<?xml version="1.0"?>
<dblpperson name="Steve A. Schneider" pid="s/SASchneider" n="183">
<person key="homepages/s/SASchneider" mdate="2024-05-01">
<author pid="s/SASchneider">Steve A. Schneider</author>
<author pid="s/SASchneider">Steve Schneider</author>
<note type="affiliation">University of Surrey</note>
<url>https://zbmath.org/authors/?q=ai:schneider.steve-a</url>
<url>https://mathscinet.ams.org/mathscinet/MRAuthorID/278135</url>
<url>https://mathgenealogy.org/id.php?id=78389</url>
<url>https://en.wikipedia.org/wiki/Steve_Schneider_(computer_scientist)</url>
<url>https://orcid.org/0000-0001-8365-6993</url>
<url>https://www.wikidata.org/entity/Q27983493</url>
<url>https://id.loc.gov/authorities/names/no2001009606</url>
<url>https://id.loc.gov/authorities/names/n88119608</url>
<url>https://d-nb.info/gnd/120332975X</url>
</person>
<r><inproceedings key="conf/eurosp/BoureanuWRST25" mdate="2026-03-24">
<author pid="12/4955">Ioana Boureanu</author>
<author pid="18/5892">Stephan Wesemeyer</author>
<author pid="323/4722">Fortunat Rajaona</author>
<author pid="s/SASchneider">Steve Schneider</author>
<author orcid="0000-0003-1835-4803" pid="37/5761">Helen Treharne</author>
<title>A Systematic Study of Practical &#38; Formal Privacy in the 5G AKMA Procedure.</title>
<pages>1-16</pages>
<year>2025</year>
<booktitle>EuroS&#38;P</booktitle>
<ee>https://doi.org/10.1109/EuroSP63326.2025.00010</ee>
<crossref>conf/eurosp/2025</crossref>
<url>db/conf/eurosp/eurosp2025.html#BoureanuWRST25</url>
<stream>streams/conf/eurosp</stream>
</inproceedings>
</r>
<r><inproceedings key="conf/eurosp/ShehuS25" mdate="2025-09-16">
<author pid="324/2395">Abubakar-Sadiq Shehu</author>
<author pid="s/SASchneider">Steve Schneider</author>
<title>Decentralised Supply Chain Reputation: A Privacy and Self-Sovereign Identity Perspective.</title>
<pages>474-484</pages>
<year>2025</year>
<booktitle>EuroS&#38;P (Workshops)</booktitle>
<ee>https://doi.org/10.1109/EuroSPW67616.2025.00061</ee>
<crossref>conf/eurosp/2025w</crossref>
<url>db/conf/eurosp/eurosp2025w.html#ShehuS25</url>
<stream>streams/conf/eurosp</stream>
</inproceedings>
</r>
<r><inproceedings key="conf/eurosp/FraserS25" mdate="2025-09-02">
<author pid="247/1548">Ashley Fraser</author>
<author pid="s/SASchneider">Steve Schneider</author>
<title>A Formal Security Analysis of Hyperledger AnonCreds.</title>
<pages>822-844</pages>
<year>2025</year>
<booktitle>EuroS&#38;P</booktitle>
<ee>https://doi.org/10.1109/EuroSP63326.2025.00052</ee>
<crossref>conf/eurosp/2025</crossref>
<url>db/conf/eurosp/eurosp2025.html#FraserS25</url>
<stream>streams/conf/eurosp</stream>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-2511-03016" mdate="2025-11-27">
<author pid="117/2002">Iffat Gheyas</author>
<author pid="82/10434">Muhammad Rizwan Asghar</author>
<author pid="s/SASchneider">Steve Schneider</author>
<author pid="05/9432">Alan Woodward</author>
<title>Establishing Trust in Crowdsourced Data.</title>
<year>2025</year>
<month>November</month>
<volume>abs/2511.03016</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2511.03016</ee>
<url>db/journals/corr/corr2511.html#abs-2511-03016</url>
<stream>streams/journals/corr</stream>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/FraserS25" mdate="2025-05-27">
<author pid="247/1548">Ashley Fraser</author>
<author pid="s/SASchneider">Steve Schneider</author>
<title>A Formal Security Analysis of Hyperledger AnonCreds.</title>
<pages>694</pages>
<year>2025</year>
<volume>2025</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">https://eprint.iacr.org/2025/694</ee>
<url>db/journals/iacr/iacr2025.html#FraserS25</url>
<stream>streams/journals/iacr</stream>
</article>
</r>
<r><article key="journals/tdsc/AlsadiCDDRSSTWW24" mdate="2024-11-04">
<author orcid="0000-0003-1635-5132" pid="168/6514-1">Mohammed Alsadi 0001</author>
<author orcid="0009-0006-5987-3772" pid="27/7687-1">Matthew Casey 0001</author>
<author orcid="0000-0002-4033-9880" pid="77/7303">Constantin Catalin Dragan</author>
<author orcid="0000-0003-3497-3110" pid="57/10027">Fran&#231;ois Dupressoir</author>
<author orcid="0000-0002-7502-6374" pid="80/11131">Luke Riley</author>
<author orcid="0000-0002-1755-3264" pid="181/7374">Muntadher Sallal</author>
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve Schneider</author>
<author orcid="0000-0003-1835-4803" pid="37/5761">Helen Treharne</author>
<author pid="255/4925">Joe Wadsworth</author>
<author pid="229/1765">Phil Wright</author>
<title>Towards End-to-End Verifiable Online Voting: Adding Verifiability to Established Voting Systems.</title>
<pages>3357-3374</pages>
<year>2024</year>
<month>July - August</month>
<volume>21</volume>
<journal>IEEE Trans. Dependable Secur. Comput.</journal>
<number>4</number>
<ee>https://doi.org/10.1109/TDSC.2023.3327859</ee>
<url>db/journals/tdsc/tdsc21.html#AlsadiCDDRSSTWW24</url>
<stream>streams/journals/tdsc</stream>
</article>
</r>
<r><inproceedings key="conf/birthday/LeedingST24" mdate="2025-07-04">
<author pid="407/6636">Kent Leeding</author>
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve Schneider</author>
<author orcid="0000-0003-1835-4803" pid="37/5761">Helen Treharne</author>
<title>Formal Modelling of Peercoin and Proof-of-Stake Protocols.</title>
<pages>123-143</pages>
<year>2024</year>
<booktitle>The Application of Formal Methods</booktitle>
<ee>https://doi.org/10.1007/978-3-031-67114-2_6</ee>
<crossref>conf/birthday/2024woodcock</crossref>
<url>db/conf/birthday/woodcock2024.html#LeedingST24</url>
</inproceedings>
</r>
<r><inproceedings key="conf/evoteid/ZollingerRSRJ24" mdate="2024-12-09">
<author pid="239/7924">Marie-Laure Zollinger</author>
<author pid="172/4084">Peter B. R&#248;nne</author>
<author pid="s/SASchneider">Steve Schneider</author>
<author pid="r/PeterYARyan">Peter Y. A. Ryan</author>
<author pid="09/966">Wojciech Jamroga</author>
<title>Intelligo Ut Confido: Understanding, Trust and User Experience in Verifiable Receipt-Free E-Voting.</title>
<pages>158-174</pages>
<year>2024</year>
<booktitle>E-Vote-ID</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-031-72244-8_10</ee>
<crossref>conf/evoteid/2024</crossref>
<url>db/conf/evoteid/evoteid2024.html#ZollingerRSRJ24</url>
<stream>streams/conf/evoteid</stream>
</inproceedings>
</r>
<r><inproceedings key="conf/icip/GittingsSC24" mdate="2025-05-05">
<author pid="244/2377">Thomas Gittings</author>
<author pid="s/SASchneider">Steve Schneider</author>
<author pid="72/4504">John P. Collomosse</author>
<title>SegGuard: Defending Scene Segmentation Against Adversarial Patch Attack.</title>
<pages>794-800</pages>
<year>2024</year>
<booktitle>ICIP</booktitle>
<ee>https://doi.org/10.1109/ICIP51287.2024.10648147</ee>
<crossref>conf/icip/2024</crossref>
<url>db/conf/icip/icip2024.html#GittingsSC24</url>
</inproceedings>
</r>
<r><inproceedings key="conf/iciss/FraserSFHS24" mdate="2025-03-03">
<author orcid="0000-0002-2235-4796" pid="247/1548">Ashley Fraser</author>
<author orcid="0000-0002-2894-6434" pid="324/2395">Abubakar-Sadiq Shehu</author>
<author pid="255/5329">Nick Frymann</author>
<author orcid="0009-0006-6731-8322" pid="13/2431">Paul Haynes</author>
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve Schneider</author>
<title>Privacy-Preserving Photo Sharing: An SSI Use Case.</title>
<pages>320-329</pages>
<year>2024</year>
<booktitle>ICISS</booktitle>
<ee>https://doi.org/10.1007/978-3-031-80020-7_18</ee>
<crossref>conf/iciss/2024</crossref>
<url>db/conf/iciss/iciss2024.html#FraserSFHS24</url>
<stream>streams/conf/iciss</stream>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-2407-13240" mdate="2024-08-22">
<author pid="239/7924">Marie-Laure Zollinger</author>
<author pid="172/4084">Peter B. R&#248;nne</author>
<author pid="s/SASchneider">Steve Schneider</author>
<author pid="r/PeterYARyan">Peter Y. A. Ryan</author>
<author pid="09/966">Wojtek Jamroga</author>
<title>Intelligo ut Confido: Understanding, Trust and User Experience in Verifiable Receipt-Free E-Voting (long version).</title>
<year>2024</year>
<volume>abs/2407.13240</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2407.13240</ee>
<url>db/journals/corr/corr2407.html#abs-2407-13240</url>
<stream>streams/journals/corr</stream>
</article>
</r>
<r><inproceedings key="conf/blocksys/DesaiMSSR23" mdate="2025-01-19">
<author orcid="0000-0003-4559-2364" pid="242/0609">Nidhi Desai</author>
<author orcid="0000-0003-1286-0596" pid="192/5198">Damiano Di Francesco Maesa</author>
<author orcid="0000-0002-4053-0386" pid="12/6462">Nishanth Sastry</author>
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve Schneider</author>
<author orcid="0000-0002-8179-8215" pid="84/14">Laura Ricci</author>
<title>Preserving Privacy of Vulnerable Users across Heterogeneous Sensitive Sensor Data Streams using Smart Contracts.</title>
<pages>2-8</pages>
<year>2023</year>
<booktitle>BlockSys</booktitle>
<ee>https://doi.org/10.1145/3628354.3629532</ee>
<ee>https://www.wikidata.org/entity/Q130885718</ee>
<crossref>conf/blocksys/2023</crossref>
<url>db/conf/blocksys/blocksys2023.html#DesaiMSSR23</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ndss/BudykhoBWRLRRS23" mdate="2023-06-15">
<author pid="342/3731">Ksenia Budykho</author>
<author pid="12/4955">Ioana Boureanu</author>
<author pid="18/5892">Stephan Wesemeyer</author>
<author pid="55/4650">Daniel Romero</author>
<author pid="10/5971">Matt Lewis</author>
<author pid="204/5586">Yogaratnam Rahulan</author>
<author pid="323/4722">Fortunat Rajaona</author>
<author pid="s/SASchneider">Steve Schneider</author>
<title>Fine-Grained Trackability in Protocol Executions.</title>
<year>2023</year>
<booktitle>NDSS</booktitle>
<ee type="oa">https://www.ndss-symposium.org/ndss-paper/fine-grained-trackability-in-protocol-executions/</ee>
<crossref>conf/ndss/2023</crossref>
<url>db/conf/ndss/ndss2023.html#BudykhoBWRLRRS23</url>
</inproceedings>
</r>
<r><proceedings key="conf/wisec/2023" mdate="2023-07-03">
<editor pid="12/4955">Ioana Boureanu</editor>
<editor pid="s/SASchneider">Steve Schneider</editor>
<editor pid="117/3983">Bradley Reaves</editor>
<editor pid="32/7125">Nils Ole Tippenhauer</editor>
<title>Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom, 29 May 2023 - 1 June 2023</title>
<booktitle>WiSec</booktitle>
<publisher>ACM</publisher>
<year>2023</year>
<isbn>978-1-4503-9859-6</isbn>
<ee>https://doi.org/10.1145/3558482</ee>
<url>db/conf/wisec/wisec2023.html</url>
</proceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-2311-03372" mdate="2025-12-14">
<author pid="09/966">Wojciech Jamroga</author>
<author pid="r/PeterYARyan">Peter Y. A. Ryan</author>
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve Schneider</author>
<author pid="07/4034-1">Carsten Sch&#252;rmann 0001</author>
<author pid="27/4727">Philip B. Stark</author>
<title>A Declaration of Software Independence.</title>
<year>2023</year>
<volume>abs/2311.03372</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2311.03372</ee>
<url>db/journals/corr/corr2311.html#abs-2311-03372</url>
</article>
</r>
<r><article key="journals/fac/KulikDLMSTW22" mdate="2025-03-03">
<author orcid="0000-0002-8483-1252" pid="223/6374">Tomas Kulik</author>
<author orcid="0000-0003-0446-3507" pid="01/4516">Brijesh Dongol</author>
<author orcid="0000-0002-4589-1500" pid="40/6670">Peter Gorm Larsen</author>
<author orcid="0000-0002-8882-4500" pid="46/1948">Hugo Daniel Macedo</author>
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve Schneider</author>
<author pid="145/2703">Peter W. V. Tran-J&#248;rgensen</author>
<author orcid="0000-0001-7955-2702" pid="w/JWoodcock">Jim Woodcock 0001</author>
<title>A Survey of Practical Formal Methods for Security.</title>
<pages>1-39</pages>
<year>2022</year>
<volume>34</volume>
<journal>Formal Aspects Comput.</journal>
<number>1</number>
<ee type="oa">https://doi.org/10.1145/3522582</ee>
<ee>https://www.wikidata.org/entity/Q131120909</ee>
<url>db/journals/fac/fac34.html#KulikDLMSTW22</url>
</article>
</r>
<r><article key="journals/tdsc/HanCSTW21" mdate="2023-08-06">
<author orcid="0000-0002-4993-9452" pid="77/9673">Jinguang Han</author>
<author orcid="0000-0003-2680-4907" pid="22/150-2">Liqun Chen 0002</author>
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve Schneider</author>
<author orcid="0000-0003-1835-4803" pid="37/5761">Helen Treharne</author>
<author orcid="0000-0002-7167-0146" pid="18/5892">Stephan Wesemeyer</author>
<title>Privacy-Preserving Electronic Ticket Scheme with Attribute-Based Credentials.</title>
<pages>1836-1849</pages>
<year>2021</year>
<volume>18</volume>
<journal>IEEE Trans. Dependable Secur. Comput.</journal>
<number>4</number>
<ee>https://doi.org/10.1109/TDSC.2019.2940946</ee>
<url>db/journals/tdsc/tdsc18.html#HanCSTW21</url>
</article>
</r>
<r><inproceedings key="conf/birthday/JamrogaRSSS21" mdate="2025-12-14">
<author orcid="0000-0001-6340-8845" pid="09/966">Wojciech Jamroga</author>
<author pid="r/PeterYARyan">Peter Y. A. Ryan</author>
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve Schneider</author>
<author pid="07/4034-1">Carsten Sch&#252;rmann 0001</author>
<author pid="27/4727">Philip B. Stark</author>
<title>A Declaration of Software Independence.</title>
<pages>198-217</pages>
<year>2021</year>
<booktitle>Protocols, Strands, and Logic</booktitle>
<ee>https://doi.org/10.1007/978-3-030-91631-2_11</ee>
<crossref>conf/birthday/2021guttman</crossref>
<url>db/conf/birthday/guttman2021.html#JamrogaRSSS21</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-2109-01362" mdate="2023-02-17">
<author pid="223/6374">Tomas Kulik</author>
<author pid="01/4516">Brijesh Dongol</author>
<author pid="40/6670">Peter Gorm Larsen</author>
<author pid="46/1948">Hugo Daniel Macedo</author>
<author pid="s/SASchneider">Steve Schneider</author>
<author pid="145/2703">Peter W&#252;rtz Vinther Tran-J&#248;rgensen</author>
<author pid="w/JWoodcock">Jim Woodcock 0001</author>
<title>A Survey of Practical Formal Methods for Security.</title>
<year>2021</year>
<volume>abs/2109.01362</volume>
<journal>CoRR</journal>
<ee type="oa">https://arxiv.org/abs/2109.01362</ee>
<url>db/journals/corr/corr2109.html#abs-2109-01362</url>
</article>
</r>
<r><article key="journals/fac/WilliamsDSM20" mdate="2021-05-14">
<author orcid="0000-0002-5272-8058" pid="00/4041">David M. Williams</author>
<author orcid="0000-0003-1175-5970" pid="119/3562">Salaheddin Darwish</author>
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve Schneider</author>
<author pid="271/8841">David R. Michael</author>
<title>Legislation-driven development of a Gift Aid system using Event-B.</title>
<pages>251-273</pages>
<year>2020</year>
<volume>32</volume>
<journal>Formal Aspects Comput.</journal>
<number>2-3</number>
<ee type="oa">https://doi.org/10.1007/s00165-020-00512-5</ee>
<url>db/journals/fac/fac32.html#WilliamsDSM20</url>
</article>
</r>
<r><article key="journals/tifs/HanCSTWW20" mdate="2025-01-19">
<author orcid="0000-0002-4993-9452" pid="77/9673">Jinguang Han</author>
<author orcid="0000-0003-2680-4907" pid="22/150-2">Liqun Chen 0002</author>
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<author orcid="0000-0003-1835-4803" pid="37/5761">Helen Treharne</author>
<author orcid="0000-0002-7167-0146" pid="18/5892">Stephan Wesemeyer</author>
<author pid="38/239">Nick Wilson</author>
<title>Anonymous Single Sign-On With Proxy Re-Verification.</title>
<pages>223-236</pages>
