Steve A. Schneider
Orcid: 0000-0001-8365-6993Affiliations:
- University of Surrey
According to our database1,
Steve A. Schneider
authored at least 142 papers
between 1989 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
1990
1995
2000
2005
2010
2015
2020
0
5
10
15
1
1
2
1
1
2
1
2
3
5
8
1
1
1
2
3
2
1
4
3
1
1
2
1
3
1
1
2
1
2
2
1
2
5
9
5
7
3
2
4
4
4
5
2
1
3
1
4
4
2
1
2
2
1
2
1
1
2
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
-
on id.loc.gov
-
on d-nb.info
On csauthors.net:
Bibliography
2024
Towards End-to-End Verifiable Online Voting: Adding Verifiability to Established Voting Systems.
IEEE Trans. Dependable Secur. Comput., 2024
Intelligo ut Confido: Understanding, Trust and User Experience in Verifiable Receipt-Free E-Voting (long version).
CoRR, 2024
Intelligo Ut Confido: Understanding, Trust and User Experience in Verifiable Receipt-Free E-Voting.
Proceedings of the Electronic Voting - 9th International Joint Conference, 2024
2023
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
Preserving Privacy of Vulnerable Users across Heterogeneous Sensitive Sensor Data Streams using Smart Contracts.
Proceedings of the Fifth ACM International Workshop on Blockchain-enabled Networked Sensor Systems, 2023
2022
2021
IEEE Trans. Dependable Secur. Comput., 2021
Proceedings of the Protocols, Strands, and Logic, 2021
2020
IEEE Trans. Inf. Forensics Secur., 2020
Formal Aspects Comput., 2020
Augmenting an Internet Voting System with Selene Verifiability using Permissioned Distributed Ledger.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020
Proceedings of the Computer Vision - ACCV 2020 - 15th Asian Conference on Computer Vision, Kyoto, Japan, November 30, 2020
2019
Proceedings of the IEEE European Symposium on Security and Privacy, 2019
Proceedings of the 30th British Machine Vision Conference 2019, 2019
2018
Proceedings of the Computer Security, 2018
2017
CoRR, 2017
Proceedings of the 2017 IEEE Vehicular Networking Conference, 2017
Proceedings of the Security and Trust Management - 13th International Workshop, 2017
2016
Softw. Syst. Model., 2016
Formal Aspects Comput., 2016
Proceedings of the From Action Systems to Distributed Systems - The Refinement Approach., 2016
2015
Sci. Comput. Program., 2015
J. Comput. Secur., 2015
IEEE Secur. Priv., 2015
Secure and Verifiable Electronic Voting in Practice: the use of vVote in the Victorian State Election.
CoRR, 2015
2014
Int. J. Softw. Tools Technol. Transf., 2014
Sci. Comput. Program., 2014
Proceedings of the 2014 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections, 2014
Proceedings of the Security Standardisation Research - First International Conference, 2014
Proceedings of the Network and System Security - 8th International Conference, 2014
Proceedings of the Integrated Formal Methods - 11th International Conference, 2014
Proceedings of the IEEE 27th Computer Security Foundations Symposium, 2014
2013
Int. J. Softw. Tools Technol. Transf., 2013
Proceedings of the 2013 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2013
Proceedings of the Software Engineering and Formal Methods, 2013
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013
Proceedings of the NASA Formal Methods, 2013
Proceedings of the Integrated Formal Methods, 10th International Conference, 2013
Proceedings of the 8th International Conference for Internet Technology and Secured Transactions, 2013
Fuzzy-Systeme zur Unterstützung von Entscheidungen in land- und forstwirtschaftlichen Logistik-Prozessen.
