TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Number of items: 10.

Whitefield, Jorden and Chen, Liqun and Kargl, Frank and Paverd, Andrew and Schneider, Steve and Treharne, Helen and Wesemeyer, Stephan (2017):
Formal Analysis of V2X Revocation Protocols.
In: Security and Trust Management _ 13th International Workshop, STM 2017, Proceedings, ISBN 9783319680620,
DOI: 10.1007/978-3-319-68063-7_10,
[Conference or Workshop Item]

Steinhöfel, Dominic and Wasser, Nathan Polikarpova, Nadia and Schneider, Steve (eds.) (2017):
A New Invariant Rule for the Analysis of Loops with Non-standard Control Flows.
In: Lecture Notes in Computer Science, 10510, In: Integrated Formal Methods - 13th International Conference, IFM 2017, Turin, Italy, September 20-22, 2017, Proceedings, Springer, pp. 279--294, ISBN 978-3-319-66844-4,
DOI: 10.1007/978-3-319-66845-1,
[Conference or Workshop Item]

Damiani, Ferruccio and Lienhardt, Michael and Muschevici, Radu and Schaefer, Ina Polikarpova, Nadia and Schneider, Steve (eds.) (2017):
An Extension of the ABS Toolchain with a Mechanism for Type Checking SPLs.
In: Lecture Notes in Computer Science, 10510, Springer, In: Integrated Formal Methods - 13th International Conference, IFM 2017, Turin, Italy, September 20-22, 2017, Proceedings, pp. 111-126, DOI: 10.1007/978-3-319-66845-1₈,
[Online-Edition: https://doi.org/10.1007/978-3-319-66845-1_8],
[Conference or Workshop Item]

Olembo, Maina and Bartsch, Steffen and Volkamer, Melanie Schneider, Steve and Heather, James and Teague, Vanessa (eds.) (2013):
Mental Models of Verifiability in Voting.
In: Lecture Notes in Computer Science, 7985, In: 4th International Conference on e-Voting and Identity (VoteID13), Springer, University of Surrey, Guildford, UK, pp. 142 - 155, [Conference or Workshop Item]

Bernhard, David and Neumann, Stephan and Volkamer, Melanie Schneider, Steve and Heather, James and Teague, Vanessa (eds.) (2013):
Towards a Practical Cryptographic Voting Scheme Based on Malleable Proofs.
In: Lecture Notes in Computer Science, 7985, In: 4th International Conference on e-Voting and Identity (VoteID13), Springer, University of Surrey, Guildford, UK, pp. 176 - 192, [Conference or Workshop Item]

Budurushi, Jurlind and Henning, Maria and Volkamer, Melanie Schneider, Steve and Heather, James and Teague, Vanessa (eds.) (2013):
Vote Casting in Any Preferred Constituency: A New Voting Channel.
In: Lecture Notes in Computer Science, 7985, In: 4th International Conference on e-Voting and Identity (VoteID13), Springer, University of Surrey, Guildford, UK, pp. 61-75, [Conference or Workshop Item]

Demirel, Denise and Henning, Maria and van de Graaf, Jeroen and Ryan, Peter Y. A. and Buchmann, Johannes Heather, James and Schneider, Steve and Teague, Vanessa (eds.) (2013):
Prêt à Voter Providing Everlasting Privacy.
In: LNCS, In: VoteID 2013: The 4th International Conference on e-Voting and Identity, 2013, Springer, University of Surrey, Guildford, UK, pp. 156-175, [Conference or Workshop Item]

Demirel, Denise and Henning, Maria and Ryan, Peter Y. A. and Schneider, Steve and Volkamer, Melanie (2011):
Feasibility Analysis of Pret a Voter for German Federal Elections.
7187 2012, In: 3rd international conference on e-voting and identity (VoteID 2011), Springer, Tallinn, Estonia, pp. 158-173, ISBN 978-3-642-32746-9,
DOI: 10.1007/978-3-642-32747-6_10,
[Conference or Workshop Item]

Köpf, Boris and Mantel, Heiko Dimitrakos, Theodosis and Martinelli, Fabio and Ryan, Peter Y. A. and Schneider, Steve (eds.) (2006):
Eliminating Implicit Information Leaks by Transformational Typing and Unification.
In: LNCS, 3866, In: Revised Selected Papers, Formal Aspects in Security and Trust, Third International Workshop, FAST 2005, Newcastle upon Tyne, UK, Springer Verlag, pp. 47-62, [Conference or Workshop Item]

Köpf, Boris and Mantel, Heiko Dimitrakos, Theodosis and Martinelli, Fabio and Ryan, Heiko Y. A. and Schneider, Steve (eds.) (2006):
Eliminating Implicit Information Leaks by Transformational Typing and Unification.
In: LNCS, 3866, In: Revised Selected Papers, Formal Aspects in Security and Trust, Third International Workshop, FAST 2005, Springer Verlag, pp. 47--62, [Conference or Workshop Item]

This list was generated on Tue Jan 28 01:14:14 2020 CET.