<year>2020</year>
<volume>15</volume>
<journal>IEEE Trans. Inf. Forensics Secur.</journal>
<ee>https://doi.org/10.1109/TIFS.2019.2919926</ee>
<ee>https://www.wikidata.org/entity/Q127706888</ee>
<url>db/journals/tifs/tifs15.html#HanCSTWW20</url>
</article>
</r>
<r><inproceedings key="conf/accv/GittingsSC20" mdate="2025-10-14">
<author orcid="0000-0003-3405-9185" pid="244/2377">Thomas Gittings</author>
<author pid="s/SASchneider">Steve Schneider</author>
<author orcid="0000-0003-3580-4685" pid="72/4504">John P. Collomosse</author>
<title>Vax-a-Net: Training-Time Defence Against Adversarial Patch Attacks.</title>
<pages>235-251</pages>
<year>2020</year>
<booktitle>ACCV (4)</booktitle>
<ee>https://doi.org/10.1007/978-3-030-69538-5_15</ee>
<crossref>conf/accv/2020-4</crossref>
<url>db/conf/accv/accv2020-4.html#GittingsSC20</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icdcs/SallalSCDTDRW20" mdate="2025-05-31">
<author orcid="0000-0002-1755-3264" pid="181/7374">Muntadher Sallal</author>
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve Schneider</author>
<author pid="27/7687-1">Matthew Casey 0001</author>
<author pid="57/10027">Fran&#231;ois Dupressoir</author>
<author orcid="0000-0003-1835-4803" pid="37/5761">Helen Treharne</author>
<author orcid="0000-0002-4033-9880" pid="77/7303">Constantin Catalin Dragan</author>
<author pid="80/11131">Luke Riley</author>
<author pid="229/1765">Phil Wright</author>
<title>Augmenting an Internet Voting System with Selene Verifiability using Permissioned Distributed Ledger.</title>
<pages>1167-1168</pages>
<year>2020</year>
<booktitle>ICDCS</booktitle>
<ee>https://doi.org/10.1109/ICDCS47774.2020.00124</ee>
<crossref>conf/icdcs/2020</crossref>
<url>db/conf/icdcs/icdcs2020.html#SallalSCDTDRW20</url>
</inproceedings>
</r>
<r><proceedings key="conf/esorics/2020-1" mdate="2026-02-10">
<editor orcid="0000-0003-2680-4907" pid="22/150-2">Liqun Chen 0002</editor>
<editor pid="l/NinghuiLi">Ninghui Li 0001</editor>
<editor orcid="0000-0003-0262-7678" pid="126/6037">Kaitai Liang</editor>
<editor orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</editor>
<title>Computer Security - ESORICS 2020 - 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14-18, 2020, Proceedings, Part I</title>
<booktitle>ESORICS (1)</booktitle>
<publisher>Springer</publisher>
<year>2020</year>
<series href="db/series/lncs/index.html">Lecture Notes in Computer Science</series>
<volume>12308</volume>
<isbn>978-3-030-58950-9</isbn>
<isbn>978-3-030-58951-6</isbn>
<ee>https://doi.org/10.1007/978-3-030-58951-6</ee>
<url>db/conf/esorics/esorics2020-1.html</url>
</proceedings>
</r>
<r><proceedings key="conf/esorics/2020-2" mdate="2026-02-10">
<editor orcid="0000-0003-2680-4907" pid="22/150-2">Liqun Chen 0002</editor>
<editor pid="l/NinghuiLi">Ninghui Li 0001</editor>
<editor orcid="0000-0003-0262-7678" pid="126/6037">Kaitai Liang</editor>
<editor orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</editor>
<title>Computer Security - ESORICS 2020 - 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14-18, 2020, Proceedings, Part II</title>
<booktitle>ESORICS (2)</booktitle>
<publisher>Springer</publisher>
<year>2020</year>
<series href="db/series/lncs/index.html">Lecture Notes in Computer Science</series>
<volume>12309</volume>
<isbn>978-3-030-59012-3</isbn>
<isbn>978-3-030-59013-0</isbn>
<ee>https://doi.org/10.1007/978-3-030-59013-0</ee>
<url>db/conf/esorics/esorics2020-2.html</url>
</proceedings>
</r>
<r><data key="data/11/AlsadiS20" mdate="2025-09-29">
<author orcid="0000-0003-1635-5132" pid="168/6514-1">Mohammed Alsadi 0001</author>
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve Schneider</author>
<title>Verify My Vote: Voter Experience Questionnaire Results.</title>
<year>2020</year>
<month>August</month>
<ee type="oa">https://doi.org/10.5281/zenodo.4002106</ee>
<publisher>Zenodo</publisher>
<stream>streams/repo/zenodo</stream>
<rel sort="1" label="Version 1" uri="https://doi.org/10.5281/zenodo.4002105" type="versionOf"></rel>
</data>
</r>
<r><article publtype="informal" key="journals/corr/abs-2009-08194" mdate="2020-09-24">
<author pid="244/2377">Thomas Gittings</author>
<author pid="s/SASchneider">Steve A. Schneider</author>
<author pid="72/4504">John P. Collomosse</author>
<title>Vax-a-Net: Training-time Defence Against Adversarial Patch Attacks.</title>
<year>2020</year>
<volume>abs/2009.08194</volume>
<journal>CoRR</journal>
<ee type="oa">https://arxiv.org/abs/2009.08194</ee>
<url>db/journals/corr/corr2009.html#abs-2009-08194</url>
</article>
</r>
<r><inproceedings key="conf/bmvc/GittingsSC19" mdate="2026-03-24">
<author pid="244/2377">Thomas Gittings</author>
<author pid="s/SASchneider">Steve A. Schneider</author>
<author pid="72/4504">John P. Collomosse</author>
<title>Robust Synthesis of Adversarial Visual Examples Using a Deep Image Prior.</title>
<publnr>283</publnr>
<year>2019</year>
<booktitle>BMVC</booktitle>
<ee type="archive">https://bmvc2019.org/wp-content/uploads/papers/0165-paper.pdf</ee>
<crossref>conf/bmvc/2019</crossref>
<url>db/conf/bmvc/bmvc2019.html#GittingsSC19</url>
</inproceedings>
</r>
<r><inproceedings key="conf/eurosp/WhitefieldCSSTW19" mdate="2024-02-05">
<author pid="177/9145">Jorden Whitefield</author>
<author orcid="0000-0003-2680-4907" pid="22/150-2">Liqun Chen 0002</author>
<author pid="35/4406">Ralf Sasse</author>
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<author orcid="0000-0003-1835-4803" pid="37/5761">Helen Treharne</author>
<author orcid="0000-0002-7167-0146" pid="18/5892">Stephan Wesemeyer</author>
<title>A Symbolic Analysis of ECC-Based Direct Anonymous Attestation.</title>
<pages>127-141</pages>
<year>2019</year>
<booktitle>EuroS&#38;P</booktitle>
<ee>https://doi.org/10.1109/EuroSP.2019.00019</ee>
<crossref>conf/eurosp/2019</crossref>
<url>db/conf/eurosp/eurosp2019.html#WhitefieldCSSTW19</url>
</inproceedings>
</r>
<r><proceedings key="conf/esorics/2019-1" mdate="2020-08-07">
<editor pid="21/714">Kazue Sako</editor>
<editor pid="s/SASchneider">Steve A. Schneider</editor>
<editor pid="r/PeterYARyan">Peter Y. A. Ryan</editor>
<title>Computer Security - ESORICS 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part I</title>
<booktitle>ESORICS (1)</booktitle>
<publisher>Springer</publisher>
<year>2019</year>
<series href="db/series/lncs/index.html">Lecture Notes in Computer Science</series>
<volume>11735</volume>
<isbn>978-3-030-29958-3</isbn>
<isbn>978-3-030-29959-0</isbn>
<ee>https://doi.org/10.1007/978-3-030-29959-0</ee>
<url>db/conf/esorics/esorics2019-1.html</url>
</proceedings>
</r>
<r><proceedings key="conf/esorics/2019-2" mdate="2024-02-05">
<editor pid="21/714">Kazue Sako</editor>
<editor orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</editor>
<editor pid="r/PeterYARyan">Peter Y. A. Ryan</editor>
<title>Computer Security - ESORICS 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part II</title>
<booktitle>ESORICS (2)</booktitle>
<publisher>Springer</publisher>
<year>2019</year>
<series href="db/series/lncs/index.html">Lecture Notes in Computer Science</series>
<volume>11736</volume>
<isbn>978-3-030-29961-3</isbn>
<isbn>978-3-030-29962-0</isbn>
<ee>https://doi.org/10.1007/978-3-030-29962-0</ee>
<url>db/conf/esorics/esorics2019-2.html</url>
</proceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-1907-01996" mdate="2020-08-07">
<author pid="244/2377">Thomas Gittings</author>
<author pid="s/SASchneider">Steve A. Schneider</author>
<author pid="72/4504">John P. Collomosse</author>
<title>Robust Synthesis of Adversarial Visual Examples Using a Deep Image Prior.</title>
<year>2019</year>
<volume>abs/1907.01996</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1907.01996</ee>
<url>db/journals/corr/corr1907.html#abs-1907-01996</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-1912-00288" mdate="2024-11-04">
<author pid="181/7374">Muntadher Sallal</author>
<author pid="s/SASchneider">Steve A. Schneider</author>
<author pid="27/7687-1">Matthew Casey 0001</author>
<author pid="77/7303">Constantin Catalin Dragan</author>
<author pid="57/10027">Fran&#231;ois Dupressoir</author>
<author pid="80/11131">Luke Riley</author>
<author pid="37/5761">Helen Treharne</author>
<author pid="255/4925">Joe Wadsworth</author>
<author pid="229/1765">Phil Wright</author>
<title>VMV: Augmenting an Internet Voting System with Selene Verifiability.</title>
<year>2019</year>
<volume>abs/1912.00288</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1912.00288</ee>
<url>db/journals/corr/corr1912.html#abs-1912-00288</url>
</article>
</r>
<r><inproceedings key="conf/esorics/HanCSTW18" mdate="2023-08-06">
<author orcid="0000-0002-4993-9452" pid="77/9673">Jinguang Han</author>
<author orcid="0000-0003-2680-4907" pid="22/150-2">Liqun Chen 0002</author>
<author pid="s/SASchneider">Steve A. Schneider</author>
<author orcid="0000-0003-1835-4803" pid="37/5761">Helen Treharne</author>
<author orcid="0000-0002-7167-0146" pid="18/5892">Stephan Wesemeyer</author>
<title>Anonymous Single-Sign-On for n Designated Services with Traceability.</title>
<pages>470-490</pages>
<year>2018</year>
<booktitle>ESORICS (1)</booktitle>
<ee>https://doi.org/10.1007/978-3-319-99073-6_23</ee>
<crossref>conf/esorics/2018-1</crossref>
<url>db/conf/esorics/esorics2018-1.html#HanCSTW18</url>
</inproceedings>
</r>
<r><proceedings key="conf/isw/2018" mdate="2024-08-20">
<editor pid="22/150-2">Liqun Chen 0002</editor>
<editor pid="62/484">Mark Manulis</editor>
<editor pid="s/SASchneider">Steve A. Schneider</editor>
<title>Information Security - 21st International Conference, ISC 2018, Guildford, UK, September 9-12, 2018, Proceedings</title>
<booktitle>ISC</booktitle>
<publisher>Springer</publisher>
<year>2018</year>
<series href="db/series/lncs/index.html">Lecture Notes in Computer Science</series>
<volume>11060</volume>
<isbn>978-3-319-99135-1</isbn>
<isbn>978-3-319-99136-8</isbn>
<ee>https://doi.org/10.1007/978-3-319-99136-8</ee>
<url>db/conf/isw/isc2018.html</url>
</proceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-1804-07201" mdate="2021-07-06">
<author pid="77/9673">Jinguang Han</author>
<author pid="22/150-2">Liqun Chen 0002</author>
<author pid="s/SASchneider">Steve A. Schneider</author>
<author pid="37/5761">Helen Treharne</author>
<author pid="18/5892">Stephan Wesemeyer</author>
<title>Anonymous Single-Sign-On for n designated services with traceability.</title>
<year>2018</year>
<volume>abs/1804.07201</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1804.07201</ee>
<url>db/journals/corr/corr1804.html#abs-1804-07201</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-1811-07642" mdate="2021-07-06">
<author pid="77/9673">Jinguang Han</author>
<author pid="22/150-2">Liqun Chen 0002</author>
<author pid="s/SASchneider">Steve A. Schneider</author>
<author pid="37/5761">Helen Treharne</author>
<author pid="18/5892">Stephan Wesemeyer</author>
<author pid="38/239">Nick Wilson</author>
<title>Anonymous Single Sign-on with Proxy Re-Verification.</title>
<year>2018</year>
<volume>abs/1811.07642</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1811.07642</ee>
<url>db/journals/corr/corr1811.html#abs-1811-07642</url>
</article>
</r>
<r><article key="journals/ieeesp/BenalohRST17" mdate="2020-08-07">
<author pid="53/5909">Josh Benaloh</author>
<author orcid="0000-0002-1677-9034" pid="r/PeterYARyan">Peter Y. A. Ryan</author>
<author pid="s/SASchneider">Steve A. Schneider</author>
<author pid="t/VanessaTeague">Vanessa Teague</author>
<title>A Vote of Confidence?</title>
<pages>12-13</pages>
<year>2017</year>
<volume>15</volume>
<journal>IEEE Secur. Priv.</journal>
<number>3</number>
<ee>https://doi.org/10.1109/MSP.2017.53</ee>
<ee>http://doi.ieeecomputersociety.org/10.1109/MSP.2017.53</ee>
<url>db/journals/ieeesp/ieeesp15.html#BenalohRST17</url>
</article>
</r>
<r><inproceedings key="conf/stm/WhitefieldCKPST17" mdate="2023-08-06">
<author orcid="0000-0002-9528-6632" pid="177/9145">Jorden Whitefield</author>
<author orcid="0000-0003-2680-4907" pid="22/150-2">Liqun Chen 0002</author>
<author pid="46/306">Frank Kargl</author>
<author orcid="0000-0003-2188-5285" pid="30/9784">Andrew Paverd</author>
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<author orcid="0000-0003-1835-4803" pid="37/5761">Helen Treharne</author>
<author orcid="0000-0002-7167-0146" pid="18/5892">Stephan Wesemeyer</author>
<title>Formal Analysis of V2X Revocation Protocols.</title>
<pages>147-163</pages>
<year>2017</year>
<booktitle>STM</booktitle>
<ee>https://doi.org/10.1007/978-3-319-68063-7_10</ee>
<crossref>conf/stm/2017</crossref>
<url>db/conf/stm/stm2017.html#WhitefieldCKPST17</url>
</inproceedings>
</r>
<r><inproceedings key="conf/vnc/WhitefieldCGST17" mdate="2025-04-01">
<author orcid="0000-0002-9528-6632" pid="177/9145">Jorden Whitefield</author>
<author orcid="0000-0003-2680-4907" pid="22/150-2">Liqun Chen 0002</author>
<author orcid="0000-0003-0663-2263" pid="96/1667">Thanassis Giannetsos</author>
<author pid="s/SASchneider">Steve A. Schneider</author>
<author orcid="0000-0003-1835-4803" pid="37/5761">Helen Treharne</author>
<title>Privacy-enhanced capabilities for VANETs using direct anonymous attestation.</title>
<pages>123-130</pages>
<year>2017</year>
<booktitle>VNC</booktitle>
<ee>https://doi.org/10.1109/VNC.2017.8275615</ee>
<crossref>conf/vnc/2017</crossref>
<url>db/conf/vnc/vnc2017.html#WhitefieldCGST17</url>
</inproceedings>
</r>
<r><proceedings key="conf/ifm/2017" mdate="2020-08-07">
<editor pid="13/7489">Nadia Polikarpova</editor>
<editor pid="s/SASchneider">Steve A. Schneider</editor>
<title>Integrated Formal Methods - 13th International Conference, IFM 2017, Turin, Italy, September 20-22, 2017, Proceedings</title>
<booktitle>IFM</booktitle>
<publisher>Springer</publisher>
<year>2017</year>
<series href="db/series/lncs/index.html">Lecture Notes in Computer Science</series>
<volume>10510</volume>
<isbn>978-3-319-66844-4</isbn>
<isbn>978-3-319-66845-1</isbn>
<ee>https://doi.org/10.1007/978-3-319-66845-1</ee>
<url>db/conf/ifm/ifm2017.html</url>
</proceedings>
</r>
<r><article publtype="informal" key="journals/corr/WhitefieldCKPST17" mdate="2021-07-06">
<author pid="177/9145">Jorden Whitefield</author>
<author pid="22/150-2">Liqun Chen 0002</author>
<author pid="46/306">Frank Kargl</author>
<author pid="30/9784">Andrew Paverd</author>
<author pid="s/SASchneider">Steve A. Schneider</author>
<author pid="37/5761">Helen Treharne</author>
<author pid="18/5892">Stephan Wesemeyer</author>
<title>Formal Analysis of V2X Revocation Protocols.</title>
<year>2017</year>
<volume>abs/1704.07216</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1704.07216</ee>
<url>db/journals/corr/corr1704.html#WhitefieldCKPST17</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/HanCST17" mdate="2021-07-06">
<author pid="77/9673">Jinguang Han</author>
<author pid="22/150-2">Liqun Chen 0002</author>
<author pid="s/SASchneider">Steve A. Schneider</author>
<author pid="37/5761">Helen Treharne</author>
<title>PPETS-FGP: Privacy-Preserving Electronic Ticket Scheme with Fine-Grained Pricing.</title>
<year>2017</year>
<volume>abs/1706.03016</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1706.03016</ee>
<url>db/journals/corr/corr1706.html#HanCST17</url>
</article>
</r>
<r><article key="journals/fac/HoangSTW16" mdate="2023-09-30">
<author orcid="0000-0003-4095-0732" pid="38/3500">Thai Son Hoang</author>
