Steve A. Schneider
Steve Schneider
Person information
- affiliation: University of Surrey
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2010 – today
- 2018
- [c81]Jinguang Han, Liqun Chen, Steve Schneider, Helen Treharne, Stephan Wesemeyer:
Anonymous Single-Sign-On for n Designated Services with Traceability. ESORICS (1) 2018: 470-490 - [e9]Liqun Chen, Mark Manulis, Steve Schneider:
Information Security - 21st International Conference, ISC 2018, Guildford, UK, September 9-12, 2018, Proceedings. Lecture Notes in Computer Science 11060, Springer 2018, ISBN 978-3-319-99135-1 [contents] - [i8]Jinguang Han, Liqun Chen, Steve Schneider, Helen Treharne, Stephan Wesemeyer:
Anonymous Single-Sign-On for n designated services with traceability. CoRR abs/1804.07201 (2018) - [i7]Jinguang Han, Liqun Chen, Steve Schneider, Helen Treharne, Stephan Wesemeyer, Nick Wils:
Anonymous Single Sign-on with Proxy Re-Verification. CoRR abs/1811.07642 (2018) - 2017
- [j48]Josh Benaloh, Peter Y. A. Ryan, Steve Schneider, Vanessa Teague:
A Vote of Confidence? IEEE Security & Privacy 15(3): 12-13 (2017) - [c80]Jorden Whitefield, Liqun Chen, Frank Kargl, Andrew Paverd, Steve Schneider, Helen Treharne, Stephan Wesemeyer:
Formal Analysis of V2X Revocation Protocols. STM 2017: 147-163 - [c79]Jorden Whitefield, Liqun Chen, Thanassis Giannetsos, Steve Schneider, Helen Treharne:
Privacy-enhanced capabilities for VANETs using direct anonymous attestation. VNC 2017: 123-130 - [e8]Nadia Polikarpova, Steve Schneider:
Integrated Formal Methods - 13th International Conference, IFM 2017, Turin, Italy, September 20-22, 2017, Proceedings. Lecture Notes in Computer Science 10510, Springer 2017, ISBN 978-3-319-66844-4 [contents] - [i6]Jorden Whitefield, Liqun Chen, Frank Kargl, Andrew Paverd, Steve A. Schneider, Helen Treharne, Stephan Wesemeyer:
Formal Analysis of V2X Revocation Protocols. CoRR abs/1704.07216 (2017) - [i5]Jinguang Han, Liqun Chen, Steve A. Schneider, Helen Treharne:
PPETS-FGP: Privacy-Preserving Electronic Ticket Scheme with Fine-Grained Pricing. CoRR abs/1706.03016 (2017) - 2016
- [j47]Thai Son Hoang, Steve Schneider, Helen Treharne, David M. Williams:
Foundations for using linear temporal logic in Event-B refinement. Formal Asp. Comput. 28(6): 909-935 (2016) - [j46]Craig Burton, Chris Culnane, Steve Schneider:
vVote: Verifiable Electronic Voting in Practice. IEEE Security & Privacy 14(4): 64-73 (2016) - [j45]Murat Moran, James Heather, Steve Schneider:
Automated anonymity verification of the ThreeBallot and VAV voting systems. Software and System Modeling 15(4): 1049-1062 (2016) - [p1]Steve A. Schneider, Helen Treharne, David M. Williams:
Event-B and Linear Temporal Logic. From Action Systems to Distributed Systems 2016: 113-123 - [e7]Mark Manulis, Ahmad-Reza Sadeghi, Steve Schneider:
Applied Cryptography and Network Security - 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings. Lecture Notes in Computer Science 9696, Springer 2016, ISBN 978-3-319-39554-8 [contents] - 2015
- [j44]Peter Y. A. Ryan, Steve A. Schneider, Vanessa Teague:
End-to-End Verifiability in Voting Systems, from Theory to Practice. IEEE Security & Privacy 13(3): 59-62 (2015) - [j43]Abdullah Ali Alshehri, Steve Schneider:
A formal framework for security analysis of NFC mobile coupon protocols. Journal of Computer Security 23(6): 685-707 (2015) - [j42]Steve A. Schneider, Helen Treharne:
Special issue on Automated Verification of Critical Systems (AVoCS 2013). Sci. Comput. Program. 111: 213 (2015) - [j41]Chris Culnane, Peter Y. A. Ryan, Steve A. Schneider, Vanessa Teague:
vVote: A Verifiable Voting System. ACM Trans. Inf. Syst. Secur. 18(1): 3:1-3:30 (2015) - [i4]Craig Burton, Chris Culnane, Steve Schneider:
Secure and Verifiable Electronic Voting in Practice: the use of vVote in the Victorian State Election. CoRR abs/1504.07098 (2015) - 2014
- [j40]
- [j39]James Heather, Steve Schneider, Vanessa Teague:
Cryptographic protocols with everyday objects. Formal Asp. Comput. 26(1): 37-62 (2014) - [j38]Murat Moran, James Heather, Steve Schneider:
Verifying anonymity in voting systems using CSP. Formal Asp. Comput. 26(1): 63-98 (2014) - [j37]Steve Schneider, Helen Treharne, Heike Wehrheim:
The behavioural semantics of Event-B refinement. Formal Asp. Comput. 26(2): 251-280 (2014) - [j36]Steve Schneider, Vanessa Teague, Chris Culnane, James Heather:
Special Section on Vote-ID 2013. J. Inf. Sec. Appl. 19(2): 103-104 (2014) - [j35]Phillip James, Faron Moller, Hoang Nga Nguyen, Markus Roggenbach, Steve A. Schneider, Helen Treharne:
On modelling and verifying railway interlockings: Tracking train lengths. Sci. Comput. Program. 96: 315-336 (2014) - [j34]Phillip James, Faron Moller, Nguyen Hoang Nga, Markus Roggenbach, Steve A. Schneider, Helen Treharne:
Techniques for modelling and verifying railway interlockings. STTT 16(6): 685-711 (2014) - [c78]Chris Culnane, Steve A. Schneider:
A Peered Bulletin Board for Robust Use in Verifiable Voting Systems. CSF 2014: 169-183 - [c77]Steve A. Schneider, Helen Treharne, Heike Wehrheim, David M. Williams:
Managing LTL Properties in Event-B Refinement. IFM 2014: 221-237 - [c76]Sriramkrishnan Srinivasan, Chris Culnane, James Heather, Steve A. Schneider, Zhe Xia:
Countering Ballot Stuffing and Incorporating Eligibility Verifiability in Helios. NSS 2014: 335-348 - [c75]Efstathios Stathakidis, Steve A. Schneider, James Heather:
Robustness Modelling and Verification of a Mix Net Protocol. SSR 2014: 131-150 - [c74]Chris Culnane, James Heather, Rui Joaquim, Peter Y. A. Ryan, Steve Schneider, Vanessa Teague:
Faster Print on Demand for Prêt à Voter. EVT/WOTE 2014 - [i3]Chris Culnane, Steve Schneider:
A Peered Bulletin Board for Robust Use in Verifiable Voting Systems. CoRR abs/1401.4151 (2014) - [i2]Chris Culnane, Peter Y. A. Ryan, Steve Schneider, Vanessa Teague:
vVote: a Verifiable Voting System (DRAFT). CoRR abs/1404.6822 (2014) - [i1]Steve Schneider, Helen Treharne, Heike Wehrheim, David M. Williams:
Managing LTL properties in Event-B refinement. CoRR abs/1406.6622 (2014) - 2013
- [j33]Islam Abdelhalim, Steve Schneider, Helen Treharne:
An integrated framework for checking the behaviour of fUML models using CSP. STTT 15(4): 375-396 (2013) - [c73]James Heather, Chris Culnane, Steve Schneider, Sriramkrishnan Srinivasan, Zhe Xia:
Solving the Discrete Logarithm Problem for Packing Candidate Preferences. CD-ARES Workshops 2013: 209-221 - [c72]Abdullah Ali Alshehri, Steve Schneider:
Formal Security Analysis and Improvement of a Hash-Based NFC M-Coupon Protocol. CARDIS 2013: 152-167 - [c71]Steve Schneider:
Fuzzy-Systeme zur Unterstützung von Entscheidungen in land- und forstwirtschaftlichen Logistik-Prozessen. GIL Jahrestagung 2013: 307-310 - [c70]Abdullah Ali Alshehri, Steve Schneider:
Formally defining NFC M-coupon requirements, with a case study. ICITST 2013: 52-58 - [c69]Murat Moran, James Heather, Steve Schneider:
Automated Anonymity Verification of the ThreeBallot Voting System. IFM 2013: 94-108 - [c68]Phillip James, Matthew Trumble, Helen Treharne, Markus Roggenbach, Steve Schneider:
OnTrack: An Open Tooling Environment for Railway Verification. NASA Formal Methods 2013: 435-440 - [c67]Evangelos Aktoudianakis, Jason Crampton, Steve Schneider, Helen Treharne, Adrian Waller:
Policy templates for relationship-based access control. PST 2013: 221-228 - [c66]Phillip James, Faron Moller, Hoang Nga Nguyen, Markus Roggenbach, Steve Schneider, Helen Treharne, Matthew Trumble, David M. Williams:
Verification of Scheme Plans Using CSP $$||$$ | | B. SEFM Workshops 2013: 189-204 - [c65]Morgan Llewellyn, Steve Schneider, Zhe Xia, Chris Culnane, James Heather, Peter Y. A. Ryan, Sriramkrishnan Srinivasan:
Testing Voters' Understanding of a Security Mechanism Used in Verifiable Voting. EVT/WOTE 2013 - [e6]James Heather, Steve A. Schneider, Vanessa Teague:
E-Voting and Identify - 4th International Conference, Vote-ID 2013, Guildford, UK, July 17-19, 2013. Proceedings. Lecture Notes in Computer Science 7985, Springer 2013, ISBN 978-3-642-39184-2 [contents] - 2012
- [j32]Markus Roggenbach, Faron Moller, Steve Schneider, Helen Treharne, Hoang Nga Nguyen:
Railway modelling in CSP||B: the double junction case study. ECEASST 53 (2012) - [c64]Craig Burton, Chris Culnane, James Heather, Thea Peacock, Peter Y. A. Ryan, Steve Schneider, Sriramkrishnan Srinivasan, Vanessa Teague, Roland Wen, Zhe Xia:
A Supervised Verifiable Voting Protocol for the Victorian Electoral Commission. Electronic Voting 2012: 81-94 - [c63]James Heather, Steve Schneider:
A Formal Framework for Modelling Coercion Resistance and Receipt Freeness. FM 2012: 217-231 - [c62]Faron Moller, Hoang Nga Nguyen, Markus Roggenbach, Steve Schneider, Helen Treharne:
Defining and Model Checking Abstractions of Complex Railway Models Using CSP||B. Haifa Verification Conference 2012: 193-208 - [c61]Islam Abdelhalim, Steve Schneider, Helen Treharne:
An Optimization Approach for Effective Formalized fUML Model Checking. SEFM 2012: 248-262 - [c60]Craig Burton, Chris Culnane, James Heather, Thea Peacock, Peter Y. A. Ryan, Steve Schneider, Vanessa Teague, Roland Wen, Zhe Xia, Sriramkrishnan Srinivasan:
Using Prêt à Voter in Victoria State Elections. EVT/WOTE 2012 - 2011
- [j31]Steve Schneider, Helen Treharne, Heike Wehrheim:
Bounded Retransmission in Event-B∥CSP: a Case Study. Electr. Notes Theor. Comput. Sci. 280: 69-80 (2011) - [j30]Steve Schneider, Helen Treharne:
Changing system interfaces consistently: A new refinement strategy for CSP||B. Sci. Comput. Program. 76(10): 837-860 (2011) - [c59]Islam Abdelhalim, Steve Schneider, Helen Treharne:
Towards a Practical Approach to Check UML/fUML Models Consistency Using CSP. ICFEM 2011: 33-48 - [c58]Steve Schneider, Morgan Llewellyn, Chris Culnane, James Heather, Sriramkrishnan Srinivasan, Zhe Xia:
Focus group views on Prêt à Voter 1.0. REVOTE 2011: 56-65 - [c57]Chris Culnane, David Bismark, James Heather, Steve Schneider, Sriramkrishnan Srinivasan, Zhe Xia:
Authentication Codes. EVT/WOTE 2011 - [c56]Denise Demirel, Maria Henning, Peter Y. A. Ryan, Steve Schneider, Melanie Volkamer:
Feasibility Analysis of Prêt à Voter for German Federal Elections. VOTE-ID 2011: 158-173 - [c55]Steve Schneider, Sriramkrishnan Srinivasan, Chris Culnane, James Heather, Zhe Xia:
Prêt á Voter with Write-Ins. VOTE-ID 2011: 174-189 - [c54]Steve Schneider, Helen Treharne, Heike Wehrheim:
A CSP Account of Event-B Refinement. Refine@FM 2011: 139-154 - 2010
- [j29]Alistair A. McEwan, Steve Schneider:
Modelling and analysis of the AMBA bus using CSP and B. Concurrency and Computation: Practice and Experience 22(8): 949-964 (2010) - [j28]Wilson Ifill, Steve A. Schneider:
A step towards refining and translating B control annotations to Handel-C. Concurrency and Computation: Practice and Experience 22(8): 1023-1048 (2010) - [c53]Islam Abdelhalim, James Sharp, Steve A. Schneider, Helen Treharne:
Formal Verification of Tokeneer Behaviours Modelled in fUML Using CSP. ICFEM 2010: 371-387 - [c52]Steve Schneider, Helen Treharne, Heike Wehrheim:
A CSP Approach to Control in Event-B. IFM 2010: 260-274 - [c51]Zhe Xia, Chris Culnane, James Heather, Hugo Jonker, Peter Y. A. Ryan, Steve A. Schneider, Sriramkrishnan Srinivasan:
Versatile Prêt à Voter: Handling Multiple Election Methods with a Unified Interface. INDOCRYPT 2010: 98-114
2000 – 2009
- 2009
- [j27]Siraj A. Shaikh, Vicky J. Bush, Steve A. Schneider:
Specifying authentication using signal events in CSP. Computers & Security 28(5): 310-324 (2009) - [j26]
- [j25]Peter Y. A. Ryan, David Bismark, James Heather, Steve Schneider, Zhe Xia:
Prêt à voter: a voter-verifiable voting system. IEEE Trans. Information Forensics and Security 4(4): 662-673 (2009) - [c50]Helen Treharne, Steve Schneider, Neil Grant, Neil Evans, Wilson Ifill:
A Step towards Merging xUML and CSP || {\| \ }B. Rigorous Methods for Software Construction and Analysis 2009: 130-146 - [c49]Steve Schneider, Helen Treharne:
Changing System Interfaces Consistently: A New Refinement Strategy for CSP||B. IFM 2009: 103-117 - [c48]David Bismark, James Heather, Roger M. A. Peel, Steve Schneider, Zhe Xia, Peter Y. A. Ryan:
Experiences Gained from the first Prêt à Voter Implementation. REVOTE 2009: 19-28 - 2008
- [c47]Helen Treharne, Edward Turner, Steve Schneider, Neil Evans:
Object Modelling in the SystemB Industrial Project. ABZ 2008: 359 - [c46]Edward Turner, Helen Treharne, Steve Schneider, Neil Evans:
Automatic Generation of CSP || B Skeletons from xUML Models. ICTAC 2008: 364-379 - [c45]Zhe Xia, Steve A. Schneider, James Heather, Jacques Traoré:
Analysis, Improvement, and Simplification of Prêt à Voter with Paillier Encryption. EVT 2008 - [c44]Steve Schneider, Helen Treharne, Alistair McEwan, Wilson Ifill:
Experiments in Translating CSP || B to Handel-C. CPA 2008: 115-133 - 2007
