dblp.uni-trier.dewww.uni-trier.de

James Heather

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
15EEZhe Xia, Steve A. Schneider, James Heather, Jacques Traoré: Analysis, Improvement, and Simplification of Prêt à Voter with Paillier Encryption. EVT 2008
14EEJames Heather, David Lundin: The Append-Only Web Bulletin Board. Formal Aspects in Security and Trust 2008: 242-256
2007
13EEJames Heather: Implementing STV securely in Pret a Voter. CSF 2007: 157-169
2006
12EEKun Wei, James Heather: A Theorem-Proving Approach to Verification of Fair Non-repudiation Protocols. Formal Aspects in Security and Trust 2006: 202-219
11EEJames Heather, Steve Schneider: To infinity and beyond or, avoiding the infinite in security protocol analysis. SAC 2006: 346-353
2005
10EEKun Wei, James Heather: Towards Verification of Timed Non-repudiation Protocols. Formal Aspects in Security and Trust 2005: 244-257
9EEKun Wei, James Heather: Embedding the Stable Failures Model of CSP in PVS. IFM 2005: 246-265
8 Nick Antonopoulos, James Heather, Roger M. A. Peel: Programmable Agents for Generic Distributed Authorisation. International Conference on Internet Computing 2005: 174-180
7 James Heather, Steve Schneider: A decision procedure for the existence of a rank function. Journal of Computer Security 13(2): 317-344 (2005)
2004
6EEJames Heather, Jonathan Y. Clark: Family Secrets. Formal Aspects in Security and Trust 2004: 99-114
2003
5 James Heather, Gavin Lowe, Steve Schneider: How to Prevent Type Flaw Attacks on Security Protocols. Journal of Computer Security 11(2): 217-244 (2003)
2002
4EEJames Heather: Strand Spaces and Rank Functions: More than Distant Cousins. CSFW 2002: 104-
3EEJames Heather, Steve Schneider: Equal To The Task? ESORICS 2002: 162-177
2000
2EEJames Heather, Steve Schneider: Towards Automatic Verification of Authentication Protocols on an Unbounded Network. CSFW 2000: 132-143
1EEJames Heather, Gavin Lowe, Steve Schneider: How to Prevent Type Flaw Attacks on Security Protocols. CSFW 2000: 255-268

Coauthor Index

1Nick Antonopoulos [8]
2Jonathan Y. Clark [6]
3Gavin Lowe [1] [5]
4David Lundin [14]
5Roger M. A. Peel [8]
6Steve A. Schneider (Steve Schneider) [1] [2] [3] [5] [7] [11] [15]
7Jacques Traoré [15]
8Kun Wei [9] [10] [12]
9Zhe Xia [15]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)