| 2008 |
| 9 | EE | Stéphanie Delaune,
Steve Kremer,
Graham Steel:
Formal Analysis of PKCS#11.
CSF 2008: 331-344 |
| 2007 |
| 8 | EE | Véronique Cortier,
Stéphanie Delaune,
Graham Steel:
A Formal Theory of Key Conjuring.
CSF 2007: 79-96 |
| 7 | EE | Véronique Cortier,
Gavin Keighren,
Graham Steel:
Automatic Analysis of the Security of XOR-Based Key Management Schemes.
TACAS 2007: 538-552 |
| 2006 |
| 6 | EE | Graham Steel,
Alan Bundy:
Attacking Group Protocols by Refuting Incorrect Inductive Conjectures.
J. Autom. Reasoning 36(1-2): 149-176 (2006) |
| 5 | EE | Graham Steel:
Formal analysis of PIN block attacks.
Theor. Comput. Sci. 367(1-2): 257-270 (2006) |
| 2005 |
| 4 | EE | Graham Steel:
Deduction with XOR Constraints in Security API Modelling.
CADE 2005: 322-336 |
| 3 | EE | Graham Steel:
The Importance of Non-theorems and Counterexamples in Program Verification.
VSTTE 2005: 491-495 |
| 2 | EE | Graham Steel,
Alan Bundy:
Attacking Group Multicast Key Management Protocols Using Coral.
Electr. Notes Theor. Comput. Sci. 125(1): 125-144 (2005) |
| 2004 |
| 1 | EE | Graham Steel,
Alan Bundy,
Monika Maidl:
Attacking a Protocol for Group Key Agreement by Refuting Incorrect Inductive Conjectures.
IJCAR 2004: 137-151 |