Proceedings of the Massendatenmanagement in der Agrar- und Ernährungswirtschaft, Erhebung - Verarbeitung - Nutzung, Referate der 33. GIL-Jahrestagung, 20., 2013
Proceedings of the Smart Card Research and Advanced Applications, 2013
Proceedings of the Security Engineering and Intelligence Informatics, 2013
2012
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2012
Proceedings of the 2012 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2012
Proceedings of the Software Engineering and Formal Methods - 10th International Conference, 2012
Proceedings of the Hardware and Software: Verification and Testing, 2012
Proceedings of the FM 2012: Formal Methods, 2012
Proceedings of the 5th International Conference on Electronic Voting 2012, 2012
2011
Sci. Comput. Program., 2011
Proceedings of the B 2011 Workshop, 2011
Proceedings of the Proceedings 15th International Refinement Workshop, 2011
Proceedings of the E-Voting and Identity - Third International Conference, 2011
Proceedings of the E-Voting and Identity - Third International Conference, 2011
Proceedings of the 2011 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2011
Proceedings of the 2011 International Workshop on Requirements Engineering for Electronic Voting Systems, 2011
Proceedings of the Formal Methods and Software Engineering, 2011
Proceedings of the Formal Models and Techniques for Analyzing Security Protocols, 2011
2010
Concurr. Comput. Pract. Exp., 2010
Concurr. Comput. Pract. Exp., 2010
Proceedings of the Progress in Cryptology - INDOCRYPT 2010, 2010
Proceedings of the Integrated Formal Methods - 8th International Conference, 2010
Proceedings of the Formal Methods and Software Engineering, 2010
2009
IEEE Trans. Inf. Forensics Secur., 2009
Proceedings of the First International Workshop on Requirements Engineering for e-Voting Systems, 2009
Proceedings of the Rigorous Methods for Software Construction and Analysis, 2009
2008
Proceedings of the thirty-first Communicating Process Architectures Conference, 2008
Proceedings of the 2008 USENIX/ACCURATE Electronic Voting Workshop, 2008
Proceedings of the Theoretical Aspects of Computing, 2008
Proceedings of the Abstract State Machines, B and Z, First International Conference, 2008
2007
Int. J. Inf. Sec., 2007
Proceedings of the 30th Communicating Process Architectures Conference, 2007
Proceedings of the E-Voting and Identity, First International Conference, 2007
Proceedings of the Integrated Formal Methods, 6th International Conference, 2007
Proceedings of the B 2007: Formal Specification and Development in B, 2007
2006
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006
Proceedings of the 4th ACM & IEEE International Conference on Formal Methods and Models for Co-Design (MEMOCODE 2006), 2006
Proceedings of the 11th International Conference on Engineering of Complex Computer Systems (ICECCS 2006), 2006
2005
The Web and the 2004 EP election: Comparing political actor Web sites in 11 EU Member States.
Inf. Polity, 2005
J. Log. Algebraic Methods Program., 2005
Proceedings of the Workshop "Essays on Algebraic Process Calculi", 2005
Proceedings of the Integrated Formal Methods, 5th International Conference, 2005
Proceedings of the Formal Aspects in Security and Trust, Third International Workshop, 2005
Proceedings of the Computer Security, 2005
Proceedings of the 18th IEEE Computer Security Foundations Workshop, 2005
2004
Proceedings of the Integrated Formal Methods, 4th International Conference, 2004
Proceedings of the Communicating Sequential Processes: The First 25 Years, 2004
2003
Formal Methods Syst. Des., 2003
Proceedings of the ZB 2003: Formal Specification and Development in Z and B, 2003
2002
Proceedings of the ZB 2002: Formal Specification and Development in Z and B, 2002
Verifying Authentication Protocol Implementations.
Proceedings of the Formal Methods for Open Object-Based Distributed Systems V, 2002
2001
The B-method - an introduction.
The cornerstones of computing series, Macmillan Publ., ISBN: 978-0-333-79284-1, 2001
Modelling and analysis of security protocols.
Addison-Wesley-Longman, ISBN: 978-0-201-67471-2, 2001
2000
Proceedings of the First Irish Conference on the Mathematical Foundations of Computer Science and Information Technology, 2000
Proceedings of the ZB 2000: Formal Specification and Development in Z and B, First International Conference of B and Z Users, York, UK, August 29, 2000
Proceedings of the Computer Security, 2000
Proceedings of the 13th IEEE Computer Security Foundations Workshop, 2000
1999
Proceedings of the Workshop on Secure Architectures and Information Flow 1999, 1999
Detecting Feature Interactions in the Terrestrial Trunked Radio (TETRA) Network Using Promela and Xspin.
Proceedings of the Theoretical and Practical Aspects of SPIN Model Checking, 1999
Proceedings of the Integrated Formal Methods, 1999
1998
Inf. Process. Lett., 1998
Proceedings of the 11th IEEE Computer Security Foundations Workshop, 1998
Proceedings of the B'98: Recent Advances in the Development and Use of the B Method, 1998
1997
Proceedings of the Theorem Proving in Higher Order Logics, 10th International Conference, 1997
1996
Proceedings of the 1996 IEEE Symposium on Security and Privacy, 1996
1995
Real-time LOTOS and Timed Observations.
Proceedings of the Formal Description Techniques VIII, 1995
Proceedings of the CONCUR '95: Concurrency Theory, 1995
1993
Rigorous Specification of Real-Time Systems.
Proceedings of the Algebraic Methodology and Software Technology (AMAST '93), 1993
1992
Proceedings of the Formal Techniques in Real-Time and Fault-Tolerant Systems, 1992
Proceedings of the CONCUR '92, 1992
1991
Proceedings of the Real-Time: Theory in Practice, 1991
1989
Proceedings of the Mathematical Foundations of Programming Semantics, 5th International Conference, Tulane University, New Orleans, Louisiana, USA, March 29, 1989