Volgen
James Heather
James Heather
Senior Lecturer in Computing, University of Surrey
Geverifieerd e-mailadres voor surrey.ac.uk
Titel
Geciteerd door
Geciteerd door
Jaar
How to prevent type flaw attacks on security protocols
J Heather, G Lowe, S Schneider
Computer Security Foundations Workshop, 2000. CSFW-13. Proceedings. 13th …, 2000
3212000
Prêt à Voter: a voter-verifiable voting system
PYA Ryan, D Bismark, J Heather, S Schneider, Z Xia
Information Forensics and Security, IEEE Transactions on 4 (4), 662-673, 2009
310*2009
The append-only web bulletin board
J Heather, D Lundin
Formal Aspects in Security and Trust: 5th International Workshop, FAST 2008 …, 2009
942009
Towards automatic verification of authentication protocols on an unbounded network
J Heather, S Schneider
Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13, 132-143, 2000
752000
Using Prêt à Voter in Victoria State Elections.
C Burton, C Culnane, J Heather, T Peacock, PYA Ryan, SA Schneider, ...
EVT/WOTE 2, 2012
642012
Turnitoff: Identifying and fixing a hole in current plagiarism detection software
J Heather
Assessment & Evaluation in Higher Education 35 (6), 647-660, 2010
632010
Analysis, improvement and simplification of Prêt à voter with Paillier encryption
Z Xia, SA Schneider, J Heather, J Traoré
Proceedings of the conference on Electronic Voting Technology (EVT), 13, 2008
502008
Implementing STV securely in Prêt à Voter
J Heather
20th IEEE Computer Security Foundations Symposium (CSF'07), 157-169, 2007
452007
A supervised verifiable voting protocol for the Victorian Electoral Commission
C Burton, C Culane, J Heather, T Peacock, PYA Ryan, S Schneider, ...
Gesellschaft für Informatik eV, 2012
422012
Focus group views on Prêt à Voter 1.0
S Schneider, M Llewellyn, C Culnane, J Heather, S Srinivasan, Z Xia
2011 International Workshop on Requirements Engineering for Electronic …, 2011
332011
Pret a Voter: All-in-one
Z Xia, SA Schneider, J Heather, PYA Ryan, D Lundin, P Howard
Proceedings of the Workshop On Trustworthy Elections (WOTE) 2007, 47-56, 2007
322007
Pretty good democracy for more expressive voting schemes
J Heather, P Ryan, V Teague
ESORICS 2010, 405-423, 2011
312011
Versatile Prêt à Voter: Handling multiple election methods with a unified interface
Z Xia, C Culnane, J Heather, H Jonker, PYA Ryan, S Schneider, ...
Progress in Cryptology-INDOCRYPT 2010: 11th International Conference on …, 2010
302010
A decision procedure for the existence of a rank function
J Heather, S Schneider
Journal of Computer Security 13 (2), 317-344, 2005
302005
Oh!... Is it really you?’using rank functions to verify authentication protocols
J Heather
PhD thesis, Royal Holloway, University of London, 2000
29*2000
Cryptographic Protocols with Everyday Objects
J Heather, S Schneider, V Teague
Formal Aspects of Computing, 2013
222013
Experiences gained from the first pret a voter implementation
D Bismark, J Heather, RMA Peel, S Schneider, Z Xia, PYA Ryan
2009 First International Workshop on Requirements Engineering for e-Voting …, 2009
222009
A Formal Framework for Modelling Coercion Resistance and Receipt Freeness
SA Schneider, JA Heather
Formal Methods (FM) 2012 7436, 217-231, 2012
21*2012
A theorem-proving approach to verification of fair non-repudiation protocols
K Wei, J Heather
Formal Aspects in Security and Trust: Fourth International Workshop, FAST …, 2007
192007
Strand Spaces and Rank Functions: More than Distant Cousins.
J Heather
CSFW 2, 104, 2002
182002
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20