- [j24]Theodosis Dimitrakos, Fabio Martinelli, Peter Y. A. Ryan, Steve Schneider:
Guest Editors' Preface. Int. J. Inf. Sec. 6(2-3): 65-66 (2007) - [j23]Rob Delicata, Steve Schneider:
An algebraic approach to the verification of a class of Diffie-Hellman protocols. Int. J. Inf. Sec. 6(2-3): 183-196 (2007) - [c43]Wilson Ifill, Steve A. Schneider, Helen Treharne:
Augmenting B with Control Annotations. B 2007: 34-48 - [c42]Damien Karkinsky, Steve A. Schneider, Helen Treharne:
Combining Mobility with State. IFM 2007: 373-392 - [c41]Sébastien Foulle, Steve Schneider, Jacques Traoré, Zhe Xia:
Threat Analysis of a Practical Voting Scheme with Receipts. VOTE-ID 2007: 156-165 - [c40]Alistair A. McEwan, Steve Schneider:
Modeling and Analysis of the AMBA Bus Using CSP and B. CPA 2007: 379-398 - [c39]Wilson Ifill, Steve Schneider:
A Step Towards Refining and Translating B Control Annotations to Handel-C. CPA 2007: 399-424 - [e5]Theodosis Dimitrakos, Fabio Martinelli, Peter Y. A. Ryan, Steve A. Schneider:
Formal Aspects in Security and Trust, Fourth International Workshop, FAST 2006, Hamilton, Ontario, Canada, August 26-27, 2006, Revised Selected Papers. Lecture Notes in Computer Science 4691, Springer 2007, ISBN 978-3-540-75226-4 [contents] - [e4]Alistair A. McEwan, Steve A. Schneider, Wilson Ifill, Peter H. Welch:
The 30th Communicating Process Architectures Conference, CPA 2007, organised under the auspices of WoTUG and the University of Surrey, Guildford, Surrey, UK, 8-11 July 2007. Concurrent Systems Engineering Series 65, IOS Press 2007, ISBN 978-1-58603-767-3 [contents] - 2006
- [j22]Joël Ouaknine, Steve Schneider:
Timed CSP: A Retrospective. Electr. Notes Theor. Comput. Sci. 162: 273-276 (2006) - [j21]Steve Schneider, Thai Son Hoang, Ken Robinson, Helen Treharne:
Tank monitoring: a pAMN case study. Formal Asp. Comput. 18(3): 308-328 (2006) - [c38]
- [c37]Steve Schneider, Helen Treharne, Ana Cavalcanti, Jim Woodcock:
A Layered Behavioural Model of Platelets. ICECCS 2006: 98-106 - [c36]Alistair A. McEwan, Steve Schneider:
A verified development of hardware using CSP/spl par/B. MEMOCODE 2006: 81 - [c35]James Heather, Steve Schneider:
To infinity and beyond or, avoiding the infinite in security protocol analysis. SAC 2006: 346-353 - [e3]Theodosis Dimitrakos, Fabio Martinelli, Peter Y. A. Ryan, Steve A. Schneider:
Formal Aspects in Security and Trust, Third International Workshop, FAST 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected Papers. Lecture Notes in Computer Science 3866, Springer 2006, ISBN 3-540-32628-6 [contents] - 2005
- [j20]Steve A. Schneider, Thai Son Hoang, Ken Robinson, Helen Treharne:
Tank Monitoring: A pAMN Case Study. Electr. Notes Theor. Comput. Sci. 137(2): 183-204 (2005) - [j19]Steve Schneider, Helen Treharne:
CSP theorems for communicating B machines. Formal Asp. Comput. 17(4): 390-422 (2005) - [j18]James Heather, Steve Schneider:
A decision procedure for the existence of a rank function. Journal of Computer Security 13(2): 317-344 (2005) - [j17]Neil Evans, Steve A. Schneider:
Verifying security protocols with PVS: widening the rank function approach. J. Log. Algebr. Program. 64(2): 253-284 (2005) - [j16]Nicholas W. Jankowski, Kirsten Foot, Randy Kluver, Steve Schneider:
The Web and the 2004 EP election: Comparing political actor Web sites in 11 EU Member States. Information Polity 10(3-4): 165-176 (2005) - [c34]Siraj A. Shaikh, Vicky J. Bush, Steve A. Schneider:
Specifying Authentication Using Signal Events in CSP. CISC 2005: 63-74 - [c33]
- [c32]David Chaum, Peter Y. A. Ryan, Steve A. Schneider:
A Practical Voter-Verifiable Election Scheme. ESORICS 2005: 118-139 - [c31]Rob Delicata, Steve A. Schneider:
A Formal Approach for Reasoning About a Class of Diffie-Hellman Protocols. Formal Aspects in Security and Trust 2005: 34-46 - [c30]Steve A. Schneider, Helen Treharne, Neil Evans:
Chunks: Component Verification in CSP||B. IFM 2005: 89-108 - [e2]Helen Treharne, Steve King, Martin C. Henson, Steve A. Schneider:
ZB 2005: Formal Specification and Development in Z and B, 4th International Conference of B and Z Users, Guildford, UK, April 13-15, 2005, Proceedings. Lecture Notes in Computer Science 3455, Springer 2005, ISBN 3-540-25559-1 [contents] - 2004
- [c29]Steve A. Schneider, Rob Delicata:
Verifying Security Protocols: An Application of CSP. 25 Years Communicating Sequential Processes 2004: 243-263 - [c28]
- 2003
- [j15]Wing Lok Yeung, Steve Schneider:
Design and Verification of Distributed Recovery Blocks with CSP. Formal Methods in System Design 22(3): 225-248 (2003) - [j14]James Heather, Gavin Lowe, Steve Schneider:
How to Prevent Type Flaw Attacks on Security Protocols. Journal of Computer Security 11(2): 217-244 (2003) - [j13]Li Gong, Joshua D. Guttman, Peter Y. A. Ryan, Steve A. Schneider:
Guest editorial overview. IEEE Journal on Selected Areas in Communications 21(1): 1-4 (2003) - [c27]Helen Treharne, Steve Schneider, Marchia Bramble:
Composing Specifications Using Communication. ZB 2003: 58-78 - [e1]Ali E. Abdallah, Peter Ryan, Steve Schneider:
Formal Aspects of Security, First International Conference, FASec 2002, London, UK, December 16-18, 2002, Revised Papers. Lecture Notes in Computer Science 2629, Springer 2003, ISBN 3-540-20693-0 [contents] - 2002
- [c26]
- [c25]
- [c24]
- 2001
- [b1]Peter Y. A. Ryan, Steve A. Schneider:
Modelling and analysis of security protocols. Addison-Wesley-Longman 2001, ISBN 978-0-201-67471-2, pp. I-XIV, 1-300 - [j12]Peter Y. A. Ryan, Steve A. Schneider:
Process Algebra and Non-Interference. Journal of Computer Security 9(1/2): 75-103 (2001) - [c23]
- 2000
- [j11]
- [j10]Steve Schneider:
May Testing, Non-interference, and Compositionality. Electr. Notes Theor. Comput. Sci. 40: 361-391 (2000) - [j9]
- [c22]James Heather, Steve Schneider:
Towards Automatic Verification of Authentication Protocols on an Unbounded Network. CSFW 2000: 132-143 - [c21]James Heather, Gavin Lowe, Steve Schneider:
How to Prevent Type Flaw Attacks on Security Protocols. CSFW 2000: 255-268 - [c20]Neil Evans, Steve Schneider:
Analysing Time Dependent Security Properties in CSP Using PVS. ESORICS 2000: 222-237 - [c19]
1990 – 1999
- 1999
- [j8]Guillermo Solano-Flores, Bruce Raymond, Steve A. Schneider, Michael J. Timms:
Management of scoring sessions in alternative assessment: the computer-assisted scoring approach. Computers & Education 33(1): 47-63 (1999) - [c18]
- [c17]
- [c16]
- [c15]