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<author orcid="0000-0003-1835-4803" pid="37/5761">Helen Treharne</author>
<author orcid="0000-0002-5272-8058" pid="00/4041">David M. Williams</author>
<title>Foundations for using linear temporal logic in Event-B refinement.</title>
<pages>909-935</pages>
<year>2016</year>
<volume>28</volume>
<journal>Formal Aspects Comput.</journal>
<number>6</number>
<ee type="oa">https://doi.org/10.1007/s00165-016-0376-0</ee>
<ee>https://www.wikidata.org/entity/Q59477094</ee>
<url>db/journals/fac/fac28.html#HoangSTW16</url>
</article>
</r>
<r><article key="journals/ieeesp/BurtonCS16" mdate="2022-12-07">
<author pid="00/275">Craig Burton</author>
<author pid="64/3207">Chris Culnane</author>
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<title>vVote: Verifiable Electronic Voting in Practice.</title>
<pages>64-73</pages>
<year>2016</year>
<volume>14</volume>
<journal>IEEE Secur. Priv.</journal>
<number>4</number>
<ee>https://doi.org/10.1109/MSP.2016.69</ee>
<ee>http://doi.ieeecomputersociety.org/10.1109/MSP.2016.69</ee>
<url>db/journals/ieeesp/ieeesp14.html#BurtonCS16</url>
</article>
</r>
<r><article key="journals/sosym/MoranHS16" mdate="2020-09-18">
<author orcid="0000-0001-5557-4827" pid="129/9131">Murat Moran</author>
<author pid="36/3662">James Heather</author>
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<title>Automated anonymity verification of the ThreeBallot and VAV voting systems.</title>
<pages>1049-1062</pages>
<year>2016</year>
<volume>15</volume>
<journal>Softw. Syst. Model.</journal>
<number>4</number>
<ee>https://doi.org/10.1007/s10270-014-0445-x</ee>
<ee>https://www.wikidata.org/entity/Q60173551</ee>
<url>db/journals/sosym/sosym15.html#MoranHS16</url>
</article>
</r>
<r><incollection key="books/crc/p/SchneiderTW16" mdate="2017-05-16">
<author pid="s/SASchneider">Steve A. Schneider</author>
<author pid="37/5761">Helen Treharne</author>
<author pid="00/4041">David M. Williams</author>
<title>Event-B and Linear Temporal Logic.</title>
<pages>113-123</pages>
<year>2016</year>
<booktitle>From Action Systems to Distributed Systems</booktitle>
<ee>https://doi.org/10.1201/b20053-12</ee>
<crossref>books/crc/asds2016</crossref>
<url>db/books/collections/asds2016.html#SchneiderTW16</url>
</incollection>
</r>
<r><proceedings key="conf/acns/2016" mdate="2020-08-07">
<editor orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</editor>
<editor pid="s/AhmadRezaSadeghi">Ahmad-Reza Sadeghi</editor>
<editor pid="s/SASchneider">Steve A. Schneider</editor>
<title>Applied Cryptography and Network Security - 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings</title>
<booktitle>ACNS</booktitle>
<publisher>Springer</publisher>
<year>2016</year>
<series href="db/series/lncs/index.html">Lecture Notes in Computer Science</series>
<volume>9696</volume>
<isbn>978-3-319-39554-8</isbn>
<ee>https://doi.org/10.1007/978-3-319-39555-5</ee>
<url>db/conf/acns/acns2016.html</url>
</proceedings>
</r>
<r><article key="journals/ieeesp/RyanST15" mdate="2020-03-15">
<author orcid="0000-0002-1677-9034" pid="r/PeterYARyan">Peter Y. A. Ryan</author>
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<author pid="t/VanessaTeague">Vanessa Teague</author>
<title>End-to-End Verifiability in Voting Systems, from Theory to Practice.</title>
<pages>59-62</pages>
<year>2015</year>
<volume>13</volume>
<journal>IEEE Secur. Priv.</journal>
<number>3</number>
<ee>https://doi.org/10.1109/MSP.2015.54</ee>
<ee>http://doi.ieeecomputersociety.org/10.1109/MSP.2015.54</ee>
<ee>https://www.wikidata.org/entity/Q60173552</ee>
<url>db/journals/ieeesp/ieeesp13.html#RyanST15</url>
</article>
</r>
<r><article key="journals/jcs/AlshehriS15" mdate="2023-08-28">
<author pid="142/3272-1">Abdullah Ali Alshehri 0001</author>
<author pid="s/SASchneider">Steve A. Schneider</author>
<title>A formal framework for security analysis of NFC mobile coupon protocols.</title>
<pages>685-707</pages>
<year>2015</year>
<volume>23</volume>
<journal>J. Comput. Secur.</journal>
<number>6</number>
<ee>https://doi.org/10.3233/JCS-150531</ee>
<ee>https://www.wikidata.org/entity/Q114944853</ee>
<url>db/journals/jcs/jcs23.html#AlshehriS15</url>
</article>
</r>
<r><article key="journals/scp/SchneiderT15" mdate="2021-02-17">
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<author orcid="0000-0003-1835-4803" pid="37/5761">Helen Treharne</author>
<title>Special issue on Automated Verification of Critical Systems (AVoCS 2013).</title>
<pages>213</pages>
<year>2015</year>
<volume>111</volume>
<journal>Sci. Comput. Program.</journal>
<ee type="oa">https://doi.org/10.1016/j.scico.2015.08.006</ee>
<ee>https://www.wikidata.org/entity/Q60173553</ee>
<url>db/journals/scp/scp111.html#SchneiderT15</url>
</article>
</r>
<r><article key="journals/tissec/CulnaneRST15" mdate="2019-10-19">
<author orcid="0000-0002-9543-1342" pid="64/3207">Chris Culnane</author>
<author orcid="0000-0002-1677-9034" pid="r/PeterYARyan">Peter Y. A. Ryan</author>
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<author pid="t/VanessaTeague">Vanessa Teague</author>
<title>vVote: A Verifiable Voting System.</title>
<pages>3:1-3:30</pages>
<year>2015</year>
<volume>18</volume>
<journal>ACM Trans. Inf. Syst. Secur.</journal>
<number>1</number>
<ee>https://doi.org/10.1145/2746338</ee>
<ee>https://www.wikidata.org/entity/Q60173554</ee>
<url>db/journals/tissec/tissec18.html#CulnaneRST15</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/BurtonCS15" mdate="2020-08-07">
<author pid="00/275">Craig Burton</author>
<author pid="64/3207">Chris Culnane</author>
<author pid="s/SASchneider">Steve A. Schneider</author>
<title>Secure and Verifiable Electronic Voting in Practice: the use of vVote in the Victorian State Election.</title>
<year>2015</year>
<volume>abs/1504.07098</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1504.07098</ee>
<url>db/journals/corr/corr1504.html#BurtonCS15</url>
</article>
</r>
<r><article key="journals/fac/BoitenS14" mdate="2024-08-04">
<author orcid="0000-0002-9184-8968" pid="b/EABoiten">Eerke A. Boiten</author>
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<title>Editorial.</title>
<pages>1-2</pages>
<year>2014</year>
<volume>26</volume>
<journal>Formal Aspects Comput.</journal>
<number>1</number>
<ee type="oa">https://doi.org/10.1007/s00165-013-0290-7</ee>
<ee>https://www.wikidata.org/entity/Q60173557</ee>
<url>db/journals/fac/fac26.html#BoitenS14</url>
</article>
</r>
<r><article key="journals/fac/HeatherST14" mdate="2022-05-09">
<author pid="36/3662">James Heather</author>
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<author pid="t/VanessaTeague">Vanessa Teague</author>
<title>Cryptographic protocols with everyday objects.</title>
<pages>37-62</pages>
<year>2014</year>
<volume>26</volume>
<journal>Formal Aspects Comput.</journal>
<number>1</number>
<ee type="oa">https://doi.org/10.1007/s00165-013-0274-7</ee>
<ee>https://www.wikidata.org/entity/Q60173556</ee>
<url>db/journals/fac/fac26.html#HeatherST14</url>
</article>
</r>
<r><article key="journals/fac/MoranHS14" mdate="2022-05-09">
<author orcid="0000-0001-5557-4827" pid="129/9131">Murat Moran</author>
<author pid="36/3662">James Heather</author>
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<title>Verifying anonymity in voting systems using CSP.</title>
<pages>63-98</pages>
<year>2014</year>
<volume>26</volume>
<journal>Formal Aspects Comput.</journal>
<number>1</number>
<ee type="oa">https://doi.org/10.1007/s00165-012-0268-x</ee>
<ee>https://www.wikidata.org/entity/Q60173563</ee>
<url>db/journals/fac/fac26.html#MoranHS14</url>
</article>
</r>
<r><article key="journals/fac/SchneiderTW14" mdate="2022-05-09">
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<author orcid="0000-0003-1835-4803" pid="37/5761">Helen Treharne</author>
<author pid="w/HeikeWehrheim">Heike Wehrheim</author>
<title>The behavioural semantics of Event-B refinement.</title>
<pages>251-280</pages>
<year>2014</year>
<volume>26</volume>
<journal>Formal Aspects Comput.</journal>
<number>2</number>
<ee type="oa">https://doi.org/10.1007/s00165-012-0265-0</ee>
<ee>https://www.wikidata.org/entity/Q60173560</ee>
<url>db/journals/fac/fac26.html#SchneiderTW14</url>
</article>
</r>
<r><article key="journals/istr/SchneiderTCH14" mdate="2024-02-05">
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<author pid="t/VanessaTeague">Vanessa Teague</author>
<author orcid="0000-0002-9543-1342" pid="64/3207">Chris Culnane</author>
<author pid="36/3662">James Heather</author>
<title>Special Section on Vote-ID 2013.</title>
<pages>103-104</pages>
<year>2014</year>
<volume>19</volume>
<journal>J. Inf. Secur. Appl.</journal>
<number>2</number>
<ee>https://doi.org/10.1016/j.jisa.2014.06.002</ee>
<url>db/journals/istr/istr19.html#SchneiderTCH14</url>
</article>
</r>
<r><article key="journals/scp/JamesMNRST14" mdate="2021-05-19">
<author pid="31/10525">Phillip James</author>
<author orcid="0000-0001-9535-8053" pid="m/FaronMoller">Faron Moller</author>
<author pid="21/2630">Hoang Nga Nguyen</author>
<author orcid="0000-0002-3819-2787" pid="86/743">Markus Roggenbach</author>
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<author orcid="0000-0003-1835-4803" pid="37/5761">Helen Treharne</author>
<title>On modelling and verifying railway interlockings: Tracking train lengths.</title>
<pages>315-336</pages>
<year>2014</year>
<volume>96</volume>
<journal>Sci. Comput. Program.</journal>
<ee type="oa">https://doi.org/10.1016/j.scico.2014.04.005</ee>
<ee>https://www.wikidata.org/entity/Q59556883</ee>
<url>db/journals/scp/scp96.html#JamesMNRST14</url>
</article>
</r>
<r><article key="journals/sttt/JamesMNRST14" mdate="2021-05-19">
<author pid="31/10525">Phillip James</author>
<author orcid="0000-0001-9535-8053" pid="m/FaronMoller">Faron Moller</author>
<author orcid="0000-0003-0260-1697" pid="21/2630">Nguyen Hoang Nga</author>
<author orcid="0000-0002-3819-2787" pid="86/743">Markus Roggenbach</author>
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<author orcid="0000-0003-1835-4803" pid="37/5761">Helen Treharne</author>
<title>Techniques for modelling and verifying railway interlockings.</title>
<pages>685-711</pages>
<year>2014</year>
<volume>16</volume>
<journal>Int. J. Softw. Tools Technol. Transf.</journal>
<number>6</number>
<ee>https://doi.org/10.1007/s10009-014-0304-7</ee>
<ee>https://www.wikidata.org/entity/Q59556879</ee>
<url>db/journals/sttt/sttt16.html#JamesMNRST14</url>
</article>
</r>
<r><inproceedings key="conf/csfw/CulnaneS14" mdate="2023-03-24">
<author orcid="0000-0002-9543-1342" pid="64/3207">Chris Culnane</author>
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<title>A Peered Bulletin Board for Robust Use in Verifiable Voting Systems.</title>
<pages>169-183</pages>
<year>2014</year>
<booktitle>CSF</booktitle>
<ee>https://doi.org/10.1109/CSF.2014.20</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/CSF.2014.20</ee>
<ee>https://www.wikidata.org/entity/Q60173555</ee>
<crossref>conf/csfw/2014</crossref>
<url>db/conf/csfw/csf2014.html#CulnaneS14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ifm/SchneiderTWW14" mdate="2019-10-19">
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<author orcid="0000-0003-1835-4803" pid="37/5761">Helen Treharne</author>
<author pid="w/HeikeWehrheim">Heike Wehrheim</author>
<author orcid="0000-0002-5272-8058" pid="00/4041">David M. Williams</author>
<title>Managing LTL Properties in Event-B Refinement.</title>
<pages>221-237</pages>
<year>2014</year>
<booktitle>IFM</booktitle>
<ee>https://doi.org/10.1007/978-3-319-10181-1_14</ee>
<ee>https://www.wikidata.org/entity/Q60173559</ee>
<crossref>conf/ifm/2014</crossref>
<url>db/conf/ifm/ifm2014.html#SchneiderTWW14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/nss/SrinivasanCHSX14" mdate="2022-12-07">
<author pid="54/3351">Sriramkrishnan Srinivasan</author>
<author pid="64/3207">Chris Culnane</author>
<author pid="36/3662">James Heather</author>
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<author pid="43/4169">Zhe Xia</author>
<title>Countering Ballot Stuffing and Incorporating Eligibility Verifiability in Helios.</title>
<pages>335-348</pages>
<year>2014</year>
<booktitle>NSS</booktitle>
<ee>https://doi.org/10.1007/978-3-319-11698-3_26</ee>
<crossref>conf/nss/2014</crossref>
<url>db/conf/nss/nss2014.html#SrinivasanCHSX14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/secsr/StathakidisSH14" mdate="2022-12-07">
<author pid="143/4042">Efstathios Stathakidis</author>
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<author pid="36/3662">James Heather</author>
<title>Robustness Modelling and Verification of a Mix Net Protocol.</title>
<pages>131-150</pages>
<year>2014</year>
<booktitle>SSR</booktitle>
<ee>https://doi.org/10.1007/978-3-319-14054-4_9</ee>
<crossref>conf/secsr/2014</crossref>
<url>db/conf/secsr/ssr2014.html#StathakidisSH14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/uss/CulnaneHJRST14" mdate="2021-02-01">
<author pid="64/3207">Chris Culnane</author>
<author pid="36/3662">James Heather</author>
<author pid="94/6500">Rui Joaquim</author>
<author pid="r/PeterYARyan">Peter Y. A. Ryan</author>
<author pid="s/SASchneider">Steve A. Schneider</author>
<author pid="t/VanessaTeague">Vanessa Teague</author>
<title>Faster Print on Demand for Pr&#234;t &#224; Voter.</title>
<year>2014</year>
<booktitle>EVT/WOTE</booktitle>
<ee type="oa">https://www.usenix.org/conference/evtwote14/workshop-program/presentation/culnane</ee>
<crossref>conf/uss/2014evt</crossref>
<url>db/conf/uss/evt-wote2014.html#CulnaneHJRST14</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/CulnaneS14" mdate="2020-08-07">
<author pid="64/3207">Chris Culnane</author>
<author pid="s/SASchneider">Steve A. Schneider</author>
<title>A Peered Bulletin Board for Robust Use in Verifiable Voting Systems.</title>
<year>2014</year>
<volume>abs/1401.4151</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1401.4151</ee>
<url>db/journals/corr/corr1401.html#CulnaneS14</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/CulnaneRST14" mdate="2020-08-07">
<author pid="64/3207">Chris Culnane</author>
<author pid="r/PeterYARyan">Peter Y. A. Ryan</author>
<author pid="s/SASchneider">Steve A. Schneider</author>
<author pid="t/VanessaTeague">Vanessa Teague</author>
<title>vVote: a Verifiable Voting System (DRAFT).</title>
<year>2014</year>
<volume>abs/1404.6822</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1404.6822</ee>
<url>db/journals/corr/corr1404.html#CulnaneRST14</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/SchneiderTWW14" mdate="2020-08-07">
<author pid="s/SASchneider">Steve A. Schneider</author>
<author pid="37/5761">Helen Treharne</author>
<author pid="w/HeikeWehrheim">Heike Wehrheim</author>
<author pid="00/4041">David M. Williams</author>
<title>Managing LTL properties in Event-B refinement.</title>
<year>2014</year>
<volume>abs/1406.6622</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1406.6622</ee>
<url>db/journals/corr/corr1406.html#SchneiderTWW14</url>
</article>
</r>
<r><article key="journals/sttt/AbdelhalimST13" mdate="2020-08-07">
<author pid="64/8724">Islam Abdelhalim</author>
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<author orcid="0000-0003-1835-4803" pid="37/5761">Helen Treharne</author>
<title>An integrated framework for checking the behaviour of fUML models using CSP.</title>
<pages>375-396</pages>
<year>2013</year>
<volume>15</volume>
<journal>Int. J. Softw. Tools Technol. Transf.</journal>
<number>4</number>
<ee>https://doi.org/10.1007/s10009-012-0243-0</ee>
<ee>https://www.wikidata.org/entity/Q60173564</ee>
<url>db/journals/sttt/sttt15.html#AbdelhalimST13</url>
</article>
</r>
<r><inproceedings key="conf/IEEEares/HeatherCSSX13" mdate="2020-08-07">
<author pid="36/3662">James Heather</author>
<author orcid="0000-0002-9543-1342" pid="64/3207">Chris Culnane</author>
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<author pid="54/3351">Sriramkrishnan Srinivasan</author>
<author pid="43/4169">Zhe Xia</author>
<title>Solving the Discrete Logarithm Problem for Packing Candidate Preferences.</title>
<pages>209-221</pages>
<year>2013</year>
<booktitle>CD-ARES Workshops</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-642-40588-4_15</ee>
<ee>https://www.wikidata.org/entity/Q60173572</ee>
<crossref>conf/IEEEares/2013cd-w</crossref>
<url>db/conf/IEEEares/cd-ares2013w.html#HeatherCSSX13</url>
</inproceedings>
</r>
<r><inproceedings key="conf/cardis/AlshehriS13" mdate="2020-08-07">
<author pid="142/3272-1">Abdullah Ali Alshehri 0001</author>
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<title>Formal Security Analysis and Improvement of a Hash-Based NFC M-Coupon Protocol.</title>
<pages>152-167</pages>
<year>2013</year>
<booktitle>CARDIS</booktitle>
<ee>https://doi.org/10.1007/978-3-319-08302-5_11</ee>
<ee>https://www.wikidata.org/entity/Q60173558</ee>
<crossref>conf/cardis/2013</crossref>
<url>db/conf/cardis/cardis2013.html#AlshehriS13</url>
</inproceedings>
</r>
<r><inproceedings key="conf/gil/Schneider13" mdate="2023-07-04">
<author pid="s/SASchneider">Steve A. Schneider</author>
<title>Fuzzy-Systeme zur Unterst&#252;tzung von Entscheidungen in land- und forstwirtschaftlichen Logistik-Prozessen.</title>
<pages>307-310</pages>
<year>2013</year>
<booktitle>GIL Jahrestagung</booktitle>
<crossref>conf/gil/2013</crossref>
<url>db/conf/gil/gil2013.html#Schneider13</url>
<ee type="oa">https://dl.gi.de/handle/20.500.12116/17639</ee>
<ee>http://subs.emis.de/LNI/Proceedings/Proceedings211/article20.html</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/icitst/AlshehriS13" mdate="2020-08-07">
<author pid="142/3272-1">Abdullah Ali Alshehri 0001</author>
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<title>Formally defining NFC M-coupon requirements, with a case study.</title>
<pages>52-58</pages>
<year>2013</year>
<booktitle>ICITST</booktitle>
<ee>https://doi.org/10.1109/ICITST.2013.6750161</ee>
<ee>https://www.wikidata.org/entity/Q60173567</ee>
<crossref>conf/icitst/2013</crossref>
<url>db/conf/icitst/icitst2013.html#AlshehriS13</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ifm/MoranHS13" mdate="2020-08-07">
<author orcid="0000-0001-5557-4827" pid="129/9131">Murat Moran</author>
<author pid="36/3662">James Heather</author>
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<title>Automated Anonymity Verification of the ThreeBallot Voting System.</title>
<pages>94-108</pages>
<year>2013</year>
<booktitle>IFM</booktitle>
<ee>https://doi.org/10.1007/978-3-642-38613-8_7</ee>
<ee>https://www.wikidata.org/entity/Q60173565</ee>
<crossref>conf/ifm/2013</crossref>
<url>db/conf/ifm/ifm2013.html#MoranHS13</url>
</inproceedings>
</r>
<r><inproceedings key="conf/nfm/JamesTTRS13" mdate="2021-05-19">
<author pid="31/10525">Phillip James</author>
<author pid="129/9887">Matthew Trumble</author>
<author orcid="0000-0003-1835-4803" pid="37/5761">Helen Treharne</author>
<author orcid="0000-0002-3819-2787" pid="86/743">Markus Roggenbach</author>
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<title>OnTrack: An Open Tooling Environment for Railway Verification.</title>
<pages>435-440</pages>
<year>2013</year>
<booktitle>NASA Formal Methods</booktitle>
<ee>https://doi.org/10.1007/978-3-642-38088-4_30</ee>
<ee>https://www.wikidata.org/entity/Q60173570</ee>
<crossref>conf/nfm/2013</crossref>
<url>db/conf/nfm/nfm2013.html#JamesTTRS13</url>
</inproceedings>
</r>
<r><inproceedings key="conf/pst/AktoudianakisCSTW13" mdate="2023-03-23">
<author pid="134/6422">Evangelos Aktoudianakis</author>
<author pid="c/JasonCrampton">Jason Crampton</author>
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<author orcid="0000-0003-1835-4803" pid="37/5761">Helen Treharne</author>
<author pid="81/7616">Adrian Waller</author>
<title>Policy templates for relationship-based access control.</title>
<pages>221-228</pages>
<year>2013</year>
<crossref>conf/pst/2013</crossref>
<booktitle>PST</booktitle>
<ee>https://doi.org/10.1109/PST.2013.6596057</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/PST.2013.6596057</ee>
<ee>https://www.wikidata.org/entity/Q60173571</ee>
<url>db/conf/pst/pst2013.html#AktoudianakisCSTW13</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sefm/JamesMNRSTTW13" mdate="2021-05-19">
<author pid="31/10525">Phillip James</author>
<author orcid="0000-0001-9535-8053" pid="m/FaronMoller">Faron Moller</author>
<author orcid="0000-0003-0260-1697" pid="21/2630">Hoang Nga Nguyen</author>
<author orcid="0000-0002-3819-2787" pid="86/743">Markus Roggenbach</author>
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<author orcid="0000-0003-1835-4803" pid="37/5761">Helen Treharne</author>
<author pid="129/9887">Matthew Trumble</author>
<author orcid="0000-0002-5272-8058" pid="00/4041">David M. Williams</author>
<title>Verification of Scheme Plans Using CSP $$||$$ | | B.</title>
<pages>189-204</pages>
<year>2013</year>
<booktitle>SEFM Workshops</booktitle>
<ee>https://doi.org/10.1007/978-3-319-05032-4_15</ee>
<ee>https://www.wikidata.org/entity/Q59556885</ee>
<crossref>conf/sefm/2013w</crossref>
<url>db/conf/sefm/sefm2013w.html#JamesMNRSTTW13</url>
</inproceedings>
</r>
<r><inproceedings key="conf/uss/LlewellynSXCHRS13" mdate="2021-02-01">
<author pid="55/10370">Morgan Llewellyn</author>
<author pid="s/SASchneider">Steve A. Schneider</author>
<author pid="43/4169">Zhe Xia</author>
<author pid="64/3207">Chris Culnane</author>
<author pid="36/3662">James Heather</author>
<author pid="r/PeterYARyan">Peter Y. A. Ryan</author>
<author pid="54/3351">Sriramkrishnan Srinivasan</author>
<title>Testing Voters' Understanding of a Security Mechanism Used in Verifiable Voting.</title>
<year>2013</year>
<booktitle>EVT/WOTE</booktitle>
<ee type="oa">https://www.usenix.org/conference/evtwote13/workshop-program/presentation/llewellyn</ee>
<crossref>conf/uss/2013evt</crossref>
<url>db/conf/uss/evt-wote2013.html#LlewellynSXCHRS13</url>
</inproceedings>
</r>
<r><proceedings key="conf/voteid/2013" mdate="2020-02-27">
<editor pid="36/3662">James Heather</editor>
<editor pid="s/SASchneider">Steve A. Schneider</editor>
<editor pid="t/VanessaTeague">Vanessa Teague</editor>
<title>E-Voting and Identify - 4th International Conference, VoteID 2013, Guildford, UK, July 17-19, 2013. Proceedings</title>
<year>2013</year>
<publisher>Springer</publisher>
<series href="db/series/lncs/index.html">Lecture Notes in Computer Science</series>
<volume>7985</volume>
<ee>https://doi.org/10.1007/978-3-642-39185-9</ee>
<isbn>978-3-642-39184-2</isbn>
<booktitle>VoteID</booktitle>
<url>db/conf/voteid/voteid2013.html</url>
</proceedings>
</r>
<r><article key="journals/eceasst/RoggenbachMSTN12" mdate="2020-08-25">
<author pid="86/743">Markus Roggenbach</author>
<author pid="m/FaronMoller">Faron Moller</author>
<author pid="s/SASchneider">Steve A. Schneider</author>
<author pid="37/5761">Helen Treharne</author>
<author pid="21/2630">Hoang Nga Nguyen</author>
<title>Railway modelling in CSP||B: the double junction case study.</title>
<year>2012</year>
<volume>53</volume>
<journal>Electron. Commun. Eur. Assoc. Softw. Sci. Technol.</journal>
<ee type="oa">https://doi.org/10.14279/tuj.eceasst.53.791</ee>
<url>db/journals/eceasst/eceasst53.html#RoggenbachMSTN12</url>
</article>
</r>
<r><inproceedings key="conf/ev/BurtonCHPRSSTWX12" mdate="2023-07-04">
<author pid="00/275">Craig Burton</author>
<author pid="64/3207">Chris Culnane</author>
<author pid="36/3662">James Heather</author>
<author pid="25/7618">Thea Peacock</author>
<author pid="r/PeterYARyan">Peter Y. A. Ryan</author>
<author pid="s/SASchneider">Steve A. Schneider</author>
<author pid="54/3351">Sriramkrishnan Srinivasan</author>
<author pid="t/VanessaTeague">Vanessa Teague</author>
<author pid="88/7271">Roland Wen</author>
<author pid="43/4169">Zhe Xia</author>
<title>A Supervised Verifiable Voting Protocol for the Victorian Electoral Commission.</title>
<pages>81-94</pages>
<year>2012</year>
<booktitle>Electronic Voting</booktitle>
<crossref>conf/ev/2012</crossref>
<url>db/conf/ev/ev2012.html#BurtonCHPRSSTWX12</url>
<ee type="oa">https://dl.gi.de/handle/20.500.12116/18227</ee>
<ee>http://subs.emis.de/LNI/Proceedings/Proceedings205/article6756.html</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/fm/HeatherS12" mdate="2020-08-07">
<author pid="36/3662">James Heather</author>
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<title>A Formal Framework for Modelling Coercion Resistance and Receipt Freeness.</title>
<pages>217-231</pages>
<year>2012</year>
<booktitle>FM</booktitle>
<ee>https://doi.org/10.1007/978-3-642-32759-9_19</ee>
<ee>https://www.wikidata.org/entity/Q60173574</ee>
<crossref>conf/fm/2012</crossref>
<url>db/conf/fm/fm2012.html#HeatherS12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/hvc/MollerNRST12" mdate="2026-03-24">
<author orcid="0000-0001-9535-8053" pid="m/FaronMoller">Faron Moller</author>
<author pid="21/2630">Hoang Nga Nguyen</author>
<author orcid="0000-0002-3819-2787" pid="86/743">Markus Roggenbach</author>
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<author orcid="0000-0003-1835-4803" pid="37/5761">Helen Treharne</author>
<title>Defining and Model Checking Abstractions of Complex Railway Models Using CSP||B.</title>
<pages>193-208</pages>
<year>2012</year>
<booktitle>Haifa Verification Conference</booktitle>
<ee>https://doi.org/10.1007/978-3-642-39611-3_20</ee>
<ee>https://www.wikidata.org/entity/Q59556896</ee>
<crossref>conf/hvc/2012</crossref>
<url>db/conf/hvc/hvc2012.html#MollerNRST12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sefm/AbdelhalimST12" mdate="2020-08-07">
<author pid="64/8724">Islam Abdelhalim</author>
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<author orcid="0000-0003-1835-4803" pid="37/5761">Helen Treharne</author>
<title>An Optimization Approach for Effective Formalized fUML Model Checking.</title>
<pages>248-262</pages>
<year>2012</year>
<booktitle>SEFM</booktitle>
<ee>https://doi.org/10.1007/978-3-642-33826-7_17</ee>
<ee>https://www.wikidata.org/entity/Q60173576</ee>
<crossref>conf/sefm/2012</crossref>
<url>db/conf/sefm/sefm2012.html#AbdelhalimST12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/uss/BurtonCHPRSTWXS12" mdate="2021-02-01">
<author pid="00/275">Craig Burton</author>
<author pid="64/3207">Chris Culnane</author>
<author pid="36/3662">James Heather</author>
<author pid="25/7618">Thea Peacock</author>
<author pid="r/PeterYARyan">Peter Y. A. Ryan</author>
<author pid="s/SASchneider">Steve A. Schneider</author>
<author pid="t/VanessaTeague">Vanessa Teague</author>
<author pid="88/7271">Roland Wen</author>
<author pid="43/4169">Zhe Xia</author>
<author pid="54/3351">Sriramkrishnan Srinivasan</author>
<title>Using Pr&#234;t &#224; Voter in Victoria State Elections.</title>
<year>2012</year>
<booktitle>EVT/WOTE</booktitle>
<ee type="oa">https://www.usenix.org/conference/evtwote12/workshop-program/presentation/burton</ee>
<crossref>conf/uss/2012evt</crossref>
<url>db/conf/uss/evt-wote2012.html#BurtonCHPRSTWXS12</url>
</inproceedings>
</r>
<r><article key="journals/scp/SchneiderT11" mdate="2021-02-17">
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<author orcid="0000-0003-1835-4803" pid="37/5761">Helen Treharne</author>
<title>Changing system interfaces consistently: A new refinement strategy for CSP||B.</title>
<pages>837-860</pages>
<year>2011</year>
<volume>76</volume>
<journal>Sci. Comput. Program.</journal>
<number>10</number>
<ee type="oa">https://doi.org/10.1016/j.scico.2010.08.001</ee>
<ee>https://www.wikidata.org/entity/Q60173580</ee>
<url>db/journals/scp/scp76.html#SchneiderT11</url>
</article>
</r>
<r><inproceedings key="conf/icfem/AbdelhalimST11" mdate="2020-08-07">
<author pid="64/8724">Islam Abdelhalim</author>
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<author orcid="0000-0003-1835-4803" pid="37/5761">Helen Treharne</author>
<title>Towards a Practical Approach to Check UML/fUML Models Consistency Using CSP.</title>
<pages>33-48</pages>
<year>2011</year>
<booktitle>ICFEM</booktitle>
<ee>https://doi.org/10.1007/978-3-642-24559-6_5</ee>
<ee>https://www.wikidata.org/entity/Q60173583</ee>
<crossref>conf/icfem/2011</crossref>
<url>db/conf/icfem/icfem2011.html#AbdelhalimST11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/re/SchneiderLCHSX11" mdate="2023-03-24">
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<author pid="55/10370">Morgan Llewellyn</author>
<author orcid="0000-0002-9543-1342" pid="64/3207">Chris Culnane</author>
<author pid="36/3662">James Heather</author>
<author pid="54/3351">Sriramkrishnan Srinivasan</author>
<author pid="43/4169">Zhe Xia</author>
<title>Focus group views on Pr&#234;t &#224; Voter 1.0.</title>
<pages>56-65</pages>
<year>2011</year>
<booktitle>REVOTE</booktitle>
<ee>https://doi.org/10.1109/REVOTE.2011.6045916</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/REVOTE.2011.6045916</ee>
<ee>https://www.wikidata.org/entity/Q60173582</ee>
<crossref>conf/re/2011revote</crossref>
<url>db/conf/re/revote2011.html#SchneiderLCHSX11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/uss/CulnaneBHSSX11" mdate="2021-02-01">
<author pid="64/3207">Chris Culnane</author>
<author pid="76/8522">David Bismark</author>
<author pid="36/3662">James Heather</author>
<author pid="s/SASchneider">Steve A. Schneider</author>
<author pid="54/3351">Sriramkrishnan Srinivasan</author>
<author pid="43/4169">Zhe Xia</author>
<title>Authentication Codes.</title>
<year>2011</year>
<booktitle>EVT/WOTE</booktitle>
<ee type="oa">https://www.usenix.org/conference/evtwote-11/authentication-codes</ee>
<crossref>conf/uss/2011evt</crossref>
<url>db/conf/uss/evt-wote2011.html#CulnaneBHSSX11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/voteid/DemirelHRSV11" mdate="2020-08-07">
<author pid="85/10370">Denise Demirel</author>
<author pid="118/7466">Maria Henning</author>
<author orcid="0000-0002-1677-9034" pid="r/PeterYARyan">Peter Y. A. Ryan</author>
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<author pid="v/MelanieVolkamer">Melanie Volkamer</author>
<title>Feasibility Analysis of Pr&#234;t &#224; Voter for German Federal Elections.</title>
<pages>158-173</pages>
<year>2011</year>
<booktitle>VoteID</booktitle>
<ee>https://doi.org/10.1007/978-3-642-32747-6_10</ee>
<ee>https://www.wikidata.org/entity/Q60173577</ee>
<crossref>conf/voteid/2011</crossref>
<url>db/conf/voteid/voteid2011.html#DemirelHRSV11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/voteid/SchneiderSCHX11" mdate="2020-08-07">
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<author pid="54/3351">Sriramkrishnan Srinivasan</author>
<author orcid="0000-0002-9543-1342" pid="64/3207">Chris Culnane</author>
<author pid="36/3662">James Heather</author>
<author pid="43/4169">Zhe Xia</author>
<title>Pr&#234;t &#225; Voter with Write-Ins.</title>
