Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Steve A. Schneider
Steve Schneider
Author information
- University of Surrey
2010 – today
- 2013
[j32]Islam Abdelhalim, Steve Schneider, Helen Treharne: An integrated framework for checking the behaviour of fUML models using CSP. STTT 15(4): 375-396 (2013)
[c66]James Heather, Chris Culnane, Steve Schneider, Sriramkrishnan Srinivasan, Zhe Xia: Solving the Discrete Logarithm Problem for Packing Candidate Preferences. CD-ARES Workshops 2013: 209-221
[c65]Murat Moran, James Heather, Steve Schneider: Automated Anonymity Verification of the ThreeBallot Voting System. IFM 2013: 94-108
[c64]Phillip James, Matthew Trumble, Helen Treharne, Markus Roggenbach, Steve Schneider: OnTrack: An Open Tooling Environment for Railway Verification. NASA Formal Methods 2013: 435-440
[c63]Evangelos Aktoudianakis, Jason Crampton, Steve Schneider, Helen Treharne, Adrian Waller: Policy templates for relationship-based access control. PST 2013: 221-228
[e6]James Heather, Steve A. Schneider, Vanessa Teague (Eds.): E-Voting and Identify - 4th International Conference, Vote-ID 2013, Guildford, UK, July 17-19, 2013. Proceedings. Lecture Notes in Computer Science 7985, Springer 2013, ISBN 978-3-642-39184-2- 2012
[j31]Markus Roggenbach, Faron Moller, Steve Schneider, Helen Treharne, Hoang Nga Nguyen: Railway modelling in CSP||B: the double junction case study. ECEASST 53 (2012)
[c62]Craig Burton, Chris Culnane, James Heather, Thea Peacock, Peter Y. A. Ryan, Steve Schneider, Sriramkrishnan Srinivasan, Vanessa Teague, Roland Wen, Zhe Xia: A Supervised Verifiable Voting Protocol for the Victorian Electoral Commission. Electronic Voting 2012: 81-94
[c61]James Heather, Steve Schneider: A Formal Framework for Modelling Coercion Resistance and Receipt Freeness. FM 2012: 217-231
[c60]Faron Moller, Hoang Nga Nguyen, Markus Roggenbach, Steve Schneider, Helen Treharne: Defining and Model Checking Abstractions of Complex Railway Models Using CSP||B. Haifa Verification Conference 2012: 193-208
[c59]Islam Abdelhalim, Steve Schneider, Helen Treharne: An Optimization Approach for Effective Formalized fUML Model Checking. SEFM 2012: 248-262- 2011
[j30]Steve Schneider, Helen Treharne, Heike Wehrheim: Bounded Retransmission in Event-B∥CSP: a Case Study. Electr. Notes Theor. Comput. Sci. 280: 69-80 (2011)
[j29]Steve Schneider, Helen Treharne: Changing system interfaces consistently: A new refinement strategy for CSP||B. Sci. Comput. Program. 76(10): 837-860 (2011)
[c58]Islam Abdelhalim, Steve Schneider, Helen Treharne: Towards a Practical Approach to Check UML/fUML Models Consistency Using CSP. ICFEM 2011: 33-48
[c57]Steve Schneider, Morgan Llewellyn, Chris Culnane, James Heather, Sriramkrishnan Srinivasan, Zhe Xia: Focus group views on Prêt à Voter 1.0. REVOTE 2011: 56-65
[c56]Denise Demirel, Maria Henning, Peter Y. A. Ryan, Steve Schneider, Melanie Volkamer: Feasibility Analysis of Prêt à Voter for German Federal Elections. VOTE-ID 2011: 158-173
[c55]Steve Schneider, Sriramkrishnan Srinivasan, Chris Culnane, James Heather, Zhe Xia: Prêt á Voter with Write-Ins. VOTE-ID 2011: 174-189
[c54]Steve Schneider, Helen Treharne, Heike Wehrheim: A CSP Account of Event-B Refinement. Refine 2011: 139-154- 2010
[j28]Alistair A. McEwan, Steve Schneider: Modelling and analysis of the AMBA bus using CSP and B. Concurrency and Computation: Practice and Experience 22(8): 949-964 (2010)
