Helen Treharne

Orcid: 0000-0003-1835-4803

According to our database1, Helen Treharne authored at least 75 papers between 1998 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Towards End-to-End Verifiable Online Voting: Adding Verifiability to Established Voting Systems.
IEEE Trans. Dependable Secur. Comput., 2024

On the Design and Security of Collective Remote Attestation Protocols.
CoRR, 2024

2023
Verifying List Swarm Attestation Protocols.
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2023

Formalising Application-Driven Authentication & Access-Control based on Users' Companion Devices.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

2021
Privacy-Preserving Electronic Ticket Scheme with Attribute-Based Credentials.
IEEE Trans. Dependable Secur. Comput., 2021

Technical Report on a Virtual CTAP2 WebAuthn Authenticator.
CoRR, 2021

2020
Anonymous Single Sign-On With Proxy Re-Verification.
IEEE Trans. Inf. Forensics Secur., 2020

Lessons Learnt from a 2FA roll out within a higher education organisation.
CoRR, 2020

Augmenting an Internet Voting System with Selene Verifiability using Permissioned Distributed Ledger.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020

Extensive Security Verification of the LoRaWAN Key-Establishment: Insecurities & Patches.
Proceedings of the IEEE European Symposium on Security and Privacy, 2020

An Interoperable Architecture for Usable Password-Less Authentication.
Proceedings of the Emerging Technologies for Authorization and Authentication, 2020

Formal Analysis and Implementation of a TPM 2.0-based Direct Anonymous Attestation Scheme.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

2019
VMV: Augmenting an Internet Voting System with Selene Verifiability.
CoRR, 2019

A Symbolic Analysis of ECC-Based Direct Anonymous Attestation.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019

2018
Anonymous Single-Sign-On for n Designated Services with Traceability.
Proceedings of the Computer Security, 2018

2017
PPETS-FGP: Privacy-Preserving Electronic Ticket Scheme with Fine-Grained Pricing.
CoRR, 2017

Privacy-enhanced capabilities for VANETs using direct anonymous attestation.
Proceedings of the 2017 IEEE Vehicular Networking Conference, 2017

Formal Analysis of V2X Revocation Protocols.
Proceedings of the Security and Trust Management - 13th International Workshop, 2017

2016
Foundations for using linear temporal logic in Event-B refinement.
Formal Aspects Comput., 2016

OnTrack: The Railway Verification Toolset - Extended Abstract.
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation: Discussion, Dissemination, Applications, 2016

Symbolic Reachability Analysis of B Through ProB and LTSmin.
Proceedings of the Integrated Formal Methods - 12th International Conference, 2016

Event-B and Linear Temporal Logic.
Proceedings of the From Action Systems to Distributed Systems - The Refinement Approach., 2016

2015
Special issue on Automated Verification of Critical Systems (AVoCS 2013).
Sci. Comput. Program., 2015

2014
Techniques for modelling and verifying railway interlockings.
Int. J. Softw. Tools Technol. Transf., 2014

On modelling and verifying railway interlockings: Tracking train lengths.
Sci. Comput. Program., 2014

The behavioural semantics of Event-B refinement.
Formal Aspects Comput., 2014

Managing LTL Properties in Event-B Refinement.
Proceedings of the Integrated Formal Methods - 11th International Conference, 2014

2013
An integrated framework for checking the behaviour of fUML models using CSP.
Int. J. Softw. Tools Technol. Transf., 2013

Verification of Scheme Plans Using CSP $$||$$ | | B.
Proceedings of the Software Engineering and Formal Methods, 2013

Policy templates for relationship-based access control.
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013

OnTrack: An Open Tooling Environment for Railway Verification.
Proceedings of the NASA Formal Methods, 2013

2012
Railway modelling in CSP||B: the double junction case study.
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2012

An Optimization Approach for Effective Formalized fUML Model Checking.
Proceedings of the Software Engineering and Formal Methods - 10th International Conference, 2012

Defining and Model Checking Abstractions of Complex Railway Models Using CSP||B.
Proceedings of the Hardware and Software: Verification and Testing, 2012

2011
Changing system interfaces consistently: A new refinement strategy for CSP||B.
Sci. Comput. Program., 2011

Bounded Retransmission in Event-B∥CSP: a Case Study.
Proceedings of the B 2011 Workshop, 2011

Preface.
Proceedings of the B 2011 Workshop, 2011

A CSP Account of Event-B Refinement
Proceedings of the Proceedings 15th International Refinement Workshop, 2011

Towards a Practical Approach to Check UML/fUML Models Consistency Using CSP.
Proceedings of the Formal Methods and Software Engineering, 2011

2010
On the Importance of One-time Key Pairs in Buyer-seller Watermarking Protocols.
Proceedings of the SECRYPT 2010, 2010

A Novel Multi-size Block Benford's Law Scheme for Printer Identification.
Proceedings of the Advances in Multimedia Information Processing - PCM 2010, 2010

A CSP Approach to Control in Event-B.
Proceedings of the Integrated Formal Methods - 8th International Conference, 2010

Formal Verification of Tokeneer Behaviours Modelled in fUML Using CSP.
Proceedings of the Formal Methods and Software Engineering, 2010

2009
A Novel Least Distortion Linear Gain Model for Halftone Image Watermarking Incorporating Perceptual Quality Metrics.
Trans. Data Hiding Multim. Secur., 2009

Mobile CSP||B.
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2009

Automatic Generation of Integrated Formal Models Corresponding to UML System Models.
Proceedings of the Objects, Components, Models and Patterns, 47th International Conference, 2009

A Step towards Merging xUML and CSP || {\| \ }B.
Proceedings of the Rigorous Methods for Software Construction and Analysis, 2009

2008
Applying CSP || B to information systems.
Softw. Syst. Model., 2008

Experiments in Translating CSP || B to Handel-C.
Proceedings of the thirty-first Communicating Process Architectures Conference, 2008

Using a formal analysis technique to identify an unbinding attack on a buyer-seller watermarking protocol.
Proceedings of the 10th workshop on Multimedia & Security, 2008

Formal Analysis of Two Buyer-Seller Watermarking Protocols.
Proceedings of the Digital Watermarking, 7th International Workshop, 2008

Automatic Generation of CSP || B Skeletons from xUML Models.
Proceedings of the Theoretical Aspects of Computing, 2008

Object Modelling in the SystemB Industrial Project.
Proceedings of the Abstract State Machines, B and Z, First International Conference, 2008

2007
Interactive tool support for CSP || B consistency checking.
Formal Aspects Comput., 2007

Least Distortion Halftone Image Data Hiding Watermarking by Optimizing an Iterative Linear Gain Control Model.
Proceedings of the Digital Watermarking, 6th International Workshop, 2007

Authenticating Binary Text Documents Using a Localising OMAC Watermark Robust to Printing and Scanning.
Proceedings of the Digital Watermarking, 6th International Workshop, 2007

A Novel Semi-Fragile Image Watermarking, Authentication and Self-Restoration Technique Using the Slant Transform.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

Combining Mobility with State.
Proceedings of the Integrated Formal Methods, 6th International Conference, 2007

Augmenting B with Control Annotations.
Proceedings of the B 2007: Formal Specification and Development in B, 2007

2006
Tank monitoring: a pAMN case study.
Formal Aspects Comput., 2006

A New Multi-set Modulation Technique for Increasing Hiding Capacity of Binary Watermark for Print and Scan Processes.
Proceedings of the Digital Watermarking, 5th International Workshop, 2006

A Layered Behavioural Model of Platelets.
Proceedings of the 11th International Conference on Engineering of Complex Computer Systems (ICECCS 2006), 2006

2005
Investigating a file transfer protocol using CSP and B.
Softw. Syst. Model., 2005

CSP theorems for communicating B machines.
Formal Aspects Comput., 2005

Linking Semantic Models to Support CSP || B Consistency Checking.
Proceedings of the 5th International Workshop on Automated Verification of Critical Systems, 2005

Chunks: Component Verification in CSP||B.
Proceedings of the Integrated Formal Methods, 5th International Conference, 2005

2004
How to Verify Dynamic Properties of Information Systems.
Proceedings of the 2nd International Conference on Software Engineering and Formal Methods (SEFM 2004), 2004

Verifying Controlled Components.
Proceedings of the Integrated Formal Methods, 4th International Conference, 2004

2003
Composing Specifications Using Communication.
Proceedings of the ZB 2003: Formal Specification and Development in Z and B, 2003

2002
Communicating B Machines.
Proceedings of the ZB 2002: Formal Specification and Development in Z and B, 2002

Supplementing a UML Development Process with B.
Proceedings of the FME 2002: Formal Methods, 2002

2000
Combining control executives and software specifications.
PhD thesis, 2000

How to Drive a B Machine.
Proceedings of the ZB 2000: Formal Specification and Development in Z and B, First International Conference of B and Z Users, York, UK, August 29, 2000

1999
Using a Process Algebra to Control B Operations.
Proceedings of the Integrated Formal Methods, 1999

1998
Test Case Preparation Using a Prototype.
Proceedings of the B'98: Recent Advances in the Development and Use of the B Method, 1998


  Loading...