| 2008 |
| 15 | EE | Zhe Xia,
Steve A. Schneider,
James Heather,
Jacques Traoré:
Analysis, Improvement, and Simplification of Prêt à Voter with Paillier Encryption.
EVT 2008 |
| 14 | EE | James Heather,
David Lundin:
The Append-Only Web Bulletin Board.
Formal Aspects in Security and Trust 2008: 242-256 |
| 2007 |
| 13 | EE | James Heather:
Implementing STV securely in Pret a Voter.
CSF 2007: 157-169 |
| 2006 |
| 12 | EE | Kun Wei,
James Heather:
A Theorem-Proving Approach to Verification of Fair Non-repudiation Protocols.
Formal Aspects in Security and Trust 2006: 202-219 |
| 11 | EE | James Heather,
Steve Schneider:
To infinity and beyond or, avoiding the infinite in security protocol analysis.
SAC 2006: 346-353 |
| 2005 |
| 10 | EE | Kun Wei,
James Heather:
Towards Verification of Timed Non-repudiation Protocols.
Formal Aspects in Security and Trust 2005: 244-257 |
| 9 | EE | Kun Wei,
James Heather:
Embedding the Stable Failures Model of CSP in PVS.
IFM 2005: 246-265 |
| 8 | | Nick Antonopoulos,
James Heather,
Roger M. A. Peel:
Programmable Agents for Generic Distributed Authorisation.
International Conference on Internet Computing 2005: 174-180 |
| 7 | | James Heather,
Steve Schneider:
A decision procedure for the existence of a rank function.
Journal of Computer Security 13(2): 317-344 (2005) |
| 2004 |
| 6 | EE | James Heather,
Jonathan Y. Clark:
Family Secrets.
Formal Aspects in Security and Trust 2004: 99-114 |
| 2003 |
| 5 | | James Heather,
Gavin Lowe,
Steve Schneider:
How to Prevent Type Flaw Attacks on Security Protocols.
Journal of Computer Security 11(2): 217-244 (2003) |
| 2002 |
| 4 | EE | James Heather:
Strand Spaces and Rank Functions: More than Distant Cousins.
CSFW 2002: 104- |
| 3 | EE | James Heather,
Steve Schneider:
Equal To The Task?
ESORICS 2002: 162-177 |
| 2000 |
| 2 | EE | James Heather,
Steve Schneider:
Towards Automatic Verification of Authentication Protocols on an Unbounded Network.
CSFW 2000: 132-143 |
| 1 | EE | James Heather,
Gavin Lowe,
Steve Schneider:
How to Prevent Type Flaw Attacks on Security Protocols.
CSFW 2000: 255-268 |