[j27]Wilson Ifill, Steve A. Schneider: A step towards refining and translating B control annotations to Handel-C. Concurrency and Computation: Practice and Experience 22(8): 1023-1048 (2010)
[c53]Islam Abdelhalim, James Sharp, Steve A. Schneider, Helen Treharne: Formal Verification of Tokeneer Behaviours Modelled in fUML Using CSP. ICFEM 2010: 371-387
[c52]Steve Schneider, Helen Treharne, Heike Wehrheim: A CSP Approach to Control in Event-B. IFM 2010: 260-274
[c51]Zhe Xia, Chris Culnane, James Heather, Hugo Jonker, Peter Y. A. Ryan, Steve A. Schneider, Sriramkrishnan Srinivasan: Versatile Prêt à Voter: Handling Multiple Election Methods with a Unified Interface. INDOCRYPT 2010: 98-114
2000 – 2009
- 2009
[j26]Siraj A. Shaikh, Vicky J. Bush, Steve A. Schneider: Specifying authentication using signal events in CSP. Computers & Security 28(5): 310-324 (2009)
[j25]
[j24]Peter Y. A. Ryan, David Bismark, James Heather, Steve Schneider, Zhe Xia: Prêt à voter: a voter-verifiable voting system. IEEE Transactions on Information Forensics and Security 4(4): 662-673 (2009)
[c50]Helen Treharne, Steve Schneider, Neil Grant, Neil Evans, Wilson Ifill: A Step towards Merging xUML and CSP || {\| \ }B. Rigorous Methods for Software Construction and Analysis 2009: 130-146
[c49]Steve Schneider, Helen Treharne: Changing System Interfaces Consistently: A New Refinement Strategy for CSP||B. IFM 2009: 103-117
[c48]David Bismark, James Heather, Roger M. A. Peel, Steve Schneider, Zhe Xia, Peter Y. A. Ryan: Experiences Gained from the first Prêt à Voter Implementation. REVOTE 2009: 19-28- 2008
[c47]Helen Treharne, Edward Turner, Steve Schneider, Neil Evans: Object Modelling in the SystemB Industrial Project. ABZ 2008: 359
[c46]Edward Turner, Helen Treharne, Steve Schneider, Neil Evans: Automatic Generation of CSP || B Skeletons from xUML Models. ICTAC 2008: 364-379
[c45]Zhe Xia, Steve A. Schneider, James Heather, Jacques Traoré: Analysis, Improvement, and Simplification of Prêt à Voter with Paillier Encryption. EVT 2008
[c44]Steve Schneider, Helen Treharne, Alistair McEwan, Wilson Ifill: Experiments in Translating CSP || B to Handel-C. CPA 2008: 115-133- 2007
[j23]Theodosis Dimitrakos, Fabio Martinelli, Peter Y. A. Ryan, Steve Schneider: Guest Editors' Preface. Int. J. Inf. Sec. 6(2-3): 65-66 (2007)
[j22]Rob Delicata, Steve Schneider: An algebraic approach to the verification of a class of Diffie-Hellman protocols. Int. J. Inf. Sec. 6(2-3): 183-196 (2007)
[c43]Wilson Ifill, Steve A. Schneider, Helen Treharne: Augmenting B with Control Annotations. B 2007: 34-48
[c42]Damien Karkinsky, Steve A. Schneider, Helen Treharne: Combining Mobility with State. IFM 2007: 373-392
[c41]Sébastien Foulle, Steve Schneider, Jacques Traoré, Zhe Xia: Threat Analysis of a Practical Voting Scheme with Receipts. VOTE-ID 2007: 156-165
[c40]Alistair A. McEwan, Steve Schneider: Modeling and Analysis of the AMBA Bus Using CSP and B. CPA 2007: 379-398
[c39]Wilson Ifill, Steve Schneider: A Step Towards Refining and Translating B Control Annotations to Handel-C. CPA 2007: 399-424
[e5]Theodosis Dimitrakos, Fabio Martinelli, Peter Y. A. Ryan, Steve A. Schneider (Eds.): Formal Aspects in Security and Trust, Fourth International Workshop, FAST 2006, Hamilton, Ontario, Canada, August 26-27, 2006, Revised Selected Papers. Lecture Notes in Computer Science 4691, Springer 2007, ISBN 978-3-540-75226-4
