default search action
James Heather
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2017
- [i1]Murat Moran, James Heather:
Automated Analysis of Voting Systems under an Active Intruder Model in CSP. CoRR abs/1705.00795 (2017) - 2016
- [j10]Murat Moran, James Heather, Steve A. Schneider:
Automated anonymity verification of the ThreeBallot and VAV voting systems. Softw. Syst. Model. 15(4): 1049-1062 (2016) - [j9]Efstathios Stathakidis, David M. Williams, James Heather:
Constructing and verifying a robust Mix Net using CSP. Softw. Syst. Model. 15(4): 1063-1089 (2016) - 2014
- [j8]James Heather, Steve A. Schneider, Vanessa Teague:
Cryptographic protocols with everyday objects. Formal Aspects Comput. 26(1): 37-62 (2014) - [j7]Murat Moran, James Heather, Steve A. Schneider:
Verifying anonymity in voting systems using CSP. Formal Aspects Comput. 26(1): 63-98 (2014) - [j6]Steve A. Schneider, Vanessa Teague, Chris Culnane, James Heather:
Special Section on Vote-ID 2013. J. Inf. Secur. Appl. 19(2): 103-104 (2014) - [c31]Sriramkrishnan Srinivasan, Chris Culnane, James Heather, Steve A. Schneider, Zhe Xia:
Countering Ballot Stuffing and Incorporating Eligibility Verifiability in Helios. NSS 2014: 335-348 - [c30]Efstathios Stathakidis, Steve A. Schneider, James Heather:
Robustness Modelling and Verification of a Mix Net Protocol. SSR 2014: 131-150 - [c29]Chris Culnane, James Heather, Rui Joaquim, Peter Y. A. Ryan, Steve A. Schneider, Vanessa Teague:
Faster Print on Demand for Prêt à Voter. EVT/WOTE 2014 - 2013
- [j5]Murat Moran, James Heather:
Automated Analysis of Voting Systems with Dolev-Yao Intruder Model. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 66 (2013) - [j4]Efstathios Stathakidis, David M. Williams, James Heather:
Verifying a Mix Net in CSP. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 66 (2013) - [c28]James Heather, Chris Culnane, Steve A. Schneider, Sriramkrishnan Srinivasan, Zhe Xia:
Solving the Discrete Logarithm Problem for Packing Candidate Preferences. CD-ARES Workshops 2013: 209-221 - [c27]Murat Moran, James Heather, Steve A. Schneider:
Automated Anonymity Verification of the ThreeBallot Voting System. IFM 2013: 94-108 - [c26]Morgan Llewellyn, Steve A. Schneider, Zhe Xia, Chris Culnane, James Heather, Peter Y. A. Ryan, Sriramkrishnan Srinivasan:
Testing Voters' Understanding of a Security Mechanism Used in Verifiable Voting. EVT/WOTE 2013 - [e1]James Heather, Steve A. Schneider, Vanessa Teague:
E-Voting and Identify - 4th International Conference, VoteID 2013, Guildford, UK, July 17-19, 2013. Proceedings. Lecture Notes in Computer Science 7985, Springer 2013, ISBN 978-3-642-39184-2 [contents] - 2012
- [c25]Craig Burton, Chris Culnane, James Heather, Thea Peacock, Peter Y. A. Ryan, Steve A. Schneider, Sriramkrishnan Srinivasan, Vanessa Teague, Roland Wen, Zhe Xia:
A Supervised Verifiable Voting Protocol for the Victorian Electoral Commission. Electronic Voting 2012: 81-94 - [c24]James Heather, Steve A. Schneider:
A Formal Framework for Modelling Coercion Resistance and Receipt Freeness. FM 2012: 217-231 - [c23]Craig Burton, Chris Culnane, James Heather, Thea Peacock, Peter Y. A. Ryan, Steve A. Schneider, Vanessa Teague, Roland Wen, Zhe Xia, Sriramkrishnan Srinivasan:
Using Prêt à Voter in Victoria State Elections. EVT/WOTE 2012 - 2011
- [c22]Steve A. Schneider, Morgan Llewellyn, Chris Culnane, James Heather, Sriramkrishnan Srinivasan, Zhe Xia:
Focus group views on Prêt à Voter 1.0. REVOTE 2011: 56-65 - [c21]Chris Culnane, David Bismark, James Heather, Steve A. Schneider, Sriramkrishnan Srinivasan, Zhe Xia:
Authentication Codes. EVT/WOTE 2011 - [c20]Steve A. Schneider, Sriramkrishnan Srinivasan, Chris Culnane, James Heather, Zhe Xia:
Prêt á Voter with Write-Ins. VoteID 2011: 174-189 - [c19]James Heather, Morgan Llewellyn, Vanessa Teague, Roland Wen:
On the Side-Effects of Introducing E-Voting. VoteID 2011: 242-256 - 2010
- [c18]James Heather, Peter Y. A. Ryan, Vanessa Teague:
Pretty Good Democracy for More Expressive Voting Schemes. ESORICS 2010: 405-423 - [c17]Zhe Xia, Chris Culnane, James Heather, Hugo Jonker, Peter Y. A. Ryan, Steve A. Schneider, Sriramkrishnan Srinivasan:
Versatile Prêt à Voter: Handling Multiple Election Methods with a Unified Interface. INDOCRYPT 2010: 98-114
2000 – 2009
- 2009
- [j3]Peter Y. A. Ryan, David Bismark, James Heather, Steve A. Schneider, Zhe Xia:
Prêt à voter: a voter-verifiable voting system. IEEE Trans. Inf. Forensics Secur. 4(4): 662-673 (2009) - [c16]David Bismark, James Heather, Roger M. A. Peel, Steve A. Schneider, Zhe Xia, Peter Y. A. Ryan:
Experiences Gained from the first Prêt à Voter Implementation. REVOTE 2009: 19-28 - 2008
- [c15]James Heather, David Lundin:
The Append-Only Web Bulletin Board. Formal Aspects in Security and Trust 2008: 242-256 - [c14]Zhe Xia, Steve A. Schneider, James Heather, Jacques Traoré:
Analysis, Improvement, and Simplification of Prêt à Voter with Paillier Encryption. EVT 2008 - 2007
- [c13]James Heather:
Implementing STV securely in Pret a Voter. CSF 2007: 157-169 - 2006
- [c12]Kun Wei, James Heather:
A Theorem-Proving Approach to Verification of Fair Non-repudiation Protocols. Formal Aspects in Security and Trust 2006: 202-219 - [c11]James Heather, Steve A. Schneider:
To infinity and beyond or, avoiding the infinite in security protocol analysis. SAC 2006: 346-353 - [c10]James Heather, Kun Wei:
Where Next for Formal Methods? Security Protocols Workshop 2006: 52-58 - [c9]James Heather:
Where Next for Formal Methods? Security Protocols Workshop 2006: 59-61 - 2005
- [j2]James Heather, Steve A. Schneider:
A decision procedure for the existence of a rank function. J. Comput. Secur. 13(2): 317-344 (2005) - [c8]Nick Antonopoulos, James Heather, Roger M. A. Peel:
Programmable Agents for Generic Distributed Authorisation. International Conference on Internet Computing 2005: 174-180 - [c7]Kun Wei, James Heather:
Towards Verification of Timed Non-repudiation Protocols. Formal Aspects in Security and Trust 2005: 244-257 - [c6]Kun Wei, James Heather:
Embedding the Stable Failures Model of CSP in PVS. IFM 2005: 246-265 - 2004
- [c5]James Heather, Jonathan Y. Clark:
Family Secrets. Formal Aspects in Security and Trust 2004: 99-114 - 2003
- [j1]James Heather, Gavin Lowe, Steve A. Schneider:
How to Prevent Type Flaw Attacks on Security Protocols. J. Comput. Secur. 11(2): 217-244 (2003) - 2002
- [c4]James Heather:
Strand Spaces and Rank Functions: More than Distant Cousins. CSFW 2002: 104- - [c3]James Heather, Steve A. Schneider:
Equal To The Task? ESORICS 2002: 162-177 - 2000
- [b1]James Heather:
Oh!... is it really you? : using rank functions to verify authentication protocols. Royal Holloway, University of London, UK, 2000 - [c2]James Heather, Steve A. Schneider:
Towards Automatic Verification of Authentication Protocols on an Unbounded Network. CSFW 2000: 132-143 - [c1]James Heather, Gavin Lowe, Steve A. Schneider:
How to Prevent Type Flaw Attacks on Security Protocols. CSFW 2000: 255-268
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:51 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint