Follow
James Heather
James Heather
Senior Lecturer in Computing, University of Surrey
Verified email at surrey.ac.uk
Title
Cited by
Cited by
Year
How to prevent type flaw attacks on security protocols
J Heather, G Lowe, S Schneider
Computer Security Foundations Workshop, 2000. CSFW-13. Proceedings. 13th …, 2000
3102000
Prêt à Voter: a voter-verifiable voting system
PYA Ryan, D Bismark, J Heather, S Schneider, Z Xia
Information Forensics and Security, IEEE Transactions on 4 (4), 662-673, 2009
255*2009
The append-only web bulletin board
J Heather, D Lundin
International Workshop on Formal Aspects in Security and Trust, 242-256, 2008
792008
Towards automatic verification of authentication protocols on an unbounded network
J Heather, S Schneider
Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13, 132-143, 2000
772000
Using pret a voter in victorian state elections
C Burton, C Culnane, JA Heather, T Peacock, PYA Ryan, SA Schneider, ...
2012 Electronic Voting Technology/Workshop on Electronic Voting, ?-?, 2012
582012
Turnitoff: Identifying and fixing a hole in current plagiarism detection software
J Heather
Assessment & Evaluation in Higher Education 35 (6), 647-660, 2010
542010
Analysis, improvement and simplification of Prêt à voter with Paillier encryption
Z Xia, SA Schneider, J Heather, J Traoré
Proceedings of the conference on Electronic Voting Technology (EVT), 13, 2008
462008
A supervised verifiable voting protocol for the Victorian Electoral Commission
C Burton, C Culnane, J Heather, T Peacock, P Ryan, S Schneider, ...
Lecture Notes in Informatics 205, 82-95, 2012
382012
Implementing STV securely in Prêt à Voter
J Heather
20th IEEE Computer Security Foundations Symposium (CSF'07), 157-169, 2007
382007
Pret a Voter: All-in-one
Z Xia, SA Schneider, J Heather, PYA Ryan, D Lundin, P Howard
Proceedings of the Workshop On Trustworthy Elections (WOTE) 2007, 47-56, 2007
312007
Pretty good democracy for more expressive voting schemes
J Heather, P Ryan, V Teague
ESORICS 2010, 405-423, 2011
292011
A decision procedure for the existence of a rank function
J Heather, S Schneider
Journal of Computer Security 13 (2), 317-344, 2005
292005
Oh!... Is it really you?’using rank functions to verify authentication protocols
J Heather
PhD thesis, Royal Holloway, University of London, 2000
29*2000
Versatile Prêt à Voter: Handling multiple election methods with a unified interface
Z Xia, C Culnane, J Heather, H Jonker, PYA Ryan, S Schneider, ...
International Conference on Cryptology in India, 98-114, 2010
282010
Focus group views on Prêt à Voter 1.0
S Schneider, M Llewellyn, C Culnane, J Heather, S Srinivasan, Z Xia
2011 International Workshop on Requirements Engineering for Electronic …, 2011
272011
A Formal Framework for Modelling Coercion Resistance and Receipt Freeness
SA Schneider, JA Heather
Formal Methods (FM) 2012 7436, 217-231, 2012
20*2012
Experiences gained from the first pret a voter implementation
D Bismark, J Heather, RMA Peel, S Schneider, Z Xia, PYA Ryan
2009 First International Workshop on Requirements Engineering for e-Voting …, 2009
202009
A theorem-proving approach to verification of fair non-repudiation protocols
K Wei, J Heather
International Workshop on Formal Aspects in Security and Trust, 202-219, 2006
172006
Embedding the stable failures model of CSP in PVS
K Wei, J Heather
International Conference on Integrated Formal Methods, 246-265, 2005
162005
Strand spaces and rank functions: More than distant cousins
J Heather
162002
The system can't perform the operation now. Try again later.
Articles 1–20