Concurrent and real-time systems: the CSP approach S Schneider John Wiley & Sons, 1999 | 861 | 1999 |
The modelling and analysis of security protocols: the CSP approach P Ryan, S Schneider, M Goldsmith, G Lowe, B Roscoe Addison-Wesley Professional, 2001 | 809 | 2001 |
A practical voter-verifiable election scheme D Chaum, PYA Ryan, S Schneider Computer Security–ESORICS 2005: 10th European Symposium on Research in …, 2005 | 529 | 2005 |
Verifying authentication protocols in CSP S Schneider IEEE Transactions on software engineering 24 (9), 741-758, 1998 | 434 | 1998 |
The B-method: An introduction S Schneider Palgrave, 2001 | 387 | 2001 |
Security properties and CSP S Schneider Proceedings 1996 IEEE Symposium on Security and Privacy, 174-187, 1996 | 359 | 1996 |
Real-Time Systems: specification, verification, and analysis A Burns, A Welling, K Ramamritham, J Hooman, S Schneider, Z Liu, ... prentice Hall, 1996 | 321 | 1996 |
Process algebra and non-interference PYA Ryan, SA Schneider Journal of Computer Security 9 (1-2), 75-103, 2001 | 320 | 2001 |
How to prevent type flaw attacks on security protocols J Heather, G Lowe, S Schneider Journal of computer Security 11 (2), 217-244, 2003 | 317 | 2003 |
PrÊt À Voter:a Voter-Verifiable Voting System PYA Ryan, D Bismark, J Heather, S Schneider, Z Xia IEEE transactions on information forensics and security 4 (4), 662-673, 2009 | 310* | 2009 |
CSP and anonymity S Schneider, A Sidiropoulos Computer Security—ESORICS 96: 4th European Symposium on Research in …, 1996 | 286 | 1996 |
An operational semantics for timed CSP S Schneider Information and computation 116 (2), 193-213, 1995 | 273 | 1995 |
A brief history of Timed CSP J Davies, S Schneider Theoretical Computer Science 138 (2), 243-271, 1995 | 256 | 1995 |
Springer International Publishing: Cham L Chen, K Hosoda, E Menegatti, M Shimizu, H Wang Switzerland 11765, 337-345, 2019 | 234 | 2019 |
Formal analysis of a non-repudiation protocol S Schneider Proceedings. 11th IEEE Computer Security Foundations Workshop (Cat. No …, 1998 | 200 | 1998 |
Prêt à voter with re-encryption mixes PYA Ryan, SA Schneider Computer Security–ESORICS 2006: 11th European Symposium on Research in …, 2006 | 195 | 2006 |
An attack on a recursive authentication protocol A cautionary tale PYA Ryan, SA Schneider Information Processing Letters 65 (1), 7-10, 1998 | 147 | 1998 |
CSP theorems for communicating B machines S Schneider, H Treharne Formal Aspects of Computing 17 (4), 390-422, 2005 | 132 | 2005 |
Timed CSP: Theory and practice S Schneider, J Davies, DM Jackson, GM Reed, JN Reed, AW Roscoe Proceedings of the Real-Time: Theory in Practice, REX Workshop, 640-675, 1991 | 131 | 1991 |
Integrating and extending JCSP AA McEwan, S Schneider, W Ifill, P Welch Communicating Process Architectures 2007: WoTUG-30: Proceedings of the 30th …, 2007 | 125 | 2007 |