<pages>174-189</pages>
<year>2011</year>
<booktitle>VoteID</booktitle>
<ee>https://doi.org/10.1007/978-3-642-32747-6_11</ee>
<ee>https://www.wikidata.org/entity/Q60173578</ee>
<crossref>conf/voteid/2011</crossref>
<url>db/conf/voteid/voteid2011.html#SchneiderSCHX11</url>
</inproceedings>
</r>
<r><inproceedings key="journals/corr/abs-1106-4098" mdate="2020-08-07">
<author pid="s/SASchneider">Steve A. Schneider</author>
<author orcid="0000-0003-1835-4803" pid="37/5761">Helen Treharne</author>
<author pid="w/HeikeWehrheim">Heike Wehrheim</author>
<title>A CSP Account of Event-B Refinement</title>
<booktitle>Refine@FM</booktitle>
<year>2011</year>
<pages>139-154</pages>
<ee type="oa">https://doi.org/10.4204/EPTCS.55.9</ee>
<ee type="oa">http://arxiv.org/abs/1106.4098</ee>
<crossref>journals/corr/abs-1106-3488</crossref>
<url>db/series/eptcs/eptcs55.html#abs-1106-4098</url>
</inproceedings>
</r>
<r><inproceedings key="journals/entcs/SchneiderTW11" mdate="2023-03-10">
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<author orcid="0000-0003-1835-4803" pid="37/5761">Helen Treharne</author>
<author pid="w/HeikeWehrheim">Heike Wehrheim</author>
<title>Bounded Retransmission in Event-B&#8741;CSP: a Case Study.</title>
<pages>69-80</pages>
<year>2011</year>
<crossref>conf/fm/2011b</crossref>
<booktitle>B@FM</booktitle>
<ee type="oa">https://doi.org/10.1016/j.entcs.2011.11.019</ee>
<ee>https://www.wikidata.org/entity/Q60173579</ee>
<url>db/journals/entcs/entcs280.html#SchneiderTW11</url>
</inproceedings>
</r>
<r><incollection key="books/ios/11/Schneider11" mdate="2020-08-07">
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<title>Security Analysis using Rank Functions in CSP.</title>
<pages>258-276</pages>
<year>2011</year>
<booktitle>Formal Models and Techniques for Analyzing Security Protocols</booktitle>
<ee>https://doi.org/10.3233/978-1-60750-714-7-258</ee>
<crossref>books/ios/11/CK2011</crossref>
<url>db/books/collections/CK2011.html#Schneider11</url>
</incollection>
</r>
<r><article key="journals/concurrency/McEwanS10" mdate="2020-08-07">
<author orcid="0000-0002-6660-3192" pid="43/879">Alistair A. McEwan</author>
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<title>Modelling and analysis of the AMBA bus using CSP and B.</title>
<pages>949-964</pages>
<year>2010</year>
<volume>22</volume>
<journal>Concurr. Comput. Pract. Exp.</journal>
<number>8</number>
<ee>https://doi.org/10.1002/cpe.1432</ee>
<ee>https://www.wikidata.org/entity/Q60173588</ee>
<url>db/journals/concurrency/concurrency22.html#McEwanS10</url>
</article>
</r>
<r><article key="journals/concurrency/IfillS10" mdate="2020-03-02">
<author pid="38/2829">Wilson Ifill</author>
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<title>A step towards refining and translating B control annotations to Handel-C.</title>
<pages>1023-1048</pages>
<year>2010</year>
<volume>22</volume>
<journal>Concurr. Comput. Pract. Exp.</journal>
<number>8</number>
<ee>https://doi.org/10.1002/cpe.1427</ee>
<ee>https://www.wikidata.org/entity/Q60173586</ee>
<url>db/journals/concurrency/concurrency22.html#IfillS10</url>
</article>
</r>
<r><inproceedings key="conf/icfem/AbdelhalimSST10" mdate="2020-10-25">
<author pid="64/8724">Islam Abdelhalim</author>
<author orcid="0000-0003-2213-0925" pid="59/8724">James Sharp</author>
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<author orcid="0000-0003-1835-4803" pid="37/5761">Helen Treharne</author>
<title>Formal Verification of Tokeneer Behaviours Modelled in fUML Using CSP.</title>
<pages>371-387</pages>
<year>2010</year>
<booktitle>ICFEM</booktitle>
<ee>https://doi.org/10.1007/978-3-642-16901-4_25</ee>
<ee>https://www.wikidata.org/entity/Q60173587</ee>
<crossref>conf/icfem/2010</crossref>
<url>db/conf/icfem/icfem2010.html#AbdelhalimSST10</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ifm/SchneiderTW10" mdate="2020-08-07">
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<author orcid="0000-0003-1835-4803" pid="37/5761">Helen Treharne</author>
<author pid="w/HeikeWehrheim">Heike Wehrheim</author>
<title>A CSP Approach to Control in Event-B.</title>
<pages>260-274</pages>
<year>2010</year>
<booktitle>IFM</booktitle>
<ee>https://doi.org/10.1007/978-3-642-16265-7_19</ee>
<ee>https://www.wikidata.org/entity/Q60173585</ee>
<crossref>conf/ifm/2010</crossref>
<url>db/conf/ifm/ifm2010.html#SchneiderTW10</url>
</inproceedings>
</r>
<r><inproceedings key="conf/indocrypt/XiaCHJRSS10" mdate="2019-10-19">
<author pid="43/4169">Zhe Xia</author>
<author orcid="0000-0002-9543-1342" pid="64/3207">Chris Culnane</author>
<author pid="36/3662">James Heather</author>
<author pid="33/1453">Hugo Jonker</author>
<author orcid="0000-0002-1677-9034" pid="r/PeterYARyan">Peter Y. A. Ryan</author>
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<author pid="54/3351">Sriramkrishnan Srinivasan</author>
<title>Versatile Pr&#234;t &#224; Voter: Handling Multiple Election Methods with a Unified Interface.</title>
<pages>98-114</pages>
<year>2010</year>
<booktitle>INDOCRYPT</booktitle>
<ee>https://doi.org/10.1007/978-3-642-17401-8_8</ee>
<ee>https://www.wikidata.org/entity/Q60173589</ee>
<crossref>conf/indocrypt/2010</crossref>
<url>db/conf/indocrypt/indocrypt2010.html#XiaCHJRSS10</url>
</inproceedings>
</r>
<r><article key="journals/compsec/ShaikhBS09" mdate="2020-02-20">
<author orcid="0000-0002-0726-3319" pid="s/SirajAShaikh">Siraj A. Shaikh</author>
<author orcid="0000-0002-8733-4358" pid="63/5821">Vicky J. Bush</author>
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<title>Specifying authentication using signal events in CSP.</title>
<pages>310-324</pages>
<year>2009</year>
<volume>28</volume>
<journal>Comput. Secur.</journal>
<number>5</number>
<ee>https://doi.org/10.1016/j.cose.2008.10.001</ee>
<ee>https://www.wikidata.org/entity/Q57751869</ee>
<url>db/journals/compsec/compsec28.html#ShaikhBS09</url>
</article>
</r>
<r><article key="journals/eceasst/VajarST09" mdate="2020-08-25">
<author pid="43/8170">Beeta Vajar</author>
<author pid="s/SASchneider">Steve A. Schneider</author>
<author pid="37/5761">Helen Treharne</author>
<title>Mobile CSP||B.</title>
<year>2009</year>
<volume>23</volume>
<journal>Electron. Commun. Eur. Assoc. Softw. Sci. Technol.</journal>
<ee type="oa">https://doi.org/10.14279/tuj.eceasst.23.338</ee>
<url>db/journals/eceasst/eceasst23.html#VajarST09</url>
</article>
</r>
<r><article key="journals/tifs/RyanBHSX09" mdate="2020-08-07">
<author orcid="0000-0002-1677-9034" pid="r/PeterYARyan">Peter Y. A. Ryan</author>
<author pid="76/8522">David Bismark</author>
<author pid="36/3662">James Heather</author>
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<author pid="43/4169">Zhe Xia</author>
<title>Pr&#234;t &#224; voter: a voter-verifiable voting system.</title>
<pages>662-673</pages>
<year>2009</year>
<volume>4</volume>
<journal>IEEE Trans. Inf. Forensics Secur.</journal>
<number>4</number>
<ee>https://doi.org/10.1109/TIFS.2009.2033233</ee>
<ee>https://www.wikidata.org/entity/Q30048596</ee>
<url>db/journals/tifs/tifs4.html#RyanBHSX09</url>
</article>
</r>
<r><inproceedings key="conf/birthday/TreharneSGEI09" mdate="2020-08-07">
<author orcid="0000-0003-1835-4803" pid="37/5761">Helen Treharne</author>
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<author pid="97/3333">Neil Grant</author>
<author pid="15/66">Neil Evans</author>
<author pid="38/2829">Wilson Ifill</author>
<title>A Step towards Merging xUML and CSP || {\| \ }B.</title>
<pages>130-146</pages>
<year>2009</year>
<booktitle>Rigorous Methods for Software Construction and Analysis</booktitle>
<ee>https://doi.org/10.1007/978-3-642-11447-2_9</ee>
<ee>https://www.wikidata.org/entity/Q60173590</ee>
<crossref>conf/birthday/2009borger</crossref>
<url>db/conf/birthday/borger2009.html#TreharneSGEI09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ifm/SchneiderT09" mdate="2026-03-24">
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<author orcid="0000-0003-1835-4803" pid="37/5761">Helen Treharne</author>
<title>Changing System Interfaces Consistently: A New Refinement Strategy for CSP||B.</title>
<pages>103-117</pages>
<year>2009</year>
<booktitle>IFM</booktitle>
<ee>https://doi.org/10.1007/978-3-642-00255-7_8</ee>
<crossref>conf/ifm/2009</crossref>
<url>db/conf/ifm/ifm2009.html#SchneiderT09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/re/BismarkHPSXR09" mdate="2023-03-24">
<author pid="76/8522">David Bismark</author>
<author pid="36/3662">James Heather</author>
<author pid="92/745">Roger M. A. Peel</author>
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<author pid="43/4169">Zhe Xia</author>
<author orcid="0000-0002-1677-9034" pid="r/PeterYARyan">Peter Y. A. Ryan</author>
<title>Experiences Gained from the first Pr&#234;t &#224; Voter Implementation.</title>
<pages>19-28</pages>
<year>2009</year>
<booktitle>REVOTE</booktitle>
<ee>https://doi.org/10.1109/RE-VOTE.2009.5</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/RE-VOTE.2009.5</ee>
<ee>https://www.wikidata.org/entity/Q60173591</ee>
<crossref>conf/re/2009revote</crossref>
<url>db/conf/re/revote2009.html#BismarkHPSXR09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/asm/TreharneTSE08" mdate="2020-08-07">
<author orcid="0000-0003-1835-4803" pid="37/5761">Helen Treharne</author>
<author pid="33/3167">Edward Turner</author>
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<author pid="15/66">Neil Evans</author>
<title>Object Modelling in the SystemB Industrial Project.</title>
<pages>359</pages>
<year>2008</year>
<booktitle>ABZ</booktitle>
<ee>https://doi.org/10.1007/978-3-540-87603-8_46</ee>
<ee>https://www.wikidata.org/entity/Q60173594</ee>
<crossref>conf/asm/2008</crossref>
<url>db/conf/asm/abz2008.html#TreharneTSE08</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ictac/TurnerTSE08" mdate="2020-08-07">
<author pid="33/3167">Edward Turner</author>
<author orcid="0000-0003-1835-4803" pid="37/5761">Helen Treharne</author>
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<author pid="15/66">Neil Evans</author>
<title>Automatic Generation of CSP || B Skeletons from xUML Models.</title>
<pages>364-379</pages>
<year>2008</year>
<booktitle>ICTAC</booktitle>
<ee>https://doi.org/10.1007/978-3-540-85762-4_25</ee>
<ee>https://www.wikidata.org/entity/Q60173593</ee>
<crossref>conf/ictac/2008</crossref>
<url>db/conf/ictac/ictac2008.html#TurnerTSE08</url>
</inproceedings>
</r>
<r><inproceedings key="conf/uss/XiaSHT08" mdate="2020-03-12">
<author pid="43/4169">Zhe Xia</author>
<author pid="s/SASchneider">Steve A. Schneider</author>
<author pid="36/3662">James Heather</author>
<author pid="82/1924">Jacques Traor&#233;</author>
<title>Analysis, Improvement, and Simplification of Pr&#234;t &#224; Voter with Paillier Encryption.</title>
<year>2008</year>
<booktitle>EVT</booktitle>
<ee type="oa">http://www.usenix.org/events/evt08/tech/full_papers/xia/xia.pdf</ee>
<crossref>conf/uss/2008evt</crossref>
<url>db/conf/uss/evt2008.html#XiaSHT08</url>
</inproceedings>
</r>
<r><inproceedings key="conf/wotug/SchneiderTMI08" mdate="2024-02-18">
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<author orcid="0000-0003-1835-4803" pid="37/5761">Helen Treharne</author>
<author orcid="0000-0002-6660-3192" pid="43/879">Alistair A. McEwan</author>
<author pid="38/2829">Wilson Ifill</author>
<title>Experiments in Translating CSP || B to Handel-C.</title>
<pages>115-133</pages>
<year>2008</year>
<booktitle>CPA</booktitle>
<ee>https://doi.org/10.3233/978-1-58603-907-3-115</ee>
<crossref>conf/wotug/2008</crossref>
<url>db/conf/wotug/cpa2008.html#SchneiderTMI08</url>
</inproceedings>
</r>
<r><article key="journals/ijisec/DimitrakosMRS07" mdate="2022-10-02">
<author orcid="0000-0002-9522-1863" pid="99/4618">Theodosis Dimitrakos</author>
<author pid="m/FMartinelli">Fabio Martinelli</author>
<author orcid="0000-0002-1677-9034" pid="r/PeterYARyan">Peter Y. A. Ryan</author>
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<title>Guest Editors' Preface.</title>
<pages>65-66</pages>
<year>2007</year>
<volume>6</volume>
<journal>Int. J. Inf. Sec.</journal>
<number>2-3</number>
<ee>https://doi.org/10.1007/s10207-007-0012-3</ee>
<ee>https://www.wikidata.org/entity/Q60173597</ee>
<url>db/journals/ijisec/ijisec6.html#DimitrakosMRS07</url>
</article>
</r>
<r><article key="journals/ijisec/DelicataS07" mdate="2020-08-07">
<author pid="17/130">Rob Delicata</author>
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<title>An algebraic approach to the verification of a class of Diffie-Hellman protocols.</title>
<pages>183-196</pages>
<year>2007</year>
<volume>6</volume>
<journal>Int. J. Inf. Sec.</journal>
<number>2-3</number>
<ee>https://doi.org/10.1007/s10207-007-0013-2</ee>
<ee>https://www.wikidata.org/entity/Q60173596</ee>
<url>db/journals/ijisec/ijisec6.html#DelicataS07</url>
</article>
</r>
<r><inproceedings key="conf/b/IfillST07" mdate="2026-03-24">
<author pid="38/2829">Wilson Ifill</author>
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<author orcid="0000-0003-1835-4803" pid="37/5761">Helen Treharne</author>
<title>Augmenting B with Control Annotations.</title>
<pages>34-48</pages>
<year>2007</year>
<crossref>conf/b/2007</crossref>
<booktitle>B</booktitle>
<ee>https://doi.org/10.1007/11955757_6</ee>
<url>db/conf/b/b2007.html#IfillST07</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ifm/KarkinskyST07" mdate="2026-03-24">
<author pid="89/5104">Damien Karkinsky</author>
<author pid="s/SASchneider">Steve A. Schneider</author>
<author orcid="0000-0003-1835-4803" pid="37/5761">Helen Treharne</author>
<title>Combining Mobility with State.</title>
<pages>373-392</pages>
<year>2007</year>
<crossref>conf/ifm/2007</crossref>
<booktitle>IFM</booktitle>
<ee>https://doi.org/10.1007/978-3-540-73210-5_20</ee>
<url>db/conf/ifm/ifm2007.html#KarkinskyST07</url>
</inproceedings>
</r>
<r><inproceedings key="conf/voteid/FoulleSTX07" mdate="2020-08-07">
<author pid="07/5998">S&#233;bastien Foulle</author>
<author pid="s/SASchneider">Steve A. Schneider</author>
<author pid="82/1924">Jacques Traor&#233;</author>
<author pid="43/4169">Zhe Xia</author>
<title>Threat Analysis of a Practical Voting Scheme with Receipts.</title>
<pages>156-165</pages>
<year>2007</year>
<crossref>conf/voteid/2007</crossref>
<booktitle>VOTE-ID</booktitle>
<ee>https://doi.org/10.1007/978-3-540-77493-8_14</ee>
<url>db/conf/voteid/voteid2007.html#FoulleSTX07</url>
</inproceedings>
</r>
<r><inproceedings key="conf/wotug/McEwanS07" mdate="2020-08-07">
<author pid="43/879">Alistair A. McEwan</author>
<author pid="s/SASchneider">Steve A. Schneider</author>
<title>Modeling and Analysis of the AMBA Bus Using CSP and B.</title>
<pages>379-398</pages>
<year>2007</year>
<booktitle>CPA</booktitle>
<crossref>conf/wotug/2007</crossref>
<url>db/conf/wotug/cpa2007.html#McEwanS07</url>
<ee>http://www.booksonline.iospress.nl/Content/View.aspx?piid=5984</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/wotug/IfillS07" mdate="2020-08-07">
<author pid="38/2829">Wilson Ifill</author>
<author pid="s/SASchneider">Steve A. Schneider</author>
<title>A Step Towards Refining and Translating B Control Annotations to Handel-C.</title>
<pages>399-424</pages>
<year>2007</year>
<booktitle>CPA</booktitle>
<crossref>conf/wotug/2007</crossref>
<url>db/conf/wotug/cpa2007.html#IfillS07</url>
<ee>http://www.booksonline.iospress.nl/Content/View.aspx?piid=5985</ee>
</inproceedings>
</r>
