Παρακολούθηση
Steve Schneider
Steve Schneider
Director of Computer Science Research Centre; Professor of Computing, University of Surrey
Η διεύθυνση ηλεκτρονικού ταχυδρομείου έχει επαληθευτεί στον τομέα surrey.ac.uk - Αρχική σελίδα
Τίτλος
Παρατίθεται από
Παρατίθεται από
Έτος
Concurrent and real-time systems: the CSP approach
S Schneider
John Wiley & Sons, 1999
8621999
The modelling and analysis of security protocols: the CSP approach
P Ryan, S Schneider, M Goldsmith, G Lowe, B Roscoe
Addison-Wesley Professional, 2001
8092001
A practical voter-verifiable election scheme
D Chaum, PYA Ryan, S Schneider
Computer Security–ESORICS 2005: 10th European Symposium on Research in …, 2005
5312005
Verifying authentication protocols in CSP
S Schneider
IEEE Transactions on software engineering 24 (9), 741-758, 1998
4331998
The B-method: An introduction
S Schneider
Palgrave, 2001
3872001
Security properties and CSP
S Schneider
Proceedings 1996 IEEE Symposium on Security and Privacy, 174-187, 1996
3591996
Real-Time Systems: specification, verification, and analysis
A Burns, A Welling, K Ramamritham, J Hooman, S Schneider, Z Liu, ...
prentice Hall, 1996
3211996
Process algebra and non-interference
PYA Ryan, SA Schneider
Journal of Computer Security 9 (1-2), 75-103, 2001
3202001
How to prevent type flaw attacks on security protocols
J Heather, G Lowe, S Schneider
Journal of computer Security 11 (2), 217-244, 2003
3172003
PrÊt À Voter:a Voter-Verifiable Voting System
PYA Ryan, D Bismark, J Heather, S Schneider, Z Xia
IEEE transactions on information forensics and security 4 (4), 662-673, 2009
312*2009
CSP and anonymity
S Schneider, A Sidiropoulos
Computer Security—ESORICS 96: 4th European Symposium on Research in …, 1996
2861996
An operational semantics for timed CSP
S Schneider
Information and computation 116 (2), 193-213, 1995
2731995
A brief history of Timed CSP
J Davies, S Schneider
Theoretical Computer Science 138 (2), 243-271, 1995
2561995
Springer International Publishing: Cham
L Chen, K Hosoda, E Menegatti, M Shimizu, H Wang
Switzerland 11765, 337-345, 2019
2352019
Formal analysis of a non-repudiation protocol
S Schneider
Proceedings. 11th IEEE Computer Security Foundations Workshop (Cat. No …, 1998
2001998
Prêt à voter with re-encryption mixes
PYA Ryan, SA Schneider
Computer Security–ESORICS 2006: 11th European Symposium on Research in …, 2006
1962006
An attack on a recursive authentication protocol A cautionary tale
PYA Ryan, SA Schneider
Information Processing Letters 65 (1), 7-10, 1998
1471998
CSP theorems for communicating B machines
S Schneider, H Treharne
Formal Aspects of Computing 17 (4), 390-422, 2005
1322005
Timed CSP: Theory and practice
S Schneider, J Davies, DM Jackson, GM Reed, JN Reed, AW Roscoe
Proceedings of the Real-Time: Theory in Practice, REX Workshop, 640-675, 1991
1311991
Integrating and extending JCSP
AA McEwan, S Schneider, W Ifill, P Welch
Communicating Process Architectures 2007: WoTUG-30: Proceedings of the 30th …, 2007
1252007
Δεν είναι δυνατή η εκτέλεση της ενέργειας από το σύστημα αυτή τη στιγμή. Προσπαθήστε ξανά αργότερα.
Άρθρα 1–20