction for Real-Time Processes}, journal = {Formal Aspects Comput.}, volume = {5}, number = {6}, pages = {530--553}, year = {1993}, url = {https://doi.org/10.1007/BF01211248}, doi = {10.1007/BF01211248}, timestamp = {Mon, 09 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fac/DaviesS94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amast/Schneider93, author = {Steve A. Schneider}, editor = {Maurice Nivat and Charles Rattray and Teodor Rus and Giuseppe Scollo}, title = {Rigorous Specification of Real-Time Systems}, booktitle = {Algebraic Methodology and Software Technology {(AMAST} '93), Proceedings of the Third International Conference on Methodology and Software Technology, University of Twente, Enschede, The Netherlands, 21-25 June, 1993}, series = {Workshops in Computing}, pages = {59--74}, publisher = {Springer}, year = {1993}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/amast/Schneider93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mfps/Schneider93, author = {Steve A. Schneider}, editor = {Stephen D. Brookes and Michael G. Main and Austin Melton and Michael W. Mislove and David A. Schmidt}, title = {Timewise Refinement for Communicating Processes}, booktitle = {Mathematical Foundations of Programming Semantics, 9th International Conference, New Orleans, LA, USA, April 7-10, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {802}, pages = {177--214}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-58027-1\_9}, doi = {10.1007/3-540-58027-1\_9}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mfps/Schneider93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/concur/DaviesS92, author = {Jim Davies and Steve A. Schneider}, editor = {Rance Cleaveland}, title = {Using {CSP} to Verify a Timed Protocol over a Fair Medium}, booktitle = {{CONCUR} '92, Third International Conference on Concurrency Theory, Stony Brook, NY, USA, August 24-27, 1992, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {630}, pages = {355--369}, publisher = {Springer}, year = {1992}, url = {https://doi.org/10.1007/BFb0084803}, doi = {10.1007/BFB0084803}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/concur/DaviesS92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ftrtft/DaviesJS92, author = {Jim Davies and Dave Jackson and Steve A. Schneider}, editor = {Jan Vytopil}, title = {Broadcast Communication for Real-time Processes}, booktitle = {Formal Techniques in Real-Time and Fault-Tolerant Systems, Second International Symposium, Nijmegen, The Netherlands, January 8-10, 1992, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {571}, pages = {149--169}, publisher = {Springer}, year = {1992}, url = {https://doi.org/10.1007/3-540-55092-5\_9}, doi = {10.1007/3-540-55092-5\_9}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ftrtft/DaviesJS92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rex/SchneiderDJRRR91, author = {Steve A. Schneider and Jim Davies and D. M. Jackson and George M. Reed and Joy N. Reed and A. W. Roscoe}, editor = {J. W. de Bakker and Cornelis Huizing and Willem P. de Roever and Grzegorz Rozenberg}, title = {Timed {CSP:} Theory and Practice}, booktitle = {Real-Time: Theory in Practice, {REX} Workshop, Mook, The Netherlands, June 3-7, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {600}, pages = {640--675}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/BFb0032011}, doi = {10.1007/BFB0032011}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/rex/SchneiderDJRRR91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mfps/DaviesS89, author = {Jim Davies and Steve A. Schneider}, editor = {Michael G. Main and Austin Melton and Michael W. Mislove and David A. Schmidt}, title = {Factorizing Proofs in Timed {CSP}}, booktitle = {Mathematical Foundations of Programming Semantics, 5th International Conference, Tulane University, New Orleans, Louisiana, USA, March 29 - April 1, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {442}, pages = {129--159}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/BFb0040256}, doi = {10.1007/BFB0040256}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mfps/DaviesS89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.