<r><proceedings key="conf/ifip1-7/2006" mdate="2022-10-02">
<editor orcid="0000-0002-9522-1863" pid="99/4618">Theodosis Dimitrakos</editor>
<editor pid="m/FMartinelli">Fabio Martinelli</editor>
<editor pid="r/PeterYARyan">Peter Y. A. Ryan</editor>
<editor pid="s/SASchneider">Steve A. Schneider</editor>
<title>Formal Aspects in Security and Trust, Fourth International Workshop, FAST 2006, Hamilton, Ontario, Canada, August 26-27, 2006, Revised Selected Papers</title>
<booktitle>Formal Aspects in Security and Trust</booktitle>
<series href="db/series/lncs/index.html">Lecture Notes in Computer Science</series>
<volume>4691</volume>
<publisher>Springer</publisher>
<year>2007</year>
<isbn>978-3-540-75226-4</isbn>
<ee>https://doi.org/10.1007/978-3-540-75227-1</ee>
<url>db/conf/ifip1-7/fast2006.html</url>
</proceedings>
</r>
<r><proceedings key="conf/wotug/2007" mdate="2009-03-03">
<editor pid="43/879">Alistair A. McEwan</editor>
<editor pid="s/SASchneider">Steve A. Schneider</editor>
<editor pid="38/2829">Wilson Ifill</editor>
<editor pid="w/PeterHWelch">Peter H. Welch</editor>
<title>The 30th Communicating Process Architectures Conference, CPA 2007, organised under the auspices of WoTUG and the University of Surrey, Guildford, Surrey, UK, 8-11 July 2007</title>
<volume>65</volume>
<series href="db/series/cses/index.html">Concurrent Systems Engineering Series</series>
<year>2007</year>
<isbn>978-1-58603-767-3</isbn>
<publisher>IOS Press</publisher>
<ee>http://www.booksonline.iospress.nl/Content/View.aspx?piid=5962</ee>
<booktitle>CPA</booktitle>
<url>db/conf/wotug/cpa2007.html</url>
</proceedings>
</r>
<r><article key="journals/fac/SchneiderHRT06" mdate="2022-05-09">
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<author pid="38/3500">Thai Son Hoang</author>
<author pid="r/KenRobinson">Ken Robinson</author>
<author orcid="0000-0003-1835-4803" pid="37/5761">Helen Treharne</author>
<title>Tank monitoring: a pAMN case study.</title>
<pages>308-328</pages>
<year>2006</year>
<volume>18</volume>
<journal>Formal Aspects Comput.</journal>
<number>3</number>
<ee type="oa">https://doi.org/10.1007/s00165-006-0004-5</ee>
<ee>https://www.wikidata.org/entity/Q60173599</ee>
<url>db/journals/fac/fac18.html#SchneiderHRT06</url>
</article>
</r>
<r><inproceedings key="conf/esorics/RyanS06" mdate="2019-08-20">
<author pid="r/PeterYARyan">Peter Y. A. Ryan</author>
<author pid="s/SASchneider">Steve A. Schneider</author>
<title>Pr&#234;t &#224; Voter with Re-encryption Mixes.</title>
<pages>313-326</pages>
<year>2006</year>
<crossref>conf/esorics/2006</crossref>
<booktitle>ESORICS</booktitle>
<ee type="oa">https://doi.org/10.1007/11863908_20</ee>
<url>db/conf/esorics/esorics2006.html#RyanS06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/iceccs/SchneiderTCW06" mdate="2023-03-24">
<author pid="s/SASchneider">Steve A. Schneider</author>
<author pid="37/5761">Helen Treharne</author>
<author pid="c/AnaCavalcanti">Ana Cavalcanti 0001</author>
<author orcid="0000-0001-7955-2702" pid="w/JWoodcock">Jim Woodcock 0001</author>
<title>A Layered Behavioural Model of Platelets.</title>
<pages>98-106</pages>
<year>2006</year>
<crossref>conf/iceccs/2006</crossref>
<booktitle>ICECCS</booktitle>
<ee>https://doi.ieeecomputersociety.org/10.1109/ICECCS.2006.80</ee>
<url>db/conf/iceccs/iceccs2006.html#SchneiderTCW06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/memocode/McEwanS06" mdate="2023-03-24">
<author pid="43/879">Alistair A. McEwan</author>
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<title>A verified development of hardware using CSP&#8741;B.</title>
<pages>81</pages>
<year>2006</year>
<crossref>conf/memocode/2006</crossref>
<booktitle>MEMOCODE</booktitle>
<ee>https://doi.org/10.1109/MEMCOD.2006.1695904</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/MEMCOD.2006.1695904</ee>
<ee>http://dl.acm.org/citation.cfm?id=2674357</ee>
<url>db/conf/memocode/memocode2006.html#McEwanS06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sac/HeatherS06" mdate="2020-08-07">
<author pid="36/3662">James Heather</author>
<author pid="s/SASchneider">Steve A. Schneider</author>
<title>To infinity and beyond or, avoiding the infinite in security protocol analysis.</title>
<pages>346-353</pages>
<year>2006</year>
<crossref>conf/sac/2006</crossref>
<booktitle>SAC</booktitle>
<ee>https://doi.org/10.1145/1141277.1141359</ee>
<url>db/conf/sac/sac2006.html#HeatherS06</url>
</inproceedings>
</r>
<r><proceedings key="conf/ifip1-7/2005" mdate="2022-10-02">
<editor orcid="0000-0002-9522-1863" pid="99/4618">Theodosis Dimitrakos</editor>
<editor pid="m/FMartinelli">Fabio Martinelli</editor>
<editor pid="r/PeterYARyan">Peter Y. A. Ryan</editor>
<editor pid="s/SASchneider">Steve A. Schneider</editor>
<title>Formal Aspects in Security and Trust, Third International Workshop, FAST 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected Papers</title>
<volume>3866</volume>
<year>2006</year>
<isbn>3-540-32628-6</isbn>
<booktitle>Formal Aspects in Security and Trust</booktitle>
<series href="db/series/lncs/index.html">Lecture Notes in Computer Science</series>
<publisher>Springer</publisher>
<ee>https://doi.org/10.1007/11679219</ee>
<url>db/conf/ifip1-7/fast2005.html</url>
</proceedings>
</r>
<r><article key="journals/fac/SchneiderT05" mdate="2022-05-09">
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<author orcid="0000-0003-1835-4803" pid="37/5761">Helen Treharne</author>
<title>CSP theorems for communicating B machines.</title>
<pages>390-422</pages>
<year>2005</year>
<volume>17</volume>
<journal>Formal Aspects Comput.</journal>
<number>4</number>
<ee type="oa">https://doi.org/10.1007/s00165-005-0076-7</ee>
<ee>https://www.wikidata.org/entity/Q60173603</ee>
<url>db/journals/fac/fac17.html#SchneiderT05</url>
</article>
</r>
<r><article key="journals/jcs/HeatherS05" mdate="2023-08-28">
<author pid="36/3662">James Heather</author>
<author pid="s/SASchneider">Steve A. Schneider</author>
<title>A decision procedure for the existence of a rank function.</title>
<pages>317-344</pages>
<year>2005</year>
<volume>13</volume>
<journal>J. Comput. Secur.</journal>
<number>2</number>
<url>db/journals/jcs/jcs13.html#HeatherS05</url>
<ee>https://doi.org/10.3233/jcs-2005-13204</ee>
<ee>https://www.wikidata.org/entity/Q114944086</ee>
</article>
</r>
<r><article key="journals/jlp/EvansS05" mdate="2021-02-16">
<author pid="15/66">Neil Evans</author>
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<title>Verifying security protocols with PVS: widening the rank function approach.</title>
<pages>253-284</pages>
<year>2005</year>
<volume>64</volume>
<journal>J. Log. Algebraic Methods Program.</journal>
<number>2</number>
<ee type="oa">https://doi.org/10.1016/j.jlap.2004.09.005</ee>
<ee>https://www.wikidata.org/entity/Q60173606</ee>
<url>db/journals/jlp/jlp64.html#EvansS05</url>
</article>
</r>
<r><article key="journals/polity/JankowskiFKS05" mdate="2022-06-10">
<author pid="14/4367">Nicholas W. Jankowski</author>
<author pid="33/9722">Kirsten Foot</author>
<author pid="131/0307">Randy Kluver</author>
<author pid="s/SASchneider">Steve Schneider</author>
<title>The Web and the 2004 EP election: Comparing political actor Web sites in 11 EU Member States.</title>
<pages>165-176</pages>
<year>2005</year>
<volume>10</volume>
<journal>Inf. Polity</journal>
<number>3-4</number>
<ee>https://doi.org/10.3233/ip-2005-0076</ee>
<url>db/journals/polity/polity10.html#JankowskiFKS05</url>
</article>
</r>
<r><inproceedings key="conf/cisc/ShaikhBS05" mdate="2017-05-22">
<author pid="s/SirajAShaikh">Siraj A. Shaikh</author>
<author pid="63/5821">Vicky J. Bush</author>
<author pid="s/SASchneider">Steve A. Schneider</author>
<title>Specifying Authentication Using Signal Events in CSP.</title>
<pages>63-74</pages>
<year>2005</year>
<crossref>conf/cisc/2005</crossref>
<booktitle>CISC</booktitle>
<ee>https://doi.org/10.1007/11599548_6</ee>
<url>db/conf/cisc/cisc2005.html#ShaikhBS05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/csfw/DelicataS05" mdate="2023-03-24">
<author pid="17/130">Rob Delicata</author>
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<title>Temporal Rank Functions for Forward Secrecy.</title>
<pages>126-139</pages>
<year>2005</year>
<crossref>conf/csfw/2005</crossref>
<booktitle>CSFW</booktitle>
<ee>https://doi.org/10.1109/CSFW.2005.26</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/CSFW.2005.26</ee>
<url>db/conf/csfw/csfw2005.html#DelicataS05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/esorics/ChaumRS05" mdate="2019-10-19">
<author pid="c/DavidChaum">David Chaum</author>
<author orcid="0000-0002-1677-9034" pid="r/PeterYARyan">Peter Y. A. Ryan</author>
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<title>A Practical Voter-Verifiable Election Scheme.</title>
<pages>118-139</pages>
<year>2005</year>
<crossref>conf/esorics/2005</crossref>
<booktitle>ESORICS</booktitle>
<ee type="oa">https://doi.org/10.1007/11555827_8</ee>
<ee>https://www.wikidata.org/entity/Q60173602</ee>
<url>db/conf/esorics/esorics2005.html#ChaumRS05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ifip1-7/DelicataS05" mdate="2019-06-02">
<author pid="17/130">Rob Delicata</author>
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<title>A Formal Approach for Reasoning About a Class of Diffie-Hellman Protocols.</title>
<pages>34-46</pages>
<year>2005</year>
<crossref>conf/ifip1-7/2005</crossref>
<booktitle>Formal Aspects in Security and Trust</booktitle>
<ee>https://doi.org/10.1007/11679219_4</ee>
<ee>https://www.wikidata.org/entity/Q60173598</ee>
<url>db/conf/ifip1-7/fast2005.html#DelicataS05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ifm/SchneiderTE05" mdate="2026-03-24">
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<author orcid="0000-0003-1835-4803" pid="37/5761">Helen Treharne</author>
<author pid="15/66">Neil Evans</author>
<title>Chunks: Component Verification in CSP||B.</title>
<pages>89-108</pages>
<year>2005</year>
<crossref>conf/ifm/2005</crossref>
<booktitle>IFM</booktitle>
<ee>https://doi.org/10.1007/11589976_7</ee>
<url>db/conf/ifm/ifm2005.html#SchneiderTE05</url>
</inproceedings>
</r>
<r><inproceedings key="journals/entcs/SchneiderHRT05" mdate="2022-12-12">
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<author pid="38/3500">Thai Son Hoang</author>
<author pid="r/KenRobinson">Ken Robinson</author>
<author orcid="0000-0003-1835-4803" pid="37/5761">Helen Treharne</author>
<title>Tank Monitoring: A pAMN Case Study.</title>
<pages>183-204</pages>
<year>2005</year>
<crossref>conf/refine/2005</crossref>
<booktitle>REFINE</booktitle>
<ee type="oa">https://doi.org/10.1016/j.entcs.2005.04.031</ee>
<ee>https://www.wikidata.org/entity/Q60173605</ee>
<url>db/conf/refine/refine2005.html#SchneiderHRT05</url>
</inproceedings>
</r>
<r><inproceedings key="journals/entcs/OuaknineS06" mdate="2023-01-20">
<author orcid="0000-0003-0031-9356" pid="55/4663">Jo&#235;l Ouaknine</author>
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<title>Timed CSP: A Retrospective.</title>
<pages>273-276</pages>
<year>2005</year>
<crossref>conf/apc25/2005</crossref>
<booktitle>APC 25</booktitle>
<ee type="oa">https://doi.org/10.1016/j.entcs.2005.12.093</ee>
<ee>https://www.wikidata.org/entity/Q60173600</ee>
<url>db/journals/entcs/entcs162.html#OuaknineS06</url>
</inproceedings>
</r>
<r><proceedings key="conf/zum/2005" mdate="2019-05-14">
<editor pid="37/5761">Helen Treharne</editor>
<editor pid="06/1838">Steve King 0001</editor>
<editor pid="h/MartinCHenson">Martin C. Henson</editor>
<editor pid="s/SASchneider">Steve A. Schneider</editor>
<title>ZB 2005: Formal Specification and Development in Z and B, 4th International Conference of B and Z Users, Guildford, UK, April 13-15, 2005, Proceedings</title>
<volume>3455</volume>
<year>2005</year>
<isbn>3-540-25559-1</isbn>
<booktitle>ZB</booktitle>
<series href="db/series/lncs/index.html">Lecture Notes in Computer Science</series>
<publisher>Springer</publisher>
<ee>https://doi.org/10.1007/b135596</ee>
<url>db/conf/zum/zb2005.html</url>
</proceedings>
</r>
<r><inproceedings key="conf/birthday/SchneiderD04" mdate="2024-02-05">
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<author pid="17/130">Rob Delicata</author>
<title>Verifying Security Protocols: An Application of CSP.</title>
<pages>243-263</pages>
<year>2004</year>
<crossref>conf/birthday/2004csp</crossref>
<booktitle>25 Years Communicating Sequential Processes</booktitle>
<ee>https://doi.org/10.1007/11423348_14</ee>
<url>db/conf/birthday/csp2004.html#SchneiderD04</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ifm/SchneiderT04" mdate="2024-02-05">
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<author pid="37/5761">Helen Treharne</author>
<title>Verifying Controlled Components.</title>
<pages>87-107</pages>
<ee>https://doi.org/10.1007/978-3-540-24756-2_6</ee>
<year>2004</year>
<crossref>conf/ifm/2004</crossref>
<booktitle>IFM</booktitle>
<url>db/conf/ifm/ifm2004.html#SchneiderT04</url>
</inproceedings>
</r>
<r><article key="journals/fmsd/YeungS03" mdate="2020-08-07">
<author orcid="0000-0001-6099-4148" pid="y/WingLokYeung">Wing Lok Yeung</author>
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<title>Design and Verification of Distributed Recovery Blocks with CSP.</title>
<pages>225-248</pages>
<year>2003</year>
<volume>22</volume>
<journal>Formal Methods Syst. Des.</journal>
<number>3</number>
<ee>https://doi.org/10.1023/A:1022997110855</ee>
<ee>https://www.wikidata.org/entity/Q60173607</ee>
<url>db/journals/fmsd/fmsd22.html#YeungS03</url>
</article>
</r>
<r><article key="journals/jcs/HeatherLS03" mdate="2023-08-28">
<author pid="36/3662">James Heather</author>
<author pid="84/5569">Gavin Lowe</author>
<author pid="s/SASchneider">Steve A. Schneider</author>
<title>How to Prevent Type Flaw Attacks on Security Protocols.</title>
<pages>217-244</pages>
<year>2003</year>
<volume>11</volume>
<journal>J. Comput. Secur.</journal>
<number>2</number>
<url>db/journals/jcs/jcs11.html#HeatherLS03</url>
<ee>https://doi.org/10.3233/jcs-2003-11204</ee>
<ee>https://www.wikidata.org/entity/Q114944224</ee>
</article>
</r>
<r><article key="journals/jsac/GongGRS03" mdate="2024-10-06">
<author pid="46/6786">Li Gong</author>
<author orcid="0000-0002-7189-1758" pid="91/7024">Joshua D. Guttman</author>
<author orcid="0000-0002-1677-9034" pid="r/PeterYARyan">Peter Y. A. Ryan</author>
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<title>Guest editorial overview.</title>
<pages>1-4</pages>
<year>2003</year>
<volume>21</volume>
<journal>IEEE J. Sel. Areas Commun.</journal>
<number>1</number>
<ee>https://doi.org/10.1109/JSAC.2002.806120</ee>
<ee>https://www.wikidata.org/entity/Q60173608</ee>
<url>db/journals/jsac/jsac21.html#GongGRS03</url>
</article>
</r>
<r><inproceedings key="conf/zum/TreharneSB03" mdate="2024-02-05">
<author pid="37/5761">Helen Treharne</author>
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<author pid="07/6813">Marchia Bramble</author>
<title>Composing Specifications Using Communication.</title>
<pages>58-78</pages>
<year>2003</year>
<crossref>conf/zum/2003</crossref>
<booktitle>ZB</booktitle>
<ee>https://doi.org/10.1007/3-540-44880-2_5</ee>
<url>db/conf/zum/zb2003.html#TreharneSB03</url>
</inproceedings>
</r>
<r><proceedings key="conf/fasec/2002" mdate="2021-09-15">
<editor pid="92/3852">Ali E. Abdallah</editor>
<editor pid="r/PeterYARyan">Peter Y. A. Ryan</editor>
<editor pid="s/SASchneider">Steve A. Schneider</editor>
<title>Formal Aspects of Security, First International Conference, FASec 2002, London, UK, December 16-18, 2002, Revised Papers</title>
<booktitle>FASec</booktitle>
<series href="db/series/lncs/index.html">Lecture Notes in Computer Science</series>
<volume>2629</volume>
<publisher>Springer</publisher>
<year>2003</year>
<isbn>3-540-20693-0</isbn>
<ee>https://doi.org/10.1007/b94774</ee>
<url>db/conf/fasec/fasec2002.html</url>
</proceedings>
</r>
<r><inproceedings key="conf/esorics/HeatherS02" mdate="2020-08-07">
<author pid="36/3662">James Heather</author>
<author pid="s/SASchneider">Steve A. Schneider</author>
<title>Equal To The Task?</title>
<pages>162-177</pages>
<year>2002</year>
<crossref>conf/esorics/2002</crossref>
<booktitle>ESORICS</booktitle>
<ee>https://doi.org/10.1007/3-540-45853-0_10</ee>
<url>db/conf/esorics/esorics2002.html#HeatherS02</url>
</inproceedings>
</r>
<r><inproceedings key="conf/fmoods/Schneider02" mdate="2020-08-07">
<author pid="s/SASchneider">Steve A. Schneider</author>
<title>Verifying Authentication Protocol Implementations.</title>
<pages>5-24</pages>
<year>2002</year>
<crossref>conf/fmoods/2002</crossref>
<booktitle>FMOODS</booktitle>
<url>db/conf/fmoods/fmoods2002.html#Schneider02</url>
</inproceedings>
</r>
<r><inproceedings key="conf/zum/SchneiderT02" mdate="2026-03-24">
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<author orcid="0000-0003-1835-4803" pid="37/5761">Helen Treharne</author>
<title>Communicating B Machines.</title>
<pages>416-435</pages>
<year>2002</year>
<crossref>conf/zum/2002</crossref>
<booktitle>ZB</booktitle>
<ee>https://doi.org/10.1007/3-540-45648-1_22</ee>
<url>db/conf/zum/zb2002.html#SchneiderT02</url>
</inproceedings>
</r>
<r><book key="books/daglib/0015710" mdate="2019-07-22">
<author pid="s/SASchneider">Steve A. Schneider</author>
<title>The B-method - an introduction.</title>
<pages>I-XIII, 1-370</pages>
<publisher>Macmillan Publ.</publisher>
<year>2001</year>
<series>The cornerstones of computing series</series>
<isbn>978-0-333-79284-1</isbn>
</book>
</r>
<r><book key="books/daglib/0009544" mdate="2011-03-25">
<author pid="r/PeterYARyan">Peter Y. A. Ryan</author>
<author pid="s/SASchneider">Steve A. Schneider</author>
<title>Modelling and analysis of security protocols.</title>
<pages>I-XIV, 1-300</pages>
<publisher>Addison-Wesley-Longman</publisher>
<year>2001</year>
<isbn>978-0-201-67471-2</isbn>
</book>
</r>
<r><article key="journals/jcs/RyanS01" mdate="2023-08-28">
<author orcid="0000-0002-1677-9034" pid="r/PeterYARyan">Peter Y. A. Ryan</author>
<author pid="s/SASchneider">Steve A. Schneider</author>
<title>Process Algebra and Non-Interference.</title>
<pages>75-103</pages>
<year>2001</year>
<volume>9</volume>
<journal>J. Comput. Secur.</journal>
<number>1/2</number>
<url>db/journals/jcs/jcs9.html#RyanS01</url>
<ee>https://doi.org/10.3233/jcs-2001-91-204</ee>
<ee>https://www.wikidata.org/entity/Q114944289</ee>
</article>
</r>
<r><inproceedings key="conf/concur/Schneider01" mdate="2020-08-07">
<author pid="s/SASchneider">Steve A. Schneider</author>
<title>Process Algebra and Security.</title>
<pages>37-38</pages>
<year>2001</year>
<crossref>conf/concur/2001</crossref>
<booktitle>CONCUR</booktitle>
<ee>https://doi.org/10.1007/3-540-44685-0_4</ee>
<url>db/conf/concur/concur2001.html#Schneider01</url>
</inproceedings>
</r>
<r><article key="journals/fac/Schneider00" mdate="2022-05-09">
<author pid="s/SASchneider">Steve A. Schneider</author>
<title>Abstraction and Testing in CSP.</title>
<pages>165-181</pages>
<year>2000</year>
<volume>12</volume>
<journal>Formal Aspects Comput.</journal>
<number>3</number>
<ee type="oa">https://doi.org/10.1007/s001650070027</ee>
<url>db/journals/fac/fac12.html#Schneider00</url>
</article>
</r>
<r><inproceedings key="conf/csfw/HeatherS00" mdate="2023-03-24">
<author pid="36/3662">James Heather</author>
<author pid="s/SASchneider">Steve A. Schneider</author>
<title>Towards Automatic Verification of Authentication Protocols on an Unbounded Network.</title>
<pages>132-143</pages>
<year>2000</year>
<crossref>conf/csfw/2000</crossref>
<booktitle>CSFW</booktitle>
<ee>https://doi.org/10.1109/CSFW.2000.856932</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/CSFW.2000.856932</ee>
<url>db/conf/csfw/csfw2000.html#HeatherS00</url>
</inproceedings>
</r>
<r><inproceedings key="conf/csfw/HeatherLS00" mdate="2024-02-05">
<author pid="36/3662">James Heather</author>
<author pid="84/5569">Gavin Lowe</author>
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<title>How to Prevent Type Flaw Attacks on Security Protocols.</title>
<pages>255-268</pages>
<year>2000</year>
<crossref>conf/csfw/2000</crossref>
<booktitle>CSFW</booktitle>
<ee>https://doi.org/10.1109/CSFW.2000.856942</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/CSFW.2000.856942</ee>
<url>db/conf/csfw/csfw2000.html#HeatherLS00</url>
</inproceedings>
</r>
<r><inproceedings key="conf/esorics/EvansS00" mdate="2024-02-05">
<author pid="15/66">Neil Evans</author>
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<title>Analysing Time Dependent Security Properties in CSP Using PVS.</title>
<pages>222-237</pages>
<year>2000</year>
<crossref>conf/esorics/2000</crossref>
<booktitle>ESORICS</booktitle>
<ee>https://doi.org/10.1007/10722599_14</ee>
<url>db/conf/esorics/esorics2000.html#EvansS00</url>
</inproceedings>
</r>
<r><inproceedings key="conf/zum/TreharneS00" mdate="2026-03-24">
<author orcid="0000-0003-1835-4803" pid="37/5761">Helen Treharne</author>
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<title>How to Drive a B Machine.</title>
<pages>188-208</pages>
<year>2000</year>
<crossref>conf/zum/2000</crossref>
<booktitle>ZB</booktitle>
<ee>https://doi.org/10.1007/3-540-44525-0_12</ee>
<url>db/conf/zum/zb2000.html#TreharneS00</url>
</inproceedings>
</r>
<r><inproceedings key="journals/entcs/Schneider00" mdate="2022-11-30">
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<title>May Testing, Non-interference, and Compositionality.</title>
<year>2000</year>
<crossref>conf/mfcsit/2000</crossref>
<booktitle>MFCSIT</booktitle>
<ee type="oa">https://doi.org/10.1016/S1571-0661(05)80064-7</ee>
<ee>https://www.wikidata.org/entity/Q60173610</ee>
<url>db/journals/entcs/entcs40.html#Schneider00</url>
<pages>361-391</pages>
</inproceedings>
</r>
<r><proceedings key="conf/wsaif/1999" mdate="2022-11-30">
<editor pid="s/SASchneider">Steve A. Schneider</editor>
<editor pid="r/PeterYARyan">Peter Ryan 0001</editor>
<title>Workshop on Secure Architectures and Information Flow 1999, Royal Holloway, London, UK, December 1-3, 1999</title>
<booktitle>Workshop on Secure Architectures and Information Flow</booktitle>
<series href="db/series/entcs/index.html">Electronic Notes in Theoretical Computer Science</series>
<volume>32</volume>
<publisher>Elsevier</publisher>
<year>2000</year>
<ee>https://www.sciencedirect.com/journal/electronic-notes-in-theoretical-computer-science/vol/32/suppl/C</ee>
<url>db/journals/entcs/entcs32.html</url>
</proceedings>
</r>
<r><inproceedings key="conf/csfw/RyanS99" mdate="2024-02-05">
<author pid="r/PeterYARyan">Peter Y. A. Ryan</author>
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<title>Process Algebra and Non-Interference.</title>
<pages>214-227</pages>
<year>1999</year>
<crossref>conf/csfw/1999</crossref>
<booktitle>CSFW</booktitle>
<ee>https://doi.org/10.1109/CSFW.1999.779775</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/CSFW.1999.779775</ee>
<url>db/conf/csfw/csfw1999.html#RyanS99</url>
</inproceedings>
</r>
<r><inproceedings key="conf/fm/Schneider99" mdate="2020-08-07">
<author pid="s/SASchneider">Steve A. Schneider</author>
<title>Abstraction and Testing.</title>
<pages>738-757</pages>
<year>1999</year>
<crossref>conf/fm/1999-1</crossref>
<booktitle>World Congress on Formal Methods</booktitle>
<ee>https://doi.org/10.1007/3-540-48119-2_41</ee>
<url>db/conf/fm/fm1999-1.html#Schneider99</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ifm/TreharneS99" mdate="2020-08-07">
<author pid="37/5761">Helen Treharne</author>
<author pid="s/SASchneider">Steve A. Schneider</author>
<title>Using a Process Algebra to Control B Operations.</title>
<pages>437-456</pages>
<year>1999</year>
<crossref>conf/ifm/1999</crossref>
<booktitle>IFM</booktitle>
<url>db/conf/ifm/ifm1999.html#TreharneS99</url>
<ee>https://doi.org/10.1007/978-1-4471-0851-1_23</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/spin/AdekunleS99" mdate="2020-08-07">
<author pid="46/4096">Carl B. Adekunle</author>
<author pid="s/SASchneider">Steve A. Schneider</author>
<title>Detecting Feature Interactions in the Terrestrial Trunked Radio (TETRA) Network Using Promela and Xspin.</title>
<pages>136-151</pages>
<year>1999</year>
<crossref>conf/spin/1999</crossref>
<booktitle>SPIN</booktitle>
<ee>https://doi.org/10.1007/3-540-48234-2_10</ee>
<url>db/conf/spin/spin1999.html#AdekunleS99</url>
</inproceedings>
</r>
<r><inproceedings key="journals/entcs/SchneiderR00" mdate="2022-11-30">
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<author orcid="0000-0002-1677-9034" pid="r/PeterYARyan">Peter Ryan 0001</author>
<title>Preface.</title>
<year>1999</year>
<crossref>conf/wsaif/1999</crossref>
<booktitle>Workshop on Secure Architectures and Information Flow</booktitle>
<pages>113-114</pages>
<ee type="oa">https://doi.org/10.1016/S1571-0661(05)80565-1</ee>
<ee>https://www.wikidata.org/entity/Q60173612</ee>
<url>db/journals/entcs/entcs32.html#SchneiderR00</url>
</inproceedings>
</r>
<r><article key="journals/ipl/RyanS98" mdate="2022-12-07">
<author pid="r/PeterYARyan">Peter Y. A. Ryan</author>
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<title>An Attack on a Recursive Authentication Protocol. A Cautionary Tale.</title>
<pages>7-10</pages>
<year>1998</year>
<volume>65</volume>
<journal>Inf. Process. Lett.</journal>
<number>1</number>
<url>db/journals/ipl/ipl65.html#RyanS98</url>
<ee>https://doi.org/10.1016/S0020-0190(97)00180-4</ee>
</article>
</r>
<r><article key="journals/tse/Schneider98" mdate="2020-08-07">
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<title>Verifying Authentication Protocols in CSP.</title>
<pages>741-758</pages>
<ee>https://doi.org/10.1109/32.713329</ee>
<ee>http://doi.ieeecomputersociety.org/10.1109/32.713329</ee>
<ee>https://www.wikidata.org/entity/Q60173616</ee>
<year>1998</year>
<volume>24</volume>
<journal>IEEE Trans. Software Eng.</journal>
<number>9</number>
<url>db/journals/tse/tse24.html#Schneider98</url>
</article>
</r>
<r><inproceedings key="conf/b/TreharneDS98" mdate="2026-03-24">
<author orcid="0000-0003-1835-4803" pid="37/5761">Helen Treharne</author>
<author pid="15/2189">J. Draper</author>
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<title>Test Case Preparation Using a Prototype.</title>
<pages>293-311</pages>
<year>1998</year>
<crossref>conf/b/1998</crossref>
<booktitle>B</booktitle>
<ee>https://doi.org/10.1007/BFb0053368</ee>
<url>db/conf/b/b1998.html#TreharneDS98</url>
</inproceedings>
</r>
<r><inproceedings key="conf/csfw/Schneider98" mdate="2023-03-24">
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<title>Formal Analysis of a Non-Repudiation Protocol.</title>
<pages>54-65</pages>
<year>1998</year>
<crossref>conf/csfw/1998</crossref>
<booktitle>CSFW</booktitle>
<ee>https://doi.org/10.1109/CSFW.1998.683155</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/CSFW.1998.683155</ee>
<ee>https://www.wikidata.org/entity/Q60173613</ee>
<url>db/conf/csfw/csfw1998.html#Schneider98</url>
</inproceedings>
</r>
<r><article key="journals/scp/Schneider97" mdate="2021-02-17">
<author pid="s/SASchneider">Steve A. Schneider</author>
<title>Timewise Refinement for Communicating Processes.</title>
<pages>43-90</pages>
<year>1997</year>
<volume>28</volume>
<journal>Sci. Comput. Program.</journal>
<number>1</number>
<url>db/journals/scp/scp28.html#Schneider97</url>
<ee type="oa">https://doi.org/10.1016/S0167-6423(96)00016-0</ee>
</article>
</r>
<r><inproceedings key="conf/csfw/Schneider97" mdate="2024-02-05">
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<title>Verifying authentication protocols with CSP.</title>
<pages>3-17</pages>
<year>1997</year>
<crossref>conf/csfw/1997</crossref>
<booktitle>CSFW</booktitle>
<ee>https://doi.org/10.1109/CSFW.1997.596775</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/CSFW.1997.596775</ee>
<url>db/conf/csfw/csfw1997.html#Schneider97</url>
</inproceedings>
</r>
<r><inproceedings key="conf/tphol/DutertreS97" mdate="2024-02-05">
<author pid="d/BDutertre">Bruno Dutertre</author>
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<title>Using a PVS Embedding of CSP to Verify Authentication Protocols.</title>
<pages>121-136</pages>
<year>1997</year>
<crossref>conf/tphol/1997</crossref>
<booktitle>TPHOLs</booktitle>
<url>db/conf/tphol/tphol97.html#DutertreS97</url>
<ee>https://doi.org/10.1007/BFb0028390</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/esorics/SchneiderS96" mdate="2024-02-05">
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<author pid="42/2019">Abraham Sidiropoulos</author>
<title>CSP and Anonymity.</title>
<pages>198-218</pages>
<year>1996</year>
<crossref>conf/esorics/1996</crossref>
<booktitle>ESORICS</booktitle>
<ee>https://doi.org/10.1007/3-540-61770-1_38</ee>
<url>db/conf/esorics/esorics1996.html#SchneiderS96</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sp/Schneider96" mdate="2023-09-21">
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<title>Security Properties and CSP.</title>
<pages>174-187</pages>
<year>1996</year>
<crossref>conf/sp/1996</crossref>
<booktitle>S&#38;P</booktitle>
<ee>https://doi.org/10.1109/SECPRI.1996.502680</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/SECPRI.1996.502680</ee>
<ee>https://dl.acm.org/doi/10.5555/525080.884250</ee>
<url>db/conf/sp/sp1996.html#Schneider96</url>
</inproceedings>
</r>
<r><article key="journals/iandc/Schneider95" mdate="2021-02-12">
<title>An Operational Semantics for Timed CSP</title>
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<pages>193-213</pages>
<journal>Inf. Comput.</journal>
<month>February</month>
<year>1995</year>
<volume>116</volume>
<number>2</number>
<url>db/journals/iandc/iandc116.html#Schneider95</url>
<ee type="oa">https://doi.org/10.1006/inco.1995.1014</ee>
<ee>https://www.wikidata.org/entity/Q60173625</ee>
</article>
</r>
<r><article key="journals/tcs/DaviesS95" mdate="2021-02-17">
<author orcid="0000-0003-4664-6862" pid="66/4336">Jim Davies</author>
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<title>A Brief History of Timed CSP.</title>
<pages>243-271</pages>
<year>1995</year>
<volume>138</volume>
<journal>Theor. Comput. Sci.</journal>
<number>2</number>
<url>db/journals/tcs/tcs138.html#DaviesS95</url>
<ee type="oa">https://doi.org/10.1016/0304-3975(94)00169-J</ee>
<ee>https://www.wikidata.org/entity/Q60173621</ee>
</article>
</r>
<r><article key="journals/tcs/MisloveRS95" mdate="2022-12-07">
<author orcid="0000-0002-6650-1399" pid="m/MWMislove">Michael W. Mislove</author>
<author pid="r/AWRoscoe">A. W. Roscoe 0001</author>
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<title>Fixed Points Without Completeness.</title>
<pages>273-314</pages>
<year>1995</year>
<volume>138</volume>
<journal>Theor. Comput. Sci.</journal>
<number>2</number>
<url>db/journals/tcs/tcs138.html#MisloveRS95</url>
<ee type="oa">https://doi.org/10.1016/0304-3975(94)00170-N</ee>
<ee>https://www.wikidata.org/entity/Q60173630</ee>
</article>
</r>
<r><inproceedings key="conf/concur/BryansDS95" mdate="2023-09-30">
<author pid="b/JeremyBryans">Jeremy W. Bryans</author>
<author pid="66/4336">Jim Davies</author>
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<title>Towards a denotational semantics for ET-LOTOS.</title>
<pages>269-283</pages>
<year>1995</year>
<crossref>conf/concur/1995</crossref>
<booktitle>CONCUR</booktitle>
<url>db/conf/concur/concur1995.html#BryansDS95</url>
<ee>https://doi.org/10.1007/3-540-60218-6_20</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/forte/DaviesBS95" mdate="2020-08-07">
<author pid="66/4336">Jim Davies</author>
<author pid="b/JeremyBryans">Jeremy W. Bryans</author>
<author pid="s/SASchneider">Steve A. Schneider</author>
<title>Real-time LOTOS and Timed Observations.</title>
<pages>383-397</pages>
<year>1995</year>
<crossref>conf/forte/1995</crossref>
<booktitle>FORTE</booktitle>
<url>db/conf/forte/forte1995.html#DaviesBS95</url>
</inproceedings>
</r>
<r><article key="journals/fac/DaviesS94" mdate="2022-05-09">
<author orcid="0000-0003-4664-6862" pid="66/4336">Jim Davies</author>
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<title>Recursion Induction for Real-Time Processes.</title>
<pages>530-553</pages>
<year>1993</year>
<volume>5</volume>
<journal>Formal Aspects Comput.</journal>
<number>6</number>
<url>db/journals/fac/fac5.html#DaviesS94</url>
<ee type="oa">https://doi.org/10.1007/BF01211248</ee>
<ee>https://www.wikidata.org/entity/Q60173633</ee>
</article>
</r>
<r><inproceedings key="conf/amast/Schneider93" mdate="2020-08-07">
<author pid="s/SASchneider">Steve A. Schneider</author>
<title>Rigorous Specification of Real-Time Systems.</title>
<pages>59-74</pages>
<year>1993</year>
<crossref>conf/amast/1993</crossref>
<booktitle>AMAST</booktitle>
<url>db/conf/amast/amast93.html#Schneider93</url>
</inproceedings>
</r>
<r><inproceedings key="conf/mfps/Schneider93" mdate="2024-02-05">
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<title>Timewise Refinement for Communicating Processes.</title>
<pages>177-214</pages>
<year>1993</year>
<crossref>conf/mfps/1993</crossref>
<booktitle>MFPS</booktitle>
<url>db/conf/mfps/mfps1993.html#Schneider93</url>
<ee>https://doi.org/10.1007/3-540-58027-1_9</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/concur/DaviesS92" mdate="2023-09-30">
<author orcid="0000-0003-4664-6862" pid="66/4336">Jim Davies</author>
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<title>Using CSP to Verify a Timed Protocol over a Fair Medium.</title>
<pages>355-369</pages>
<year>1992</year>
<crossref>conf/concur/1992</crossref>
<booktitle>CONCUR</booktitle>
<url>db/conf/concur/concur1992.html#DaviesS92</url>
<ee>https://doi.org/10.1007/BFb0084803</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/ftrtft/DaviesJS92" mdate="2021-04-09">
<author orcid="0000-0003-4664-6862" pid="66/4336">Jim Davies</author>
<author pid="71/4732">Dave Jackson</author>
<author pid="s/SASchneider">Steve A. Schneider</author>
<title>Broadcast Communication for Real-time Processes.</title>
<pages>149-169</pages>
<year>1992</year>
<crossref>conf/ftrtft/1992</crossref>
<booktitle>FTRTFT</booktitle>
<url>db/conf/ftrtft/ftrtft1992.html#DaviesJS92</url>
<ee>https://doi.org/10.1007/3-540-55092-5_9</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/rex/SchneiderDJRRR91" mdate="2023-09-30">
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<author orcid="0000-0003-4664-6862" pid="66/4336">Jim Davies</author>
<author pid="49/4694">D. M. Jackson</author>
<author pid="r/GMReed">George M. Reed</author>
<author pid="10/4667">Joy N. Reed</author>
<author pid="r/AWRoscoe">A. W. Roscoe 0001</author>
<title>Timed CSP: Theory and Practice.</title>
<pages>640-675</pages>
<year>1991</year>
<crossref>conf/rex/1991</crossref>
<booktitle>REX Workshop</booktitle>
<url>db/conf/rex/rex91.html#SchneiderDJRRR91</url>
<ee>https://doi.org/10.1007/BFb0032011</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/mfps/DaviesS89" mdate="2023-09-30">
<author orcid="0000-0003-4664-6862" pid="66/4336">Jim Davies</author>
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<title>Factorizing Proofs in Timed CSP.</title>
<pages>129-159</pages>
<year>1989</year>
<crossref>conf/mfps/1989</crossref>
<booktitle>Mathematical Foundations of Programming Semantics</booktitle>
<url>db/conf/mfps/mfps1989.html#DaviesS89</url>
<ee>https://doi.org/10.1007/BFb0040256</ee>
</inproceedings>
</r>
<coauthors n="136" nc="2">
<co c="0"><na f="a/Abdallah:Ali_E=" pid="92/3852">Ali E. Abdallah</na></co>
<co c="0"><na f="a/Abdelhalim:Islam" pid="64/8724">Islam Abdelhalim</na></co>
<co c="-1"><na f="a/Adekunle:Carl_B=" pid="46/4096">Carl B. Adekunle</na></co>
<co c="0"><na f="a/Aktoudianakis:Evangelos" pid="134/6422">Evangelos Aktoudianakis</na></co>
<co c="0"><na f="a/Alsadi_0001:Mohammed" pid="168/6514-1">Mohammed Alsadi 0001</na></co>
<co c="-1"><na f="a/Alshehri_0001:Abdullah_Ali" pid="142/3272-1">Abdullah Ali Alshehri 0001</na></co>
<co c="0"><na f="a/Asghar:Muhammad_Rizwan" pid="82/10434">Muhammad Rizwan Asghar</na></co>
<co c="0"><na f="b/Benaloh:Josh" pid="53/5909">Josh Benaloh</na></co>
<co c="0"><na f="b/Bismark:David" pid="76/8522">David Bismark</na></co>
<co c="0"><na f="b/Boiten:Eerke_A=" pid="b/EABoiten">Eerke A. Boiten</na></co>
<co c="0"><na f="b/Boureanu:Ioana" pid="12/4955">Ioana Boureanu</na></co>
<co c="0"><na f="b/Bramble:Marchia" pid="07/6813">Marchia Bramble</na></co>
<co c="0"><na f="b/Bryans:Jeremy_W=" pid="b/JeremyBryans">Jeremy W. Bryans</na></co>
<co c="0"><na f="b/Budykho:Ksenia" pid="342/3731">Ksenia Budykho</na></co>
<co c="0"><na f="b/Burton:Craig" pid="00/275">Craig Burton</na></co>
<co c="0"><na f="b/Bush:Vicky_J=" pid="63/5821">Vicky J. Bush</na></co>
<co c="0"><na f="c/Casey_0001:Matthew" pid="27/7687-1">Matthew Casey 0001</na></co>
<co c="0"><na f="c/Cavalcanti_0001:Ana" pid="c/AnaCavalcanti">Ana Cavalcanti 0001</na></co>
<co c="0"><na f="c/Chaum:David" pid="c/DavidChaum">David Chaum</na></co>
<co c="0"><na f="c/Chen_0002:Liqun" pid="22/150-2">Liqun Chen 0002</na></co>
<co c="0"><na f="c/Collomosse:John_P=" pid="72/4504">John P. Collomosse</na></co>
<co c="0"><na f="c/Crampton:Jason" pid="c/JasonCrampton">Jason Crampton</na></co>
<co c="0"><na f="c/Culnane:Chris" pid="64/3207">Chris Culnane</na></co>
<co c="0"><na f="d/Darwish:Salaheddin" pid="119/3562">Salaheddin Darwish</na></co>
<co c="0"><na f="d/Davies:Jim" pid="66/4336">Jim Davies</na></co>
<co c="-1"><na f="d/Delicata:Rob" pid="17/130">Rob Delicata</na></co>
<co c="0"><na f="d/Demirel:Denise" pid="85/10370">Denise Demirel</na></co>
<co c="0"><na f="d/Desai:Nidhi" pid="242/0609">Nidhi Desai</na></co>
<co c="0"><na f="d/Dimitrakos:Theodosis" pid="99/4618">Theodosis Dimitrakos</na></co>
<co c="0"><na f="d/Dongol:Brijesh" pid="01/4516">Brijesh Dongol</na></co>
<co c="0"><na f="d/Dragan:Constantin_Catalin" pid="77/7303">Constantin Catalin Dragan</na></co>
<co c="0"><na f="d/Draper:J=" pid="15/2189">J. Draper</na></co>
<co c="0"><na f="d/Dupressoir:Fran=ccedil=ois" pid="57/10027">Fran&#231;ois Dupressoir</na></co>
<co c="-1"><na f="d/Dutertre:Bruno" pid="d/BDutertre">Bruno Dutertre</na></co>
<co c="0"><na f="e/Evans:Neil" pid="15/66">Neil Evans</na></co>
<co c="1"><na f="f/Foot:Kirsten" pid="33/9722">Kirsten Foot</na></co>
<co c="0"><na f="f/Foulle:S=eacute=bastien" pid="07/5998">S&#233;bastien Foulle</na></co>
<co c="0"><na f="f/Fraser:Ashley" pid="247/1548">Ashley Fraser</na></co>
<co c="0"><na f="f/Frymann:Nick" pid="255/5329">Nick Frymann</na></co>
<co c="0"><na f="g/Gheyas:Iffat" pid="117/2002">Iffat Gheyas</na></co>
<co c="0"><na f="g/Giannetsos:Thanassis" pid="96/1667">Thanassis Giannetsos</na></co>
<co c="0"><na f="g/Gittings:Thomas" pid="244/2377">Thomas Gittings</na></co>
<co c="0"><na f="g/Gong:Li" pid="46/6786">Li Gong</na></co>
<co c="0"><na f="g/Grant:Neil" pid="97/3333">Neil Grant</na></co>
<co c="0"><na f="g/Guttman:Joshua_D=" pid="91/7024">Joshua D. Guttman</na></co>
<co c="0"><na f="h/Han:Jinguang" pid="77/9673">Jinguang Han</na></co>
<co c="0"><na f="h/Haynes:Paul" pid="13/2431">Paul Haynes</na></co>
<co c="0"><na f="h/Heather:James" pid="36/3662">James Heather</na></co>
<co c="0"><na f="h/Henning:Maria" pid="118/7466">Maria Henning</na></co>
<co c="0"><na f="h/Henson:Martin_C=" pid="h/MartinCHenson">Martin C. Henson</na></co>
<co c="0"><na f="h/Hoang:Thai_Son" pid="38/3500">Thai Son Hoang</na></co>
<co c="0"><na f="i/Ifill:Wilson" pid="38/2829">Wilson Ifill</na></co>
<co c="0"><na f="j/Jackson:D=_M=" pid="49/4694">D. M. Jackson</na></co>
<co c="0"><na f="j/Jackson:Dave" pid="71/4732">Dave Jackson</na></co>
<co c="0"><na f="j/James:Phillip" pid="31/10525">Phillip James</na></co>
<co c="0" n="2"><na f="j/Jamroga:Wojciech" pid="09/966">Wojciech Jamroga</na><na>Wojtek Jamroga</na></co>
<co c="1"><na f="j/Jankowski:Nicholas_W=" pid="14/4367">Nicholas W. Jankowski</na></co>
<co c="0"><na f="j/Joaquim:Rui" pid="94/6500">Rui Joaquim</na></co>
<co c="0" n="2"><na f="j/Jonker:Hugo_L=" pid="33/1453">Hugo L. Jonker</na><na>Hugo Jonker</na></co>
<co c="0"><na f="k/Kargl:Frank" pid="46/306">Frank Kargl</na></co>
<co c="0"><na f="k/Karkinsky:Damien" pid="89/5104">Damien Karkinsky</na></co>
<co c="0"><na f="k/King_0001:Steve" pid="06/1838">Steve King 0001</na></co>
<co c="1"><na f="k/Kluver:Randy" pid="131/0307">Randy Kluver</na></co>
<co c="0"><na f="k/Kulik:Tomas" pid="223/6374">Tomas Kulik</na></co>
<co c="0"><na f="l/Larsen:Peter_Gorm" pid="40/6670">Peter Gorm Larsen</na></co>
<co c="0"><na f="l/Leeding:Kent" pid="407/6636">Kent Leeding</na></co>
<co c="0"><na f="l/Lewis:Matt" pid="10/5971">Matt Lewis</na></co>
<co c="0"><na f="l/Li_0001:Ninghui" pid="l/NinghuiLi">Ninghui Li 0001</na></co>
<co c="0"><na f="l/Liang:Kaitai" pid="126/6037">Kaitai Liang</na></co>
<co c="0"><na f="l/Llewellyn:Morgan" pid="55/10370">Morgan Llewellyn</na></co>
<co c="0"><na f="l/Lowe:Gavin" pid="84/5569">Gavin Lowe</na></co>
<co c="0"><na f="m/Macedo:Hugo_Daniel" pid="46/1948">Hugo Daniel Macedo</na></co>
<co c="0"><na f="m/Maesa:Damiano_Di_Francesco" pid="192/5198">Damiano Di Francesco Maesa</na></co>
<co c="0"><na f="m/Manulis:Mark" pid="62/484">Mark Manulis</na></co>
<co c="0"><na f="m/Martinelli:Fabio" pid="m/FMartinelli">Fabio Martinelli</na></co>
<co c="0"><na f="m/McEwan:Alistair_A=" pid="43/879">Alistair A. McEwan</na></co>
<co c="0"><na f="m/Michael:David_R=" pid="271/8841">David R. Michael</na></co>
<co c="0"><na f="m/Mislove:Michael_W=" pid="m/MWMislove">Michael W. Mislove</na></co>
<co c="0"><na f="m/Moller:Faron" pid="m/FaronMoller">Faron Moller</na></co>
<co c="0"><na f="m/Moran:Murat" pid="129/9131">Murat Moran</na></co>
<co c="0" n="2"><na f="n/Nga:Nguyen_Hoang" pid="21/2630">Nguyen Hoang Nga</na><na>Hoang Nga Nguyen</na></co>
<co c="0"><na f="o/Ouaknine:Jo=euml=l" pid="55/4663">Jo&#235;l Ouaknine</na></co>
<co c="0"><na f="p/Paverd:Andrew" pid="30/9784">Andrew Paverd</na></co>
<co c="0"><na f="p/Peacock:Thea" pid="25/7618">Thea Peacock</na></co>
<co c="0"><na f="p/Peel:Roger_M=_A=" pid="92/745">Roger M. A. Peel</na></co>
<co c="-1"><na f="p/Polikarpova:Nadia" pid="13/7489">Nadia Polikarpova</na></co>
<co c="0"><na f="r/Rahulan:Yogaratnam" pid="204/5586">Yogaratnam Rahulan</na></co>
<co c="0"><na f="r/Rajaona:Fortunat" pid="323/4722">Fortunat Rajaona</na></co>
<co c="0"><na f="r/Reaves:Bradley" pid="117/3983">Bradley Reaves</na></co>
<co c="0"><na f="r/Reed:George_M=" pid="r/GMReed">George M. Reed</na></co>
<co c="0"><na f="r/Reed:Joy_N=" pid="10/4667">Joy N. Reed</na></co>
<co c="0"><na f="r/Ricci:Laura" pid="84/14">Laura Ricci</na></co>
<co c="0"><na f="r/Riley:Luke" pid="80/11131">Luke Riley</na></co>
<co c="0"><na f="r/Robinson:Ken" pid="r/KenRobinson">Ken Robinson</na></co>
<co c="0"><na f="r/Roggenbach:Markus" pid="86/743">Markus Roggenbach</na></co>
<co c="0"><na f="r/Romero:Daniel" pid="55/4650">Daniel Romero</na></co>
<co c="0"><na f="r/R=oslash=nne:Peter_B=" pid="172/4084">Peter B. R&#248;nne</na></co>
<co c="0"><na f="r/Roscoe_0001:A=_W=" pid="r/AWRoscoe">A. W. Roscoe 0001</na></co>
<co c="0" n="2"><na f="r/Ryan:Peter_Y=_A=" pid="r/PeterYARyan">Peter Y. A. Ryan</na><na>Peter Ryan 0001</na></co>
<co c="0"><na f="s/Sadeghi:Ahmad=Reza" pid="s/AhmadRezaSadeghi">Ahmad-Reza Sadeghi</na></co>
<co c="0"><na f="s/Sako:Kazue" pid="21/714">Kazue Sako</na></co>
<co c="0" n="2"><na f="s/Sallal:Muntadher_Fadhil" pid="181/7374">Muntadher Fadhil Sallal</na><na>Muntadher Sallal</na></co>
<co c="0"><na f="s/Sasse:Ralf" pid="35/4406">Ralf Sasse</na></co>
<co c="0"><na f="s/Sastry:Nishanth" pid="12/6462">Nishanth Sastry</na></co>
<co c="0"><na f="s/Sch=uuml=rmann_0001:Carsten" pid="07/4034-1">Carsten Sch&#252;rmann 0001</na></co>
<co c="0" n="2"><na f="s/Shaikh:Siraj_Ahmed" pid="s/SirajAShaikh">Siraj Ahmed Shaikh</na><na>Siraj A. Shaikh</na></co>
<co c="0"><na f="s/Sharp:James" pid="59/8724">James Sharp</na></co>
<co c="0"><na f="s/Shehu:Abubakar=Sadiq" pid="324/2395">Abubakar-Sadiq Shehu</na></co>
<co c="-1"><na f="s/Sidiropoulos:Abraham" pid="42/2019">Abraham Sidiropoulos</na></co>
<co c="0"><na f="s/Srinivasan:Sriramkrishnan" pid="54/3351">Sriramkrishnan Srinivasan</na></co>
<co c="0"><na f="s/Stark:Philip_B=" pid="27/4727">Philip B. Stark</na></co>
<co c="0"><na f="s/Stathakidis:Efstathios" pid="143/4042">Efstathios Stathakidis</na></co>
<co c="0"><na f="t/Teague:Vanessa" pid="t/VanessaTeague">Vanessa Teague</na></co>
<co c="0"><na f="t/Tippenhauer:Nils_Ole" pid="32/7125">Nils Ole Tippenhauer</na></co>
<co c="0" n="2"><na f="t/Tran=J=oslash=rgensen:Peter_W=uuml=rtz_Vinther" pid="145/2703">Peter W&#252;rtz Vinther Tran-J&#248;rgensen</na><na>Peter W. V. Tran-J&#248;rgensen</na></co>
<co c="0"><na f="t/Traor=eacute=:Jacques" pid="82/1924">Jacques Traor&#233;</na></co>
<co c="0"><na f="t/Treharne:Helen" pid="37/5761">Helen Treharne</na></co>
<co c="0"><na f="t/Trumble:Matthew" pid="129/9887">Matthew Trumble</na></co>
<co c="0"><na f="t/Turner:Edward" pid="33/3167">Edward Turner</na></co>
<co c="0"><na f="v/Vajar:Beeta" pid="43/8170">Beeta Vajar</na></co>
<co c="0"><na f="v/Volkamer:Melanie" pid="v/MelanieVolkamer">Melanie Volkamer</na></co>
<co c="0"><na f="w/Wadsworth:Joe" pid="255/4925">Joe Wadsworth</na></co>
<co c="0"><na f="w/Waller:Adrian" pid="81/7616">Adrian Waller</na></co>
<co c="0"><na f="w/Wehrheim:Heike" pid="w/HeikeWehrheim">Heike Wehrheim</na></co>
<co c="0"><na f="w/Welch:Peter_H=" pid="w/PeterHWelch">Peter H. Welch</na></co>
<co c="0"><na f="w/Wen:Roland" pid="88/7271">Roland Wen</na></co>
<co c="0"><na f="w/Wesemeyer:Stephan" pid="18/5892">Stephan Wesemeyer</na></co>
<co c="0"><na f="w/Whitefield:Jorden" pid="177/9145">Jorden Whitefield</na></co>
<co c="0"><na f="w/Williams:David_M=" pid="00/4041">David M. Williams</na></co>
<co c="0"><na f="w/Wilson:Nick" pid="38/239">Nick Wilson</na></co>
<co c="0"><na f="w/Woodcock_0001:Jim" pid="w/JWoodcock">Jim Woodcock 0001</na></co>
<co c="0"><na f="w/Woodward:Alan" pid="05/9432">Alan Woodward</na></co>
<co c="0"><na f="w/Wright:Phil" pid="229/1765">Phil Wright</na></co>
<co c="0"><na f="x/Xia:Zhe" pid="43/4169">Zhe Xia</na></co>
<co c="-1"><na f="y/Yeung:Wing_Lok" pid="y/WingLokYeung">Wing Lok Yeung</na></co>
<co c="0"><na f="z/Zollinger:Marie=Laure" pid="239/7924">Marie-Laure Zollinger</na></co>
</coauthors>
</dblpperson>