[e4]Alistair A. McEwan, Steve A. Schneider, Wilson Ifill, Peter H. Welch (Eds.): The 30th Communicating Process Architectures Conference, CPA 2007, organised under the auspices of WoTUG and the University of Surrey, Guildford, Surrey, UK, 8-11 July 2007. Concurrent Systems Engineering Series 65, IOS Press 2007, ISBN 978-1-58603-767-3- 2006
[j21]Joël Ouaknine, Steve Schneider: Timed CSP: A Retrospective. Electr. Notes Theor. Comput. Sci. 162: 273-276 (2006)
[j20]Steve Schneider, Thai Son Hoang, Ken Robinson, Helen Treharne: Tank monitoring: a pAMN case study. Formal Asp. Comput. 18(3): 308-328 (2006)
[c38]
[c37]Steve Schneider, Helen Treharne, Ana Cavalcanti, Jim Woodcock: A Layered Behavioural Model of Platelets. ICECCS 2006: 98-106
[c36]Alistair A. McEwan, Steve Schneider: A verified development of hardware using CSP/spl par/B. MEMOCODE 2006: 81
[c35]James Heather, Steve Schneider: To infinity and beyond or, avoiding the infinite in security protocol analysis. SAC 2006: 346-353
[e3]Theodosis Dimitrakos, Fabio Martinelli, Peter Y. A. Ryan, Steve A. Schneider (Eds.): Formal Aspects in Security and Trust, Third International Workshop, FAST 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected Papers. Lecture Notes in Computer Science 3866, Springer 2006, ISBN 3-540-32628-6- 2005
[j19]Steve A. Schneider, Thai Son Hoang, Ken Robinson, Helen Treharne: Tank Monitoring: A pAMN Case Study. Electr. Notes Theor. Comput. Sci. 137(2): 183-204 (2005)
[j18]Steve Schneider, Helen Treharne: CSP theorems for communicating B machines. Formal Asp. Comput. 17(4): 390-422 (2005)
[j17]James Heather, Steve Schneider: A decision procedure for the existence of a rank function. Journal of Computer Security 13(2): 317-344 (2005)
[j16]Neil Evans, Steve A. Schneider: Verifying security protocols with PVS: widening the rank function approach. J. Log. Algebr. Program. 64(2): 253-284 (2005)
[j15]Nicholas W. Jankowski, Kirsten Foot, Randy Kluver, Steve Schneider: The Web and the 2004 EP election: Comparing political actor Web sites in 11 EU Member States. Information Polity 10(3-4): 165-176 (2005)
[c34]Siraj A. Shaikh, Vicky J. Bush, Steve A. Schneider: Specifying Authentication Using Signal Events in CSP. CISC 2005: 63-74
[c33]
[c32]David Chaum, Peter Y. A. Ryan, Steve A. Schneider: A Practical Voter-Verifiable Election Scheme. ESORICS 2005: 118-139
[c31]Rob Delicata, Steve A. Schneider: A Formal Approach for Reasoning About a Class of Diffie-Hellman Protocols. Formal Aspects in Security and Trust 2005: 34-46
[c30]Steve A. Schneider, Helen Treharne, Neil Evans: Chunks: Component Verification in CSP||B. IFM 2005: 89-108
[e2]Helen Treharne, Steve King, Martin C. Henson, Steve A. Schneider (Eds.): ZB 2005: Formal Specification and Development in Z and B, 4th International Conference of B and Z Users, Guildford, UK, April 13-15, 2005, Proceedings. Lecture Notes in Computer Science 3455, Springer 2005, ISBN 3-540-25559-1- 2004
[c29]Steve A. Schneider, Rob Delicata: Verifying Security Protocols: An Application of CSP. 25 Years Communicating Sequential Processes 2004: 243-263
[c28]- 2003
[j14]Wing Lok Yeung, Steve Schneider: Design and Verification of Distributed Recovery Blocks with CSP. Formal Methods in System Design 22(3): 225-248 (2003)
[j13]James Heather, Gavin Lowe, Steve Schneider: How to Prevent Type Flaw Attacks on Security Protocols. Journal of Computer Security 11(2): 217-244 (2003)
[j12]Li Gong, Joshua D. Guttman, Peter Y. A. Ryan, Steve A. Schneider: Guest editorial overview. IEEE Journal on Selected Areas in Communications 21(1): 1-4 (2003)
[c27]Helen Treharne, Steve Schneider, Marchia Bramble: Composing Specifications Using Communication. ZB 2003: 58-78
[e1]Ali E. Abdallah, Peter Ryan, Steve Schneider (Eds.): Formal Aspects of Security, First International Conference, FASec 2002, London, UK, December 16-18, 2002, Revised Papers. Lecture Notes in Computer Science 2629, Springer 2003, ISBN 3-540-20693-0- 2002
[c26]
[c25]
[c24]- 2001
[b1]Peter Y. A. Ryan, Steve A. Schneider: Modelling and analysis of security protocols. Addison-Wesley-Longman 2001, ISBN 978-0-201-67471-2, pp. I-XIV, 1-300
[j11]Peter Y. A. Ryan, Steve A. Schneider: Process Algebra and Non-Interference. Journal of Computer Security 9(1/2): 75-103 (2001)
[c23]- 2000
[j10]
[j9]Steve Schneider: May Testing, Non-interference, and Compositionality. Electr. Notes Theor. Comput. Sci. 40: 361-391 (2000)
[j8]
[c22]James Heather, Steve Schneider: Towards Automatic Verification of Authentication Protocols on an Unbounded Network. CSFW 2000: 132-143
[c21]James Heather, Gavin Lowe, Steve Schneider: How to Prevent Type Flaw Attacks on Security Protocols. CSFW 2000: 255-268
[c20]Neil Evans, Steve Schneider: Analysing Time Dependent Security Properties in CSP Using PVS. ESORICS 2000: 222-237
[c19]
1990 – 1999
- 1999
[c18]
[c17]
[c16]
[c15]Carl B. Adekunle, Steve Schneider: Detecting Feature Interactions in the Terrestrial Trunked Radio (TETRA) Network Using Promela and Xspin. SPIN 1999: 136-151- 1998
[j7]Peter Y. A. Ryan, Steve A. Schneider: An Attack on a Recursive Authentication Protocol. A Cautionary Tale. Inf. Process. Lett. 65(1): 7-10 (1998)
[j6]Steve Schneider: Verifying Authentication Protocols in CSP. IEEE Trans. Software Eng. 24(9): 741-758 (1998)
[c14]Helen Treharne, J. Draper, Steve Schneider: Test Case Preparation Using a Prototype. B 1998: 293-311
[c13]- 1997
[j5]Steve Schneider: Timewise Refinement for Communicating Processes. Sci. Comput. Program. 28(1): 43-90 (1997)
[c12]
[c11]Bruno Dutertre, Steve Schneider: Using a PVS Embedding of CSP to Verify Authentication Protocols. TPHOLs 1997: 121-136- 1996
[c10]
[c9]- 1995
[j4]
[j3]Jim Davies, Steve Schneider: A Brief History of Timed CSP. Theor. Comput. Sci. 138(2): 243-271 (1995)
[j2]Michael W. Mislove, A. W. Roscoe, Steve Schneider: Fixed Points Without Completeness. Theor. Comput. Sci. 138(2): 273-314 (1995)
[c8]Jeremy Bryans, Jim Davies, Steve Schneider: Towards a denotational semantics for ET-LOTOS. CONCUR 1995: 269-283
[c7]Jim Davies, Jeremy Bryans, Steve Schneider: Real-time LOTOS and Timed Observations. FORTE 1995: 383-397- 1994
[j1]Jim Davies, Steve Schneider: Recursion Induction for Real-Time Processes. Formal Asp. Comput. 5(6): 530-553 (1994)- 1993
[c6]
[c5]- 1992
[c4]Jim Davies, Steve Schneider: Using CSP to Verify a Timed Protocol over a Fair Medium. CONCUR 1992: 355-369
[c3]Jim Davies, Dave Jackson, Steve Schneider: Broadcast Communication for Real-time Processes. FTRTFT 1992: 149-169- 1991
[c2]Steve Schneider, Jim Davies, D. M. Jackson, George M. Reed, Joy N. Reed, A. W. Roscoe: Timed CSP: Theory and Practice. REX Workshop 1991: 640-675
1980 – 1989
- 1989
[c1]Jim Davies, Steve Schneider: Factorizing Proofs in Timed CSP. Mathematical Foundations of Programming Semantics 1989: 129-159
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-02 11:09 CEST by the dblp team



