default search action
Helen Treharne
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j18]Mohammed Alsadi, Matthew Casey, Constantin Catalin Dragan, François Dupressoir, Luke Riley, Muntadher Sallal, Steve Schneider, Helen Treharne, Joe Wadsworth, Phil Wright:
Towards End-to-End Verifiable Online Voting: Adding Verifiability to Established Voting Systems. IEEE Trans. Dependable Secur. Comput. 21(4): 3357-3374 (2024) - [c53]Stella Kazamia, Chris Culnane, Daniel Gardham, Suzanne Prior, Helen Treharne:
Phish and Tips: - Phishing Awareness and Education for Older Adults. HAISA (1) 2024: 200-214 - [i10]Sharar Ahmadi, Jay Le-Papin, Liqun Chen, Brijesh Dongol, Sasa Radomirovic, Helen Treharne:
On the Design and Security of Collective Remote Attestation Protocols. CoRR abs/2407.09203 (2024) - 2023
- [c52]Chris Culnane, Ioana Boureanu, Jean Snyman, Stephan Wesemeyer, Helen Treharne:
Formalising Application-Driven Authentication & Access-Control based on Users' Companion Devices. AsiaCCS 2023: 884-898 - [c51]Jay Le-Papin, Brijesh Dongol, Helen Treharne, Stephan Wesemeyer:
Verifying List Swarm Attestation Protocols. WISEC 2023: 163-174 - 2021
- [j17]Jinguang Han, Liqun Chen, Steve Schneider, Helen Treharne, Stephan Wesemeyer:
Privacy-Preserving Electronic Ticket Scheme with Attribute-Based Credentials. IEEE Trans. Dependable Secur. Comput. 18(4): 1836-1849 (2021) - [i9]Chris Culnane, Christopher J. P. Newton, Helen Treharne:
Technical Report on a Virtual CTAP2 WebAuthn Authenticator. CoRR abs/2108.04131 (2021) - 2020
- [j16]Jinguang Han, Liqun Chen, Steve A. Schneider, Helen Treharne, Stephan Wesemeyer, Nick Wilson:
Anonymous Single Sign-On With Proxy Re-Verification. IEEE Trans. Inf. Forensics Secur. 15: 223-236 (2020) - [c50]Stephan Wesemeyer, Christopher J. P. Newton, Helen Treharne, Liqun Chen, Ralf Sasse, Jorden Whitefield:
Formal Analysis and Implementation of a TPM 2.0-based Direct Anonymous Attestation Scheme. AsiaCCS 2020: 784-798 - [c49]Matthew Casey, Mark Manulis, Christopher J. P. Newton, Robin Savage, Helen Treharne:
An Interoperable Architecture for Usable Password-Less Authentication. ETAA@ESORICS 2020: 16-32 - [c48]Stephan Wesemeyer, Ioana Boureanu, Zach Smith, Helen Treharne:
Extensive Security Verification of the LoRaWAN Key-Establishment: Insecurities & Patches. EuroS&P 2020: 425-444 - [c47]Muntadher Sallal, Steve Schneider, Matthew Casey, François Dupressoir, Helen Treharne, Constantin Catalin Dragan, Luke Riley, Phil Wright:
Augmenting an Internet Voting System with Selene Verifiability using Permissioned Distributed Ledger. ICDCS 2020: 1167-1168 - [i8]Abideen Tetlay, Helen Treharne, Tom Ascroft, Sotiris Moschoyiannis:
Lessons Learnt from a 2FA roll out within a higher education organisation. CoRR abs/2011.02901 (2020)
2010 – 2019
- 2019
- [c46]Jorden Whitefield, Liqun Chen, Ralf Sasse, Steve A. Schneider, Helen Treharne, Stephan Wesemeyer:
A Symbolic Analysis of ECC-Based Direct Anonymous Attestation. EuroS&P 2019: 127-141 - [i7]Muntadher Sallal, Steve A. Schneider, Matthew Casey, Constantin Catalin Dragan, François Dupressoir, Luke Riley, Helen Treharne, Joe Wadsworth, Phil Wright:
VMV: Augmenting an Internet Voting System with Selene Verifiability. CoRR abs/1912.00288 (2019) - 2018
- [c45]Jinguang Han, Liqun Chen, Steve A. Schneider, Helen Treharne, Stephan Wesemeyer:
Anonymous Single-Sign-On for n Designated Services with Traceability. ESORICS (1) 2018: 470-490 - [i6]Jinguang Han, Liqun Chen, Steve A. Schneider, Helen Treharne, Stephan Wesemeyer:
Anonymous Single-Sign-On for n designated services with traceability. CoRR abs/1804.07201 (2018) - [i5]Jinguang Han, Liqun Chen, Steve A. Schneider, Helen Treharne, Stephan Wesemeyer, Nick Wilson:
Anonymous Single Sign-on with Proxy Re-Verification. CoRR abs/1811.07642 (2018) - 2017
- [c44]Jorden Whitefield, Liqun Chen, Frank Kargl, Andrew Paverd, Steve A. Schneider, Helen Treharne, Stephan Wesemeyer:
Formal Analysis of V2X Revocation Protocols. STM 2017: 147-163 - [c43]Jorden Whitefield, Liqun Chen, Thanassis Giannetsos, Steve A. Schneider, Helen Treharne:
Privacy-enhanced capabilities for VANETs using direct anonymous attestation. VNC 2017: 123-130 - [i4]Jorden Whitefield, Liqun Chen, Frank Kargl, Andrew Paverd, Steve A. Schneider, Helen Treharne, Stephan Wesemeyer:
Formal Analysis of V2X Revocation Protocols. CoRR abs/1704.07216 (2017) - [i3]Jinguang Han, Liqun Chen, Steve A. Schneider, Helen Treharne:
PPETS-FGP: Privacy-Preserving Electronic Ticket Scheme with Fine-Grained Pricing. CoRR abs/1706.03016 (2017) - 2016
- [j15]Thai Son Hoang, Steve A. Schneider, Helen Treharne, David M. Williams:
Foundations for using linear temporal logic in Event-B refinement. Formal Aspects Comput. 28(6): 909-935 (2016) - [c42]Jens Bendisposto, Philipp Körner, Michael Leuschel, Jeroen Meijer, Jaco van de Pol, Helen Treharne, Jorden Whitefield:
Symbolic Reachability Analysis of B Through ProB and LTSmin. IFM 2016: 275-291 - [c41]Phillip James, Faron Moller, Hoang Nga Nguyen, Markus Roggenbach, Helen Treharne, Xu Wang:
OnTrack: The Railway Verification Toolset - Extended Abstract. ISoLA (2) 2016: 294-296 - [p1]Steve A. Schneider, Helen Treharne, David M. Williams:
Event-B and Linear Temporal Logic. From Action Systems to Distributed Systems 2016: 113-123 - [i2]Jens Bendisposto, Philipp Koerner, Michael Leuschel, Jeroen Meijer, Jaco van de Pol, Helen Treharne, Jorden Whitefield:
Symbolic Reachability Analysis of B through ProB and LTSmin. CoRR abs/1603.04401 (2016) - 2015
- [j14]Steve A. Schneider, Helen Treharne:
Special issue on Automated Verification of Critical Systems (AVoCS 2013). Sci. Comput. Program. 111: 213 (2015) - 2014
- [j13]Steve A. Schneider, Helen Treharne, Heike Wehrheim:
The behavioural semantics of Event-B refinement. Formal Aspects Comput. 26(2): 251-280 (2014) - [j12]Phillip James, Faron Moller, Hoang Nga Nguyen, Markus Roggenbach, Steve A. Schneider, Helen Treharne:
On modelling and verifying railway interlockings: Tracking train lengths. Sci. Comput. Program. 96: 315-336 (2014) - [j11]Phillip James, Faron Moller, Nguyen Hoang Nga, Markus Roggenbach, Steve A. Schneider, Helen Treharne:
Techniques for modelling and verifying railway interlockings. Int. J. Softw. Tools Technol. Transf. 16(6): 685-711 (2014) - [c40]Steve A. Schneider, Helen Treharne, Heike Wehrheim, David M. Williams:
Managing LTL Properties in Event-B Refinement. IFM 2014: 221-237 - [i1]Steve A. Schneider, Helen Treharne, Heike Wehrheim, David M. Williams:
Managing LTL properties in Event-B refinement. CoRR abs/1406.6622 (2014) - 2013
- [j10]Islam Abdelhalim, Steve A. Schneider, Helen Treharne:
An integrated framework for checking the behaviour of fUML models using CSP. Int. J. Softw. Tools Technol. Transf. 15(4): 375-396 (2013) - [c39]Phillip James, Matthew Trumble, Helen Treharne, Markus Roggenbach, Steve A. Schneider:
OnTrack: An Open Tooling Environment for Railway Verification. NASA Formal Methods 2013: 435-440 - [c38]Evangelos Aktoudianakis, Jason Crampton, Steve A. Schneider, Helen Treharne, Adrian Waller:
Policy templates for relationship-based access control. PST 2013: 221-228 - [c37]Phillip James, Faron Moller, Hoang Nga Nguyen, Markus Roggenbach, Steve A. Schneider, Helen Treharne, Matthew Trumble, David M. Williams:
Verification of Scheme Plans Using CSP $$||$$ | | B. SEFM Workshops 2013: 189-204 - 2012
- [j9]Markus Roggenbach, Faron Moller, Steve A. Schneider, Helen Treharne, Hoang Nga Nguyen:
Railway modelling in CSP||B: the double junction case study. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 53 (2012) - [c36]Faron Moller, Hoang Nga Nguyen, Markus Roggenbach, Steve A. Schneider, Helen Treharne:
Defining and Model Checking Abstractions of Complex Railway Models Using CSP||B. Haifa Verification Conference 2012: 193-208 - [c35]Islam Abdelhalim, Steve A. Schneider, Helen Treharne:
An Optimization Approach for Effective Formalized fUML Model Checking. SEFM 2012: 248-262 - [e3]John Derrick, Stefania Gnesi, Diego Latella, Helen Treharne:
Integrated Formal Methods - 9th International Conference, IFM 2012, Pisa, Italy, June 18-21, 2012. Proceedings. Lecture Notes in Computer Science 7321, Springer 2012, ISBN 978-3-642-30728-7 [contents] - 2011
- [j8]Steve A. Schneider, Helen Treharne:
Changing system interfaces consistently: A new refinement strategy for CSP||B. Sci. Comput. Program. 76(10): 837-860 (2011) - [c34]Islam Abdelhalim, Steve A. Schneider, Helen Treharne:
Towards a Practical Approach to Check UML/fUML Models Consistency Using CSP. ICFEM 2011: 33-48 - [c33]Steve A. Schneider, Helen Treharne, Heike Wehrheim:
A CSP Account of Event-B Refinement. Refine@FM 2011: 139-154 - [c32]Marie-Laure Potet, Helen Treharne:
Preface. B@FM 2011: 1-2 - [c31]Steve A. Schneider, Helen Treharne, Heike Wehrheim:
Bounded Retransmission in Event-B∥CSP: a Case Study. B@FM 2011: 69-80 - [e2]Marie-Laure Potet, Helen Treharne:
Proceedings of the B 2011 Workshop, a satellite event of the 17th International Symposium on Formal Methods, FM 2011, Limerick, Ireland, June 21, 2011. Electronic Notes in Theoretical Computer Science 280, Elsevier 2011 [contents] - 2010
- [c30]Islam Abdelhalim, James Sharp, Steve A. Schneider, Helen Treharne:
Formal Verification of Tokeneer Behaviours Modelled in fUML Using CSP. ICFEM 2010: 371-387 - [c29]Steve A. Schneider, Helen Treharne, Heike Wehrheim:
A CSP Approach to Control in Event-B. IFM 2010: 260-274 - [c28]Weina Jiang, Anthony T. S. Ho, Helen Treharne, Yun Q. Shi:
A Novel Multi-size Block Benford's Law Scheme for Printer Identification. PCM (1) 2010: 643-652 - [c27]David M. Williams, Helen Treharne, Anthony T. S. Ho:
On the Importance of One-time Key Pairs in Buyer-seller Watermarking Protocols. SECRYPT 2010: 441-446
2000 – 2009
- 2009
- [j7]Beeta Vajar, Steve A. Schneider, Helen Treharne:
Mobile CSP||B. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 23 (2009) - [j6]Weina Jiang, Anthony T. S. Ho, Helen Treharne:
A Novel Least Distortion Linear Gain Model for Halftone Image Watermarking Incorporating Perceptual Quality Metrics. Trans. Data Hiding Multim. Secur. 4: 65-83 (2009) - [c26]Helen Treharne, Steve A. Schneider, Neil Grant, Neil Evans, Wilson Ifill:
A Step towards Merging xUML and CSP || {\| \ }B. Rigorous Methods for Software Construction and Analysis 2009: 130-146 - [c25]Steve A. Schneider, Helen Treharne:
Changing System Interfaces Consistently: A New Refinement Strategy for CSP||B. IFM 2009: 103-117 - [c24]Helen Treharne, Edward Turner, Richard F. Paige, Dimitrios S. Kolovos:
Automatic Generation of Integrated Formal Models Corresponding to UML System Models. TOOLS (47) 2009: 357-367 - 2008
- [j5]Neil Evans, Helen Treharne, Régine Laleau, Marc Frappier:
Applying CSP || B to information systems. Softw. Syst. Model. 7(1): 85-102 (2008) - [c23]Helen Treharne, Edward Turner, Steve A. Schneider, Neil Evans:
Object Modelling in the SystemB Industrial Project. ABZ 2008: 359 - [c22]Edward Turner, Helen Treharne, Steve A. Schneider, Neil Evans:
Automatic Generation of CSP || B Skeletons from xUML Models. ICTAC 2008: 364-379 - [c21]David M. Williams, Helen Treharne, Anthony T. S. Ho, Adrian Waller:
Formal Analysis of Two Buyer-Seller Watermarking Protocols. IWDW 2008: 278-292 - [c20]David M. Williams, Helen Treharne, Anthony T. S. Ho, Chris Culnane:
Using a formal analysis technique to identify an unbinding attack on a buyer-seller watermarking protocol. MM&Sec 2008: 205-214 - [c19]Steve A. Schneider, Helen Treharne, Alistair A. McEwan, Wilson Ifill:
Experiments in Translating CSP || B to Handel-C. CPA 2008: 115-133 - 2007
- [j4]Neil Evans, Helen Treharne:
Interactive tool support for CSP || B consistency checking. Formal Aspects Comput. 19(3): 277-302 (2007) - [c18]Wilson Ifill, Steve A. Schneider, Helen Treharne:
Augmenting B with Control Annotations. B 2007: 34-48 - [c17]Damien Karkinsky, Steve A. Schneider, Helen Treharne:
Combining Mobility with State. IFM 2007: 373-392 - [c16]Xi Zhao, Anthony T. S. Ho, Helen Treharne, Vinod Pankajakshan, Chris Culnane, Weina Jiang:
A Novel Semi-Fragile Image Watermarking, Authentication and Self-Restoration Technique Using the Slant Transform. IIH-MSP 2007: 283-286 - [c15]Chris Culnane, Helen Treharne, Anthony T. S. Ho:
Authenticating Binary Text Documents Using a Localising OMAC Watermark Robust to Printing and Scanning. IWDW 2007: 173-187 - [c14]Weina Jiang, Anthony T. S. Ho, Helen Treharne:
Least Distortion Halftone Image Data Hiding Watermarking by Optimizing an Iterative Linear Gain Control Model. IWDW 2007: 423-439 - 2006
- [j3]Steve A. Schneider, Thai Son Hoang, Ken Robinson, Helen Treharne:
Tank monitoring: a pAMN case study. Formal Aspects Comput. 18(3): 308-328 (2006) - [c13]Steve A. Schneider, Helen Treharne, Ana Cavalcanti, Jim Woodcock:
A Layered Behavioural Model of Platelets. ICECCS 2006: 98-106 - [c12]Chris Culnane, Helen Treharne, Anthony T. S. Ho:
A New Multi-set Modulation Technique for Increasing Hiding Capacity of Binary Watermark for Print and Scan Processes. IWDW 2006: 96-110 - 2005
- [j2]Steve A. Schneider, Helen Treharne:
CSP theorems for communicating B machines. Formal Aspects Comput. 17(4): 390-422 (2005) - [j1]Neil Evans, Helen Treharne:
Investigating a file transfer protocol using CSP and B. Softw. Syst. Model. 4(3): 258-276 (2005) - [c11]Steve A. Schneider, Helen Treharne, Neil Evans:
Chunks: Component Verification in CSP||B. IFM 2005: 89-108 - [c10]Steve A. Schneider, Thai Son Hoang, Ken Robinson, Helen Treharne:
Tank Monitoring: A pAMN Case Study. REFINE 2005: 183-204 - [c9]Neil Evans, Helen Treharne:
Linking Semantic Models to Support CSP || B Consistency Checking. AVoCS 2005: 201-217 - [e1]Helen Treharne, Steve King, Martin C. Henson, Steve A. Schneider:
ZB 2005: Formal Specification and Development in Z and B, 4th International Conference of B and Z Users, Guildford, UK, April 13-15, 2005, Proceedings. Lecture Notes in Computer Science 3455, Springer 2005, ISBN 3-540-25559-1 [contents] - 2004
- [c8]Steve A. Schneider, Helen Treharne:
Verifying Controlled Components. IFM 2004: 87-107 - [c7]Neil Evans, Helen Treharne, Régine Laleau, Marc Frappier:
How to Verify Dynamic Properties of Information Systems. SEFM 2004: 416-425 - 2003
- [c6]Helen Treharne, Steve A. Schneider, Marchia Bramble:
Composing Specifications Using Communication. ZB 2003: 58-78 - 2002
- [c5]Helen Treharne:
Supplementing a UML Development Process with B. FME 2002: 568-586 - [c4]Steve A. Schneider, Helen Treharne:
Communicating B Machines. ZB 2002: 416-435 - 2000
- [b1]Helen Treharne:
Combining control executives and software specifications. Royal Holloway, University of London, UK, 2000 - [c3]Helen Treharne, Steve A. Schneider:
How to Drive a B Machine. ZB 2000: 188-208
1990 – 1999
- 1999
- [c2]Helen Treharne, Steve A. Schneider:
Using a Process Algebra to Control B Operations. IFM 1999: 437-456 - 1998
- [c1]Helen Treharne, J. Draper, Steve A. Schneider:
Test Case Preparation Using a Prototype. B 1998: 293-311
Coauthor Index
aka: Steve Schneider
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-17 21:50 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint