How to prevent type flaw attacks on security protocols J Heather, G Lowe, S Schneider Computer Security Foundations Workshop, 2000. CSFW-13. Proceedings. 13th …, 2000 | 321 | 2000 |
Prêt à Voter: a voter-verifiable voting system PYA Ryan, D Bismark, J Heather, S Schneider, Z Xia Information Forensics and Security, IEEE Transactions on 4 (4), 662-673, 2009 | 310* | 2009 |
The append-only web bulletin board J Heather, D Lundin Formal Aspects in Security and Trust: 5th International Workshop, FAST 2008 …, 2009 | 94 | 2009 |
Towards automatic verification of authentication protocols on an unbounded network J Heather, S Schneider Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13, 132-143, 2000 | 75 | 2000 |
Using Prêt à Voter in Victoria State Elections. C Burton, C Culnane, J Heather, T Peacock, PYA Ryan, SA Schneider, ... EVT/WOTE 2, 2012 | 64 | 2012 |
Turnitoff: Identifying and fixing a hole in current plagiarism detection software J Heather Assessment & Evaluation in Higher Education 35 (6), 647-660, 2010 | 63 | 2010 |
Analysis, improvement and simplification of Prêt à voter with Paillier encryption Z Xia, SA Schneider, J Heather, J Traoré Proceedings of the conference on Electronic Voting Technology (EVT), 13, 2008 | 50 | 2008 |
Implementing STV securely in Prêt à Voter J Heather 20th IEEE Computer Security Foundations Symposium (CSF'07), 157-169, 2007 | 45 | 2007 |
A supervised verifiable voting protocol for the Victorian Electoral Commission C Burton, C Culane, J Heather, T Peacock, PYA Ryan, S Schneider, ... Gesellschaft für Informatik eV, 2012 | 42 | 2012 |
Focus group views on Prêt à Voter 1.0 S Schneider, M Llewellyn, C Culnane, J Heather, S Srinivasan, Z Xia 2011 International Workshop on Requirements Engineering for Electronic …, 2011 | 33 | 2011 |
Pret a Voter: All-in-one Z Xia, SA Schneider, J Heather, PYA Ryan, D Lundin, P Howard Proceedings of the Workshop On Trustworthy Elections (WOTE) 2007, 47-56, 2007 | 32 | 2007 |
Pretty good democracy for more expressive voting schemes J Heather, P Ryan, V Teague ESORICS 2010, 405-423, 2011 | 31 | 2011 |
Versatile Prêt à Voter: Handling multiple election methods with a unified interface Z Xia, C Culnane, J Heather, H Jonker, PYA Ryan, S Schneider, ... Progress in Cryptology-INDOCRYPT 2010: 11th International Conference on …, 2010 | 30 | 2010 |
A decision procedure for the existence of a rank function J Heather, S Schneider Journal of Computer Security 13 (2), 317-344, 2005 | 30 | 2005 |
Oh!... Is it really you?’using rank functions to verify authentication protocols J Heather PhD thesis, Royal Holloway, University of London, 2000 | 29* | 2000 |
Cryptographic Protocols with Everyday Objects J Heather, S Schneider, V Teague Formal Aspects of Computing, 2013 | 22 | 2013 |
Experiences gained from the first pret a voter implementation D Bismark, J Heather, RMA Peel, S Schneider, Z Xia, PYA Ryan 2009 First International Workshop on Requirements Engineering for e-Voting …, 2009 | 22 | 2009 |
A Formal Framework for Modelling Coercion Resistance and Receipt Freeness SA Schneider, JA Heather Formal Methods (FM) 2012 7436, 217-231, 2012 | 21* | 2012 |
A theorem-proving approach to verification of fair non-repudiation protocols K Wei, J Heather Formal Aspects in Security and Trust: Fourth International Workshop, FAST …, 2007 | 19 | 2007 |
Strand Spaces and Rank Functions: More than Distant Cousins. J Heather CSFW 2, 104, 2002 | 18